The Business-Technology Weave:

IT security


October 8, 2010  6:23 AM

Exponential Threats to Security



Posted by: David Scott
business security, hacktivist, hijacked IP, internet security, IP security, IT security, online security

 

Well here’s a twist to security.  It seems a law firm, specifically ACS: Law, was targeting certain owners of internet...

September 30, 2010  9:38 AM

Budget Cuts Impacting Cybersecurity



Posted by: David Scott
acceptable use, acceptable use policy, business plans, business policy, business security, CISO, content management, cyber security, cybersecurity, data breach, data theft, Deloitte, IT plans, IT security, NASCIO

 

It’s being reported that state budgets, increasingly in the red, are impacting cybersecurity – and not in a good way, as you may have...


September 21, 2010  10:26 AM

BEWARE: Errors Can Be Efficient Too



Posted by: David Scott
business efficiency, business error, business security, efficiency of error, enterprise resource management, enterprise resource planning, IT efficiency, IT error, IT security

Being efficient, reducing cost, leveraging effort, doing more with less… ever faster -  this is all a part of intelligent business design, and properly sized and executed technology design.  In...


September 10, 2010  12:27 PM

Check Your Acceptable Use Policy – Is This Missing?



Posted by: David Scott
acceptable use, acceptable use policy, business policy, business security, computer security, inappropriate use, IT policy, IT security, unacceptable use

In reviewing some Acceptable Use policies, I’ve noticed the usual cautions about adherence to authorized access, the caveats about protecting your ID...


September 8, 2010  5:58 AM

“Open” Data / Resource Environments



Posted by: David Scott
acceptable use, business security, business standards, computer lab, content management, content security, IT security, IT standards, open data

 

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 30, 2010  12:57 PM

Identity and Access Management



Posted by: David Scott
access security, business security, I/AM, identity and access management, identity management, IT security

Organizations, from small through medium businesses (SMB), to large global enterprises, must control access:  to systems,...


August 25, 2010  1:08 PM

Security and Insecurity: Finite vs. Infinite – Pt. III



Posted by: David Scott
business security, content management, data breach, data security, data theft, IT plans, IT security, security plans, security policy

Awareness, Action and…...


August 23, 2010  11:57 AM

Security and Insecurity: Finite vs. Infinite – Pt. II



Posted by: David Scott
business security, content management, content security, data management, data security, data theft, information security, IT plans, IT policy, IT security, Security Plan, security policy

 

In battling...


August 22, 2010  12:27 PM

Security and Insecurity: Finite vs. Infinite



Posted by: David Scott
business security, information technology security, IT security

It’s an...


August 5, 2010  8:54 AM

Hackers Trying to Take Over Power Plants – “I.T. Wars” Indeed



Posted by: David Scott
bank card, business security, credit card, industrial control systems, industrial plant, industrial systems, IT security, power companies, power company, power plant

 

According to the Associated Press (AP),   Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: