August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security

Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...

May 10, 2011  6:24 AM

The Web of Insecurity

Posted by: David Scott
enterprise security, security awareness, security developer, security development, web applications, web management, web security


In some quarters, it’s being estimated that most enterprise web...

February 15, 2011  12:54 PM

The Next Pearl Harbor?

Posted by: David Scott
business policy, business security, cloud security, cyber attack, cyber threat, cyber training, cyber war, DAPR, disaster awareness, disaster recovery, DR, electro-magnetic pulse, electromagnetic pulse, emp, IT plans, IT policy, Pearl Harbor, preparedness and recovery, security awareness, Security Plan, security training, World War II, WWII


A   Bookmark and Share     0 Comments     RSS Feed     Email a friend

June 4, 2010  5:51 AM

Lions and Tigers and Data Breach … OH MY!

Posted by: David Scott
acceptable use, computer education, computer training, data breach, eCulture, IT Wars, security awareness, Security Plan, security policy, security training, the business-technology weave

(with apologies to The Wizard of Oz)

Forty-six States have now enacted data breach notification laws, whereby businesses must contact consumers to advise when their personal...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: