• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Management Information Systems

7th edition

  • Home
  • Blog
    • Categories
      • Business Information Systems
      • Business Intelligence
      • Databases
      • Decision Support/Expert Systems
      • Functions and Supply Chains
      • Global Systems
      • Hardware
      • Networks & Telecommunications
      • Security
      • Software
      • Strategic Uses
      • Systems Acquisition
      • Systems Planning/Development
      • Web-Enabled Enterprise
      • Uncategorized
  • Textbook Information
    • Textbook Ordering
    • Textbook Details
    • Table of Contents
    • Textbook History
  • Contact
  • About
    • About the Blog
    • Dr. Kenneth J. Sousa
    • Dr. Effy Oz
  • Search

Tech Thoughts for 2016 — Security

January 15, 2016 By Kenneth Sousa

Kept you guessing on the last thought?  Well here it is … the continuation of Tech Thoughts for 2016.  The first blog in this series can be viewed by clicking here.

5. Security anxiety will consume organizations.
Now that you have read the first four, this one should not be very surprising.

The website Information is Beautiful has compiled the latest, most significant data breaches.  Looking at their graph, it is astounding on the number of organizations and frequency of hacks.  The well publicized security breaches of the US Government Office of Personnel Management, Home Depot and Target have gained the direct attention of the “C-Levels” of businesses.

Some of the previous technology thoughts in this series have a security “thread” wrapped around them.  Whether it is …

  • Eliminating the pirating of video content created by business organizations.
  • Preventing the access and malicious destruction of corporate databases by unauthorized parties.
  • Counteracting the attempts to gain access, destroy and control IoT devices
  • Handling and using personal IoT device data with care and purpose

The rapid use and expansion of technology should provide more banter, analysis, corporate strategy … and yes more blogging (smile).

Happy New Year!!

You can view the second blog in this series by clicking here.

 

Filed Under: Networks & Telecommunications, Security Tagged With: Technology Hacking, Technology Security Breach

Primary Sidebar

Latest Posts

Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part III)

… [Read More...] about Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part III)

Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part II)

… [Read More...] about Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part II)

Artificial Intelligence – The Challenge of Earned Intelligence and Technology Integration

… [Read More...] about Artificial Intelligence – The Challenge of Earned Intelligence and Technology Integration

Tweets by kensousa

Copyright © 2026 · Genesis Sample Theme On Genesis Framework · WordPress · Log in