CIO Magazine – Demystifying MDM

Posted by & filed under MDM/Master Data Management.

Description: Article from for further discussion surrounding the topic of MDM.  Organizations must understand that improving their data—and building the foundation for MDM—requires them to address internal disagreements and broken processes. Staff must agree on exactly what constitutes a “customer” or a “partner,” and how to resolve any disagreements across business units. Departments and divisions… Read more »

IT Security – Top 5 Internal Security Threats

Posted by & filed under IT Security.

                Description: Link to IT Security article.  Hot links to articles on this slide that will extend/further explain concepts presented in the text. What are some reason why employees fail to follow internal security policies & procedures?  How might they be more motivated?  Use incentives.  Recognition of employees/business units… Read more »

IT Security – Email Security Mistakes

Posted by & filed under IT Security.

Description: In this article authors focus on 25 of the most common and easy to fix mistakes that people make when it comes to email security. The article is designed with the new internet user in mind, so if someone is an email expert, they may want to pass this along to their more novice friends… Read more »

InfoWeek – Positive Security: Worth The Work?

Posted by & filed under IT Security, No Discussion Questions.

  Description: Positive security, in which it whitelists everything from entire applications down to specific functions before allowing access, sounds extreme. Unfortunately, the desktop environments we know and love prioritize ease of use over security, and we’re all feeling the pain: More than half of respondents to our 2008 InformationWeek Analytics Strategic Security poll have been hit… Read more »

How Stuff Works – Firewalls

Posted by & filed under IT Infrastructure.

            Description: Foundational information about how firewalls work. Source: Jeff Tyson, How Stuff Works Date: 10/24/2000 Link: Discussion Questions: How effective are firewalls?

CompTIA – Security

Posted by & filed under IT Security, IT Standards.

              Description: In 2008, the average number of security breaches increased slightly from previous years. Although the number of security breaches remained moderate over the last few years, the data indicates the severity levels have increased. This suggests many organizations have made significant progress in dealing with security issues, but… Read more »

WordPress – The Top Business Issues facing CIOs / IT Directors – Results

Posted by & filed under IT Projects.

              Description: Graphical display of top IT issues for CIOs and IT Directors. Source: Peter Thomas Date: 3/17/2009 Link: Discussion Questions: 1. CIOs who have a more strategic role are more successful in what core strategic activities?  Why are these critical success factors? 2. Oversees the IT division typically:… Read more »

PC World – Hacker Speak

Posted by & filed under IT Security.

                Description: Article with definitions of a hacker’s language important to internal security. Source: Andrew Brandt, PC World  Link: Discussion Questions: Do you believe that known hackers should be employed within organizations as security “officers” or gurus of security?