• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Management Information Systems

7th edition

  • Home
  • Blog
    • Categories
      • Business Information Systems
      • Business Intelligence
      • Databases
      • Decision Support/Expert Systems
      • Functions and Supply Chains
      • Global Systems
      • Hardware
      • Networks & Telecommunications
      • Security
      • Software
      • Strategic Uses
      • Systems Acquisition
      • Systems Planning/Development
      • Web-Enabled Enterprise
      • Uncategorized
  • Textbook Information
    • Textbook Ordering
    • Textbook Details
    • Table of Contents
    • Textbook History
  • Contact
  • About
    • About the Blog
    • Dr. Kenneth J. Sousa
    • Dr. Effy Oz

Tech Thoughts for 2016 — Security

January 15, 2016 By Kenneth Sousa

Kept you guessing on the last thought?  Well here it is … the continuation of Tech Thoughts for 2016.  The first blog in this series can be viewed by clicking here.

5. Security anxiety will consume organizations.
Now that you have read the first four, this one should not be very surprising.

The website Information is Beautiful has compiled the latest, most significant data breaches.  Looking at their graph, it is astounding on the number of organizations and frequency of hacks.  The well publicized security breaches of the US Government Office of Personnel Management, Home Depot and Target have gained the direct attention of the “C-Levels” of businesses.

Some of the previous technology thoughts in this series have a security “thread” wrapped around them.  Whether it is …

  • Eliminating the pirating of video content created by business organizations.
  • Preventing the access and malicious destruction of corporate databases by unauthorized parties.
  • Counteracting the attempts to gain access, destroy and control IoT devices
  • Handling and using personal IoT device data with care and purpose

The rapid use and expansion of technology should provide more banter, analysis, corporate strategy … and yes more blogging (smile).

Happy New Year!!

You can view the second blog in this series by clicking here.

 

Filed Under: Networks & Telecommunications, Security Tagged With: Technology Hacking, Technology Security Breach

Primary Sidebar

Latest Posts

Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part III)

Now that we have completed the first two periods of the artificial intelligence discussion, now for … [Read More...] about Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part III)

Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part II)

I hope you enjoyed the "first period" of this blog article. If you have not read it, you can click … [Read More...] about Artificial Intelligence — The Challenge of Earned Intelligence and Technology Integration (Part II)

Artificial Intelligence – The Challenge of Earned Intelligence and Technology Integration

Artificial intelligence is on the train track.  The wave has begun in the arena.  It cannot be … [Read More...] about Artificial Intelligence – The Challenge of Earned Intelligence and Technology Integration

Tweets by kensousa

Copyright © 2025 · Kenneth J. Sousa, PhD.