August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security

Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...

November 17, 2011  11:26 AM

Security Expert Eugene Kaspersky Warns of Cyber-Terror

Posted by: David Scott
acceptible use, CMS, content management, cyber crime, cyber espionage, cyber terror, cyber terrorism, cyberterror, data breach, data theft, Eugene Kaspersky, hacktivism, ID theft, Kaspersky, security breach, security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend

September 2, 2011  11:07 AM

One of the Biggest Overlooked Security Holes in Existence

Posted by: David Scott
35 million users hacked, business breach, computer hack, hack, IT breach, multiple accounts, personal information, security breach, SK Communications


August 20, 2011  11:42 AM

Irony: Vanguard Defense Industries is Hacked

Posted by: David Scott
anonymous hacking group, business theft, data theft, gmail hacked, hackers anonymous, personal information, security breach, sensitive information, vanguard defense industries, VDI


July 20, 2011  10:46 AM

The Cloud: Internet security is not “insurance”

Posted by: David Scott
acceptable use, cloud security, content management, data breach, data protection, internet security, security breach, SMB security, SME security, the cloud


It seems that one major online breach after another occurs: ...

April 29, 2011  12:04 PM

Ahhh, New York City you talk a lot; let’s have a look at ya…

Posted by: David Scott
access security, best security practice, business breach, business security plan, computer security, content management, content security, cost of data breach, cyber security, data breach, data disclosure, data exposure, data security, enterprise security, human error, New York Yankees, New York Yankees data breach, NY Yankees, NY Yankees data breach, security breach


(With apologies to Mick Jagger/Rolling Stones -  NYC,...

July 21, 2010  6:00 AM

Data Breach and Legislation: What’s Coming Your Way?

Posted by: David Scott
breach notification, business legislation, business security, content management, data breach, data breach law, data legislation, disaster recovery, identity theft, it legislation, IT security, security breach, security policy, UK data breach laws, US data breach laws


It’s rather interesting to monitor what’s happening in the UK right now. ...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: