The Business-Technology Weave:

IT security


January 6, 2011  12:46 PM

The human element



Posted by: David Scott
breach, business breach, business management, business progression, business security, data breach, human resources, IT security, systems security

 

What is the most critical element, or factor, in any...

January 4, 2011  2:17 PM

Cyberwarfare: Countries today; corporate and SMB tomorrow?



Posted by: David Scott
cyber attack, cyber security, cyber training, cyber war, cybersecurity, cyberwar, data security, hack, IT security, security training, virus, worm

 

A recent news report got me to thinking.  The...


December 30, 2010  10:23 AM

Have a safe, and happy, new year – Happy New Year!



Posted by: David Scott
content access, content control, content management, data access, data control, end-point devices, endpoint devices, IT security, VDI, virtual desktop interface

 

I was reviewing the accelerating change I’ve witnessed this year for both...


December 28, 2010  11:55 AM

You don’t know what you don’t know



Posted by: David Scott
business plans and policy, business security, content management, content security, data security, enterprise resource management, enterprise resource planning, enterprise security, information systems, intellectual property, intellectual property security, IT security, MIS, security policyi and plans

 

When securing information, intellectual property, data (hard and soft, paper...


December 14, 2010  12:43 PM

Data Breaching and Lessons of Legacy



Posted by: David Scott
business and IT solutions, business security, business solutions, business-technology weave, CMS, content management system, data breach, data breaching, data compromise, data theft, eCulture, ID theft, IT security, IT solutions, stolen identity, university of wisconsin

 

I see where the University of...


October 29, 2010  12:16 PM

Velocity of Risk



Posted by: David Scott
2010 Global SMB Information Protection Survey, AITP, Association of Information Technology Professionals, business management, business policy, business risk, business security, business security plan, information securrtiy, IT risk, IT security, risk management, Security Plan, securtiy policy, velocity of risk

 

Wow.  I was reading an article in InformationWeek...


October 28, 2010  9:04 AM

Ongoing Social Networking Perils



Posted by: David Scott
America Online, AOL, business security, facebook, IT security, myspace, personal use, social networking, social networks

 

Oh oh – here we go again.  A Wall Street Journal investigation has found that the social...


October 27, 2010  12:59 PM

A Model for Tearing the Weave: Starbucks, Safety and Security, Pt. III



Posted by: David Scott
business security, content management, content security, data security, IT security, Starbucks

 

(Please see Parts I and II, below)


October 22, 2010  10:36 AM

A Model for Tearing the Weave: Starbucks, Security and Safety – Pt. I



Posted by: David Scott
best business practices, best practices, business safety, business security, business surety, fiscal responsibility, IT security, Starbucks

 I’ve stumbled on something rather disturbing regarding Starbucks’ business practices.  First, let me say...


October 18, 2010  10:24 AM

Oh Oh – Facebook Suffers Breach



Posted by: David Scott
best business practice, best informaiton technology practice, best IT practice, business practice, business security, data breach, data security, data theft, information systems, IT security

 

How does the biggest social networking site suffer a data...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: