TITLE

Businesses should at least be prepared for tech incidents

AUTHOR(S)
LeClair, Lee
PUB. DATE
October 2009
SOURCE
Inside Tucson Business;10/19/2009, Vol. 19 Issue 20, p19
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses the importance of planning in information technology. It notes that technology is a set of tools which allows a business to manage information but its tools are complex to configure and run. It mentions that a technology plan needs to be strategic with a clear business goals and cost objectives. It adds that a business needs to possess technology plans pertaining to incident management and business continuity of operations.
ACCESSION #
45104663

 

Related Articles

  • Calculating Risks. Classe, Alison // Accountancy;Dec2001, Vol. 128 Issue 1300, p56 

    This article explains how companies can align their overall business strategy with information technology (IT) security policies. The application of risk management techniques to IT is an increasingly common approach, and one designed to enable the business decision-makers to tackle IT security...

  • Calculating Risks. Classe, Alison // Accountancy;Dec2001, Vol. 128 Issue 1300, p56 

    This article explains how companies can align their overall business strategy with information technology (IT) security policies. The application of risk management techniques to IT is an increasingly common approach, and one designed to enable the business decision-makers to tackle IT security...

  • Welcome. Currie, Lysanne // Director;May2013, Vol. 66 Issue 8, p3 

    An introduction is presented in which the editor discusses various reports within the issue on topics including common concerns about information technology security, business strategies at engineering start-up Viper Subsea, and electronic commerce company Not on the High Street.com's business...

  • Some things never change….  // SC Magazine: For IT Security Professionals (UK Edition);Nov/Dec2011, p26 

    The article presents an expose of business managers' naive approach to information security which appeared in a 1969 issue of "Management Today." It cites incidents which showed that management were unaware of the risks undergone due to a false sense of security generated by the technical...

  • What price security?  // Management Accounting: Magazine for Chartered Management Account;June97, Vol. 75 Issue 6, p60 

    Reports on the results of the Department of Trade and Industry's (DTI) 1996 Information Security Breaches Survey which reveals the belief of the majority of managing directors that their companies would collapse if their information technology (IT) systems did. Incidence of security breaches;...

  • Confidentiality and security in information technology.  // Generations;Fall97, Vol. 21 Issue 3, p50 

    Discusses ways to manage and protect confidential records in information technology. Challenge in online confidentiality; Provisions of the Electronic Communications Privacy Act of 1990; Significance of privacy and confidentiality to older adults.

  • MGT514: IT Security Strategic Planning, Policy and Leadership.  // SC Magazine: For IT Security Professionals (15476693);Apr2013 Sans Fire Supplement, p48 

    A description of the course "IT Security Strategic Planning, Policy and Leadership" being offered at SANSFIRE 2013 in Washington, D.C. is provided.

  • Insecure?  // PC Week;6/24/96, Vol. 13 Issue 25, pE4 

    Highlights the results of a survey which found that at lease 90 percent of central information officers are involved in making a final decision on the purchase of security products and services.

  • Sicherstellung einer ordnungsgemäßen IT. Knoll, Matthias // HMD: Praxis der Wirtschaftsinformatik;feb2013, Vol. 50 Issue 1, p6 

    The article discusses the securing of standing information technology (IT) systems at business enterprises, arguing that IT checking is essential to the internal control system of a business, in which standardized economic oversight is essential, and which must be customized to the planning...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics