Last week fellow IBM Midsize blogger Jason Hannula wrote about Gartner’s prediction that by 2018 more than 50% of all folks will use their mobile computing devices in the workplace before, or instead of, using a desktop or laptop. That’s just three short years away. We already have an abundance of mobile devices being used in a wide range of industries. (more…)
Posts Tagged ‘privacy policies’
Addressing Mobile Risks in 2015
Wednesday, December 24th, 2014The 3 Necessary Elements for Effective Information Security Management
Thursday, December 11th, 2014Seeing all these really bad information security incidents and privacy breaches, often daily, are so disappointing. Let’s consider these four in particular.
- The Sony hack that seems to continue to get worse as more details are reported.
- An ER nurse using the credit cards of patients.
- Breaches of Midwest Women’s Healthcare patient records due to poor disposal practices at the Research Hospital.
- TD Bank’s outsourced vendor losing two backup tapes containing data about 260,000 of their customers.
And the list could continue for pages.
These incidents, and most others, probably could have been prevented if an effective information security and privacy management program existed that was built around three primary core elements: (more…)
6 Critical Factors for Effective Information Security & Privacy Policies
Wednesday, October 14th, 2009I’ve been feeling bad about not posting to my blog as often as I have historically…
Reading Online Privacies Could Cost $365 Billion Annually? Doubt It!
Tuesday, October 21st, 2008My friend Alec (thanks Alec!) pointed me this interesting story…