RecruitingBlogscom

Follow Us:

 

identity theft

Results 51 - 75 of 77Sort Results By: Published Date | Title | Company Name
Published By: LifeLock     Published Date: Mar 02, 2015
Every interaction, every communication, every touch point creates a digital breadcrumb ó a piece of data that can put people at greater risk of identity theft. This paper from Forrester Research compares various segments and demographics to understand which groups are at the greatest risk of identity theft.
Tags : 
    
LifeLock
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This white paper provides insights into how Extended Validation (EV) SSL can help increase online transactions and sales by alleviating consumer concerns about identity theft and fraud.
Tags : 
verisign, extended validation, ev ssl, online sales, online transactions, it security policies, phishing, identity theft
    
VeriSign, Inc.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 12, 2011
With the threat of identity theft and other types of fraud rampant on the internet, many consumers are reluctant to release their details, even if that means abandoning a sale.
Tags : 
verisign, extended validation ssl, verisign, papercheck.com, carinsurance.com, flagstarbank.com, creditkarma.comphishing, identity theft
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: LifeLock     Published Date: Feb 24, 2017
Identity theft (IDT) is a critical concern for people around the world. Providing identity theft protection as an employee benefit helps safeguard employees from fraud, scams and threats to their personal credit ratings. And, this low-cost benefit can make your employment benefits package more attractive. In this program, Todd Davis, founder of LifeLock, discusses the options for identity theft coverage, how to drive participation in such coverage and how to use your IDT benefit to improve employee retention and engagement.
Tags : 
    
LifeLock
Published By: Arcot     Published Date: Jun 04, 2008
Man-in-the-Middle attacks can defeat most kinds of multi-factor authentication, including OTP tokens. Financial institutions, brokerages, and other likely targets of MITM attacks should consider the ability of their countermeasures to defeat MITM attacks, as these types of attacks will continue.
Tags : 
authentication, identification, identity, identity theft, arcot, man in the middle, man-in-the-middle, mitm
    
Arcot
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
DigitalPersona UK
Published By: Symantec     Published Date: Jan 10, 2013
Security attacks happen too often; recently, an attack on AT&T resulted in 120,000 identities being stolen. Organizations need to focus on security efforts to prevent breaches. Read to learn about reducing cost and complexity of preventing attacks.
Tags : 
web vulnerability management, complexity of web, reducing costs, attacks, identity theft, management, security, it management
    
Symantec
Published By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare providerís EMR system to help keep sensitive medical data safeóand keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : 
healthcare, electronic medical records, access management solutions, identity protection, medical data
    
IBM
Published By: Symantec     Published Date: Feb 04, 2015
Seventy percent of Americans are seriously concerned about identity theft. More than two thirds of online shoppers donít complete their purchase because of price. In the world of e-commerce, you need a targeted marketing strategy to ensure youíre offering customers the reassurance and guarantees they need to browse and buy confidently. Symantecís Norton Shopping Guarantee gives you just that. Online stores are seeing a dramatic return on investment when they use it. For merchants and customers alike, itís satisfaction guaranteed.
Tags : 
e-commerce, identity theft, targeted marketing strategy, reassurance and guarantee, return on investment, security
    
Symantec
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. Call me to learn about the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, security, identity threat, authentication, it security
    
LifeLock
Published By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
bitglass
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Netwrix     Published Date: Apr 22, 2008
Password practices that improve security are by their nature burdensome to the user, resulting in passwords difficult to remember which are often changed about the same time they have finally become memorized. Yet password security remains a cornerstone of system security: as much as 80% of security breaches take place not through arcane hacking and virus attacks, but through system infiltration facilitated by use of a password.
Tags : 
netwrix, authentication, passwords, password management, identity theft, fraud, login
    
Netwrix
Published By: Okta     Published Date: Apr 29, 2015
2014 was a banner year for security breaches. According to the Identity and Theft Research Center, there were 783 reported U.S. data breaches, a 27.5% increase from 2013. Keeping your company and customer data safe is no longer just an IT problem; it's a top concern for C-level executives as well. Your company's reputation and bottom line depend on keeping corporate data secure ó yet employee mobility is making this a huge challenge. Read this eGuide to learn how to avoid these challenges with simpler, smarter authentication.
Tags : 
theft, research center, c-level, okta, theft research, security, it management
    
Okta
Published By: BrandProtect     Published Date: Feb 17, 2011
Understanding the Value of a Social Media Risk Management Program
Tags : 
social media monitoring, social media risk management, identity theft, brand and intellectual property abuses, malicious discussion
    
BrandProtect
Published By: IBM     Published Date: Aug 21, 2008
The world has embraced payment cards to support commercial transactions for almost every kind of business. Unfortunately, the data associated with these payment cards is the focus of many identity theft activities. This white paper outlines Payment Card Industry (PCI) requirements, as well as the benefits of compliance and the penalties for noncompliance.
Tags : 
ibm, ibm mi, ibm grm, pci, pci dss, pci-dss, pci compliance, data theft
    
IBM
Published By: LifeLock     Published Date: Mar 02, 2015
Todayís workers and consumers conduct more transactions online and through mobile devices than ever before. Their always-connected lifestyles free them to work and play as they like, but may increase the risk of identity fraud.
Tags : 
    
LifeLock
Published By: LaGarde     Published Date: Sep 10, 2008
It's difficult to pick up a news report without reading about another data breach or case of identity theft. With so much personal and financial information stored and transmitted electronically, consumers are at greater risk than ever of becoming victims of fraud.
Tags : 
lagarde, pci, pci-dss, pci dss, compliance, credit card, payment card, data protection
    
LaGarde
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card
    
Data Guard Systems, Inc
Published By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of todayís fraudsters.
Tags : 
security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
    
IBM
Published By: LifeLock     Published Date: Aug 23, 2016
Every employee has a risk of having their identity stolen. Provide your employees with identity theft management by offering LifeLock.
Tags : 
best practices, identity theft, security, protection, business technology
    
LifeLock
Published By: Cox Business     Published Date: Dec 19, 2016
Exposing data or suffering downtime not only creates risks to patient safety, supports identity theft and damages the hospital's reputation, but can also result in signi?cant HIPAA penalties. The costs include the time your staff spends responding to the attack and lost productivity when systems are unavailable or work needs to be redone. Investing in computer and network security is a smart ?nancial decision for hospitals.
Tags : 
    
Cox Business
Published By: Symantec.cloud     Published Date: Oct 11, 2012
Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and records thousands per second.
Tags : 
symantec, internet security, malware, identity theft, data security, security, business technology
    
Symantec.cloud
Published By: LifeLock     Published Date: Feb 24, 2017
ID Theft impacts presenteeism, absenteeism, and productivity. Improve employee retention and engagement and help drive greater employee value through a high-touch benefit.
Tags : 
    
LifeLock
Published By: LifeLock     Published Date: Feb 24, 2017
If youíre not offering identity theft protection services as part of your portfolio, your competition could be.
Tags : 
    
LifeLock
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top