The Business-Technology Weave:

IT Wars


April 8, 2012  12:58 PM

Hackers are Hitting Macs with a Major Virus



Posted by: David Scott
best practice, business risk, data breach, data theft, IT risk, IT security, IT Wars, Mac, Mac malware, security policy, the business-technology weave, virus

March 1, 2012  12:28 PM

Leveraging Knowledge Requires… Knowledge



Posted by: David Scott
best practice, business risk, data breach, data theft, IT knowledge, IT risk, IT security, IT training, IT Wars, security policy, the business-technology weave

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


June 4, 2010  5:51 AM

Lions and Tigers and Data Breach … OH MY!



Posted by: David Scott
acceptable use, computer education, computer training, data breach, eCulture, IT Wars, security awareness, Security Plan, security policy, security training, the business-technology weave

(with apologies to The Wizard of Oz)

Forty-six States have now enacted data breach notification laws, whereby businesses must contact consumers to advise when their personal...


May 28, 2010  1:27 PM

WorkFors: Those to Whom you Report



Posted by: David Scott
business management, HR, human resources, IT Wars, personnel management, the business-technology weave

  

We’ve discussed WorkOns and WorkWiths – let’s wrap this series up with...


May 27, 2010  8:02 AM

TechnoShines, TechnoFinds and TechnoBinds



Posted by: David Scott
business management, eCulture, HR, IT Wars, the business-technology weave

   

You will find three kinds of people in the WorkWith group. ...


May 22, 2010  1:01 PM

The WorkWith: Squeezed in the Middle



Posted by: David Scott
business management, human resources, IT Wars, people management, workons, workwiths and workfors

As planned, let’s return to our discussion as originally begun on May 7th, Managing People in the Weave.  As necessary, review that post and its follow-ons...


May 20, 2010  1:55 PM

Insecurity, Part III: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business policy, business risk, business security, data breach, data exposure, data security, data theft, IT policy, IT security, IT Wars, malware, the business-technology weave

[As necessary, please see the first article...


May 16, 2010  10:07 AM

Insecurity, Part II: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business security, content management, data breach, data theft, ID theft, IT security, IT Wars, security policy, the business-technology weave

 

Continuing with our exposure of services and associated liabilities from the other day: 


May 15, 2010  9:20 AM

Insecurity: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business security, content management, data breach, data theft, IT security, IT Wars, security policy, the business-technology weave

 

I’ve been doing a little work for a big State agency.  By “big,” I mean big budget, large number of...


May 13, 2010  6:13 AM

You Say “Business Security,” I Say “IT Security”…



Posted by: David Scott
business management, business security, data breach, data privacy, identity breach, identity theft, IT security, IT Wars, organizational security, the business-technology weave

 

You say To-MAY-to, I say To-MAH-to…  one thing’s for certain:  When it comes to organizational security we...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: