HIT Consultant Insightful coverage of healthcare innovation
 

crac

Results 1 - 25 of 34Sort Results By: Published Date | Title | Company Name
Published By: Pindrop Security     Published Date: Sep 24, 2018
With physical and online information security always growing stronger and harder to crack, fraudsters gravitate toward the weakest link in your security—your contact center and voice channels. For many years, our annual fraud reports have shown that fraudsters increasingly exploit the phone channel. Fraud rates continue to increase every year, and this year is no different. Between 2016 (1 in 937 calls) and 2017 (1 in 638 calls), the overall voice channel fraud rate increased by 47%, continuing on the upward trend from last year 113% increase.1 From 2013 through 2017 we have seen the fraud rate climb over 350%, with no signs of slowing down. It is important to note, that some verticals (i.e. Retail) experience even higher fraud rates than shown here.
Tags : 
    
Pindrop Security
Published By: OnForce     Published Date: Apr 22, 2007
“8 Ways Every Solution provider Can Profit from Rollouts Now” demonstrates how rollouts are creating strong sales opportunities for solution providers of all sizes. Importantly, it also addresses how solution providers have finally “cracked the code” of transforming this high-volume business, which is extremely service intensive, into a high-profit business via innovative on-site service delivery models that let them find the contract IT service professionals they need, right when they need them.
Tags : 
service model, roll-out, rollout, roll-outs, rollouts, customer service, var, vars
    
OnForce
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: MessageLabs     Published Date: Jan 13, 2009
New spamming techniques are upon us -  419 spam, botnets, CAPTCHA cracking – what’s next from the 'bad guys'? Spam remains the biggest email-born threat to businesses. Learn how to protect your business.  FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, secure network, block spam, spamming techniques, spam, business threat
    
MessageLabs
Published By: Jive Software     Published Date: Dec 02, 2014
Join Jive and Rajat Paharia -- "the father of gamification" -- for a discussion on how to better motivate, engage, and create true loyalty. Jive is digging into the hottest books in the social collaboration space. Join the Jive Book Club for exclusive invites to webinars with the authors, an invite to the Jive Community group to share your thoughts with your peers and the chance to win prizes – you might even learn something new! Their first selection is Loyalty 3.0: How Big Data & Gamification are Revolutionizing Customer & Employee Engagement by Rajat Paharia — the “father of gamification.” Loyalty 3.0 is a Wall Street Journal and New York Times best-seller that cracks the code on the ways big data and gamification can motivate, engage, and create true loyalty your customers, employees, and partners.
Tags : 
employee engagement, customer engagement, social collaboration, big data
    
Jive Software
Published By: Podium     Published Date: Dec 06, 2016
Getting your happiest customers to leave a review might seem difficult, but it’s easier than you might think. In our new ebook, Cracking the Code: Why online reviews matter to your business, we will show you how online reviews can improve local SEO, increase trust and loyalty with your customers, and ultimately boost your bottom line.
Tags : 
podium, customer insight, customer reviews, customer satisfaction
    
Podium
Published By: BrightEdge     Published Date: Nov 13, 2014
BrightEdge tapped into its massive Data Cube repository to provide a comprehensive view into the channels that drive traffic and the types of content that perform best. BrightEdge created this report to help brands understand the actual performance of site content by channel and by industry.
Tags : 
brightedge, content marketing, data analytics, marketing data, marketing platform, market intelligence, business intelligence
    
BrightEdge
Published By: Kinaxis     Published Date: Feb 13, 2019
This paper will highlight our five key findings to achieve more successful content marketing campaigns. Brands can use these insights pre-mid-and post-campaign to maximise marketing ROI.
Tags : 
marketing, digital marketing, marketing roi, content marketing, social media marketing, lead generation
    
Kinaxis
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: Delphix EMEA     Published Date: Jan 17, 2019
“In the rush to develop apps faster and deliver more, it’s easier than ever for things to fall through the cracks, like every hasty +1’ed dev/test environment creating a potential security minefield of unmasked sensitive fields. Without the right dev processes, it’s not just security that suffers. With the typical developer spending around 12-hours a week on tasks like setting up and configuring environments or relying on worthless fake data, productivity and quality often fall victim too. Download the Developer Confessions chapter to discover the biggest frustrations we hear from developers, how to balance access to data with data security, and proven ways to speed up developer productivity.”
Tags : 
    
Delphix EMEA
Published By: IBM     Published Date: Jan 05, 2015
As the number of connected devices grows from billions to hundreds of billions, and as governments and corporations race to take control of devices and data, we need to save the Internet of Things (IoT). Successfully scaling the IoT means executives must rethink the technology strategy.
Tags : 
it strategy, modern computing, iot, cost of computing
    
IBM
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : 
pdf protection, data security, password protection, hacker prevention
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do Passwords Really Protect Your PDFs? Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: • Lose data when colleagues share passwords with others, especially through email. • Face risk by not knowing if an unauthorised person has accessed your files. • Have clients’ PDF files cracked by hackers in minutes.
Tags : 
password protection, account management, document protection, data protection, data management, password vulnerability, encryption, data integration
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : 
data security, passwords, password protection, data vulnerability
    
Citrix ShareFile
Published By: Pega     Published Date: Sep 11, 2015
Download Dynamic Case Management For Dummies, and: -Get to know DCM, software that helps people get work done to optimal outcomes -Expect the unexpected — DCM improves the efficiency of both planned and unplanned work -Improve customer experience — DCM manages work across silos and ensures that nothing falls between the cracks -Bring DCM to your business — discover how you can use DCM to lead change in the enterprise
Tags : 
    
Pega
Published By: Concur ENT     Published Date: May 11, 2018
VAT rules can be complex, HMRC – a gauntlet. In this eBook, we demystify some of the facts around compliance, tax and expense management. The British economy has gone from boom to bust. The recession followed by a long period of austerity and caution has altered spending behaviours while the government has increasingly cracked down on tax evasion and fraud. HMRC has become more focused on assisting businesses of all sizes to comply with their policies and implement good governance when it comes to finances. Nevertheless, the reality can sometimes be confusing and the penalties for getting it wrong – severe. Many businesses outsource their tax management to experts or muddle through, running the risk of non-compliance. There’s a real need for unambiguous, helpful advice about expenses, VAT and HMRC compliance. We’ve created this guide to help shine some light on the processes, practices and behaviours around tax and expenses based on some of the frequently asked questions we receive. Wh
Tags : 
    
Concur ENT
Published By: Oracle     Published Date: Sep 30, 2019
In the past, B2B transactions occurred in face-to-face meetings as a sales professional worked a product demo, business luncheon, or boardroom presentation to influence a customer – and close the deal. Today, however, B2B stakeholders perform much of their product and service research online. In fact, 93 percent of B2B buying starts with online searching, according to a Pinpoint Market Research study. This research occurs long before a customer engages with sales. As your prospects research and evaluate your offerings, they leave behind valuable clues to their intent. Understanding these clues – cracking the code – can help you tailor your messages to them, thereby providing them a more tailored, relevant experience. As a result, business-savvy marketing and sales departments have embraced marketing automation platforms, so their respective teams can work together on one common platform, reach B2B customers online, and drive revenue. Marketing automation platforms automate repetitive
Tags : 
    
Oracle
Published By: HP Inc.     Published Date: Apr 11, 2018
HP scientists had a bright idea. If they could modify materials to absorb infrared light – the light we can’t see – they could successfully fuse color to that material. It’s a story of how HP “cracked the code” in 3D color printing by drawing upon deep experience in the science of ink. Read this innovation story to why HP Jet Fusion 300/500 3D printers make it possible to produce engineering-grade functional parts faster and more affordably. Download HP’s innovation story
Tags : 
    
HP Inc.
Published By: HP Inc.     Published Date: Jun 12, 2018
HP scientists had a bright idea. If they could modify materials to absorb infrared light – the light we can’t see – they could successfully fuse color to that material. It’s a story of how HP “cracked the code” in 3D color printing by drawing upon deep experience in the science of ink. Read this innovation story to why HP Jet Fusion 300/500 3D printers make it possible to produce engineering-grade functional parts faster and more affordably. Download HP’s innovation story
Tags : 
    
HP Inc.
Published By: MeQuilibrium     Published Date: Aug 01, 2019
Skills shortages are keeping business leaders up at night. In fact, nearly half of executives say this skills gap is a major concern for the future of their organization — yet only 3% are significantly increasing training budgets. Why? Workplace learning is a difficult nut to crack. Organizations often struggle to reskill their adult workforces with hard skills because they’re taking the wrong approach. In this white paper, we take a look at why soft skills are not only integral for the future of work, but why they’re actually necessary for developing hard skills too. You’ll also learn: ? How soft skills can lead to dramatic shifts in how people think ? How soft skills improve our ability to learn ? The most important skill for the 21st century — and how it can boost learning by 30% Discover why empowering your people with soft skills is critical to unlocking the future success of your business. Download Now
Tags : 
    
MeQuilibrium
Published By: Intel     Published Date: Jul 17, 2019
The need for identity protection has never been stronger. Identity theft accounted for 74 percent of all data breaches in the first half of 2017, and costs associated with cybercrime are expected to reach $6 trillion annually by 2021. Any time an employee's username and password are compromised, your business is vulnerable. Eight-character passwords that changed every 90 days worked well a decade ago, but increasingly commonplace attack methods like password cracking, phishing, or screen scraping call for a new kind of protection.
Tags : 
    
Intel
Published By: Viavi Solutions     Published Date: Sep 30, 2016
Located in the English Midlands, the Leicestershire County Council enjoys a strong national reputation for doing things differently and achieving results. In 2009, it was named Council of the Year - the first County Council to achieve such an accolade and despite the tough economic climate, it continues to deliver high-quality services to the people of Leicestershire. Seen as a trailblazer in many areas, the Leicestershire County Council leads the way in working with troubled families. In partnership with the National Health Service, police, district councils, and others, the council has provided services for these families in need, while cutting bureaucracy and reducing costs. Like most public services, Leicestershire County Council has faced the ongoing financial challenge of government funding reductions. As a result, the council has taken early action to find efficiency savings and new ways of working.
Tags : 
    
Viavi Solutions
Published By: SAS     Published Date: Mar 14, 2014
This paper will discuss the barriers to data-driven decision making for midsized businesses, and how experts and non-experts alike can use SAS Visual Analytics to unlock the value of data – including big data – to increase revenue, cut operational costs and better manage their business.
Tags : 
sas, bottom line, midsized businesses, leveraging data, data management, internal and external, decision making, big data
    
SAS
Published By: Shape Security     Published Date: Sep 16, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security
Published By: Aldon     Published Date: Jan 13, 2009
Automate compliance to reduce bureaucracy and boost efficiency.
Tags : 
aldon, application lifecycle management, alm, automate compliance, reduce bureaucracy
    
Aldon
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.