August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...


April 8, 2012  12:58 PM

Hackers are Hitting Macs with a Major Virus



Posted by: David Scott
best practice, business risk, data breach, data theft, IT risk, IT security, IT Wars, Mac, Mac malware, security policy, the business-technology weave, virus


March 1, 2012  12:28 PM

Leveraging Knowledge Requires… Knowledge



Posted by: David Scott
best practice, business risk, data breach, data theft, IT knowledge, IT risk, IT security, IT training, IT Wars, security policy, the business-technology weave

  Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 1, 2011  12:21 PM

Cyber Crime to Invade Public Cloud… and more…



Posted by: David Scott
cloud security, content management, cyber crime, data breach, data security, data theft, Hacker, hacking, hacktivism, hacktivist, IT governance, security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 22, 2011  12:01 PM

Cyber-terror, Hacktivism, etc.: New thoughts on security for the modern organization



Posted by: David Scott
acceptable use, content management, cyber security, cyber terrorism, data breach, data security, data theft, hack, hacking, hacktivism, hacktivists, Illinois water plant, security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 17, 2011  11:26 AM

Security Expert Eugene Kaspersky Warns of Cyber-Terror



Posted by: David Scott
acceptible use, CMS, content management, cyber crime, cyber espionage, cyber terror, cyber terrorism, cyberterror, data breach, data theft, Eugene Kaspersky, hacktivism, ID theft, Kaspersky, security breach, security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 28, 2011  10:31 AM

Software Updates: Consider carefully



Posted by: David Scott
anti-virus, antivirus, computer virus, content management, data protection, data theft, e-mail spoof, IT security, malware, online spoof, remind me later, Security Plan, security policy, security update, software patch, spoof, update now, virus, virus removal

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 1, 2011  1:10 PM

Work Policies and Employee Compliance



Posted by: David Scott
acceptable use, acceptable use policy, acceptable use training, best business practice, best employee practice, business vulnerabilities, business vulnerability, computer security, computer use, computer vulnerabilities, computer vulnerability, content management, content management policy, content management training, employee handbook, human resources, security policy, security training, workplace compliance, workplace policies, workplace policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 26, 2011  10:09 AM

Social Networking: Sense and Sobriety



Posted by: David Scott
acceptable use, communications policy, content management, risk analysis, security policy, social networking, social networking and criminal, social networking and vacation, social networking crime, social networking liability, social networking security, survey for risk

 

Today’s social networking environment is interesting from a variety of...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: