Posts Tagged ‘confidentiality’
A catalog of this year’s risky articles #2010
Risk is something which can be difficult to evaluate for the average person, there is a lot of work which goes in to learning not to do the two things that people usually do when they are confronted with risk:
- Ignore
- Overreact
Facebook is the new Portal for Insurers and Banks #social #finance
It looks like every man and his dog needs to have a Facebook page, even banks…
@Google and @FaceBook battle over the back of @FriendFeed? #social #feedburner
It has been almost 1.5 weeks since Google’s FeedBurner removed the Frie…
Prosper allows loans to fund Kiva projects #microfinance
Some days ago I tweeted to Prosper, a personal loan marketplace, whether they…
Social Revolution – Do You Get It?
I don’t really think most people get “it” when it comes to …
Secret Google campaign against Hyves? #social #networking
Just noticed that Google Translate translates the name of the Dutch social ne…
Company Policy or People #hr
I find a 400 plus page manual of office policies and job descriptions for eac…
Social Media Syndication – Feedback Loop
In the last two days I’ve not been posting so much, and focussing on up…
Google Scribe – Ye Shall Know Them By Their Fruits #google
I started playing with Google Scribe and wanted to see if patterns emerged so…
@Google, please stop with the language! #google
I have my Google account set up with English as the preferred language, my br…
Did The LinkedIn Certificate Expire Again? #linkedin
For the last 2 years LinkedIn has been running a bad poor IT management depar…
Advert: Reserve your Agile/SCRUM Pack #scrum #agile
When I just started I too had trouble with getting all the items I required t…
GMail Quota and Statistics (follow-up) #google #gmail #dashboard
On August 11th 2007 I exceeded my GMail quota, I blogged about it here. At th…
More SMS banking by M&T #sms #bank #risk
Brian Szymanski send a reply to me concerning another bank implementing SMS b…
Solving the URL shortening problem #twitter #tweet
I don’t understand why url expansion after url shortening is such an is…
Is RevTrax violating FaceBook privacy policy? #facebook @RevTrax #privacy
I just read an article Web Coupons Know Lots About You, and They Tell in the …
China acquires more than China… #hacks
This morning/night China’s networks were sending rerouting messages to …
Implementation of Security #risk
The lack of trained and experienced computer security people working in small…
ING reveals names using account numbers #bank #risk
Last week I saw an episode of a popular Dutch Ombudsman program Kassa, they r…
Musing: Why can I fly solo?
After seeing a program about a lifecoach trying to find the time to get his p…
Image source Radio Nederland Wereldomroep
Written by Daniël W. Crompton (webhat)
December 28, 2010 at 7:00 pm
Posted in tagging
Tagged with advert, agile, authentication, authorization, availability, bank, banking, bing, blogging, business, calendar, certificate, certification, china, confidentiality, control, dashboard, defense, department, difference, dod, dutch, english, evil, facebook, feedburner, finance, flying, folksonomy, friendfeed, game, gmail, google, hack, hootsuite, HR, human, humor, humour, hyves, illusion, ing, integrity, kanban, kiva, labs, language, lifehacks, linguistics, linkedin, loan, mail, maintainability, mashup, media, microblogging, microfinance, myspace, navy, networing, networking, nl, personal, ping.fm, pki, privacy, programming, quota, reliability, resources, risk, scam, scribe, scrum, search, security, shortening, sms, social, socialmedia, spam, statistics, technology, theory, therapy, threat, translate, travel, twitter, url, us, violation, web, work, xp, yahoo!
Implementation of Security #risk
The lack of trained and experienced computer security people working in small to medium sized businesses today means that many times this is left to the regular IT departments to solve, if there even is an IT department. In many cases this leads to vendors educating the IT department on what are best practices, this is often to the advantage of both the vendors and the company. Important to remember is that such inequality and lack of knowledge on the part of the IT department can lead to a situation that when a vendor leaves the knowledge leaves with him/her. In the end the vendor is there to sell their software.
Written by Daniël W. Crompton (webhat)
March 5, 2010 at 10:57 am
Posted in privacy, risk, security
Tagged with authentication, authorization, availability, certification, confidentiality, integrity, maintainability, privacy, reliability, risk, security