The Business-Technology Weave:

security policy


July 18, 2011  12:50 PM

European Union Considering Breach Notifications Rules



Posted by: David Scott
breach notification, breach notification law, breach notification rules, content management, content management policy, data breach, data integrity, data security, government breach, government data breach, IT security, security plans, security policy

 

It’s interesting to me that the European Union’s European Commission is...

July 16, 2011  10:38 AM

Pentagon Loses 24,000 Files to Theft – and lessons to you



Posted by: David Scott
000 files, classified data theft, data privacy, data security, defense contractor loses files, Deputy Defense Secretary William Lynn, foreign intruder steals data, foreign intruder steals files, information privacy, pentagon loses 24, Pentagon loses files, security policy, theft of 24

 

The Pentagon is supposedly mounting a new cyber security initiative...


July 6, 2011  5:50 PM

Data Breach at Morgan Stanley: 34,000 customers at risk



Posted by: David Scott
content management, data breach, data encryption, data management, morgan stanley, morgan stanley data breach, secure transmission of data, security policy

 

From Morgan Stanley comes word that two unencrypted CDs have gone missing.  They were sent, and actually delivered - to...


June 24, 2011  7:47 AM

UK, France and Germany: 84% of companies have suffered breach in the past year



Posted by: David Scott
business continuity, business security, data breach, data recovery, IT security, Juniper, Juniper Networks, Juniper Networks Survey, Security Plan, security policy

 

From Europe comes incredible news, as reported by Juniper...


May 31, 2011  9:06 AM

Cyber Warfare: Lessons for the “local” org… Yours



Posted by: David Scott
business security plan, cyber attack, cyber security, cyber security and government, cyber threat, cyber war, disaster awareness, disaster plan, disaster planning, IT security, Security Plan, security policy

 

In his excellent Wall Street Journal article,


May 20, 2011  12:20 PM

Sony is Hacked Again



Posted by: David Scott
anti-spyware, anti-virus, antivirus, data breach, data security, malware, online security, security policy, security practices, So-Net, Sony, sony online entertainment, Sony PlayStation, spyware, virtual points, virus removal

 

Security is not evidenced merely through the absence of harm.  A harming event may be transpiring in...


March 14, 2011  11:26 AM

Mobile Access: Make it selective and effective



Posted by: David Scott
authentication, data encryption, device authentication, firewall, mobile access, mobile broadband, mobile device, mobile security, router, security policy, virtual-private-network, vpn

 

Security is always a delicate balance:  You need to provide...


February 20, 2011  4:12 PM

Security and Mounting Threats – Redux



Posted by: David Scott
acceptable use, business continuity, business planning, business plans, business policies, business policy, CMS, content management, content policy, disaster planning, IT security, Security Plan, security policies and plans, security policy, user training

 

I discovered an interesting article online: ...


January 21, 2011  12:43 PM

107 Trillion E-mails Sent Last Year



Posted by: David Scott
acceptable use, Add new tag, blog, blog policy, blogging, blogging at work, blogs, business breach, content management, data breach, data security, e-mail policy, e-mail security, human error, pingdom, security policy, social network policy, social networking, social networking and business

 

Don’t Miss the Obvious: ...


January 10, 2011  2:16 PM

Wikileaks Redux: Gov’t. strategy doc on preventing leaks… is leaked



Posted by: David Scott
acceptable use, business security, content management, data breach, data security, IT security, Security Plan, security policy, WikiLeaks

 

I can’t ignore this story. ...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: