HIT Consultant Insightful coverage of healthcare innovation
 

identity protection

Results 26 - 50 of 84Sort Results By: Published Date | Title | Company Name
Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss, data security standard, data encryption, access controls, activity monitoring, logging, retail, merchants, cardholder data
    
ArcSight
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: SafeNet     Published Date: Jun 04, 2013
This paper uncovers the key strategies that banks can employ in order to effectively and efficiently combat today's threats, and ensure identity and transaction security in eBanking.
Tags : 
ebanking, identity protection, transaction protection, authentication
    
SafeNet
Published By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing
    
Secure Computing
Published By: LifeLock     Published Date: Feb 24, 2017
The essential employee benefit is identity theft protection. If you want to attract and retain the best talent and help protect them from identity theft, include the best employee benefit.
Tags : 
    
LifeLock
Published By: LifeLock     Published Date: May 31, 2012
With LifeLockģ identity theft protection as part of your employee benefits package, you can differentiate your company from your competition and better retain top employees.
Tags : 
    
LifeLock
Published By: LifeLock     Published Date: Jul 31, 2012
With LifeLockģ identity theft protection as part of your employee benefits package, you can differentiate your company from your competition and better retain top employees.
Tags : 
lifelock, human resources, identity protection, benefits, solutions
    
LifeLock
Published By: Actimize     Published Date: Oct 10, 2007
According to the results of Actimize's 2007 Employee Fraud survey, which was managed by Infosurv, an independent research company, financial services institutions know that they have a significant and growing problem with employee fraud and are not fully prepared to handle the threat as attacks from organized crime, dissatisfied staff and financially distressed employees become more sophisticated.
Tags : 
auditing, audit, finserve, finserv, financial services, data theft, identity theft, data protection, id theft, employee, ex-employee, ex employee, fraud, employee fraud, actimize
    
Actimize
Published By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : 
security, security management, access control, identity management, data protection, email security, iam, authentication, instant messaging, tracking, workforce, workforce management, employee management, deep software
    
Deep Software
Published By: LifeLock     Published Date: Jan 17, 2018
Download this whitepaper for a few tips that brokers can benefit from. In this article, Dennis Connor III, vice president of voluntary benefits for Tompkins Insurance Agencies in Batavia, New York, discusses his views on how benefit brokers can be more effective in positioning identity theft protection with their clients.
Tags : 
    
LifeLock
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, itís online fraud to the highest degree. Although itís been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: LifeLock     Published Date: Aug 23, 2016
The impact of data breaches and identity theft on a business cannot be overstated. Offering identity theft protection is one solution. Discover how to help protect your business and your employees if they have a non-employer related fraud attack.
Tags : 
best practices, identity theft, security, protection
    
LifeLock
Published By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: Perimeter     Published Date: Jul 17, 2007
Download this free paper about read about identity protection services and how it can help fortify the trust that customers place on their Financial Institutions.
Tags : 
financial institution, privacy, consumer, consumer privacy, data protection, cardholder data, pci, compliance, security, personal data, perimeter, phishing, pharming, perimeter esecurity
    
Perimeter
Published By: Intel     Published Date: Jul 17, 2019
The need for identity protection has never been stronger. Identity theft accounted for 74 percent of all data breaches in the first half of 2017, and costs associated with cybercrime are expected to reach $6 trillion annually by 2021. Any time an employee's username and password are compromised, your business is vulnerable. Eight-character passwords that changed every 90 days worked well a decade ago, but increasingly commonplace attack methods like password cracking, phishing, or screen scraping call for a new kind of protection.
Tags : 
    
Intel
Published By: LifeLock     Published Date: May 17, 2012
Offering employees proactive identity theft protection from LifeLock is an affordable way to satisfy top talent. This guide will help you understand the realities of identity theft today, its impact on your workplace and how giving employees a benefit they value can help safeguard retention, productivity and peace of mind.
Tags : 
lifelock, identity theft, security, technology, it protection, identify protection, authentication, fraud
    
LifeLock
Published By: LifeLock     Published Date: Aug 23, 2016
In an always-on, ever connected world, the risk of identity theft is real. There is a new identity fraud victim every two seconds. LifeLock identity theft protection helps safeguard against identity fraud by monitoring millions of transactions per second provide services that remediation-only or credit monitoring-only services donít offer Ė with no benefit deductible or service co-pay.
Tags : 
best practices, identity theft, security, protection
    
LifeLock
Published By: LifeLock     Published Date: May 10, 2016
ID theft has escalated to an all-too-possible nightmare that involve weeks, if not months, to resolve. Download this practical comparison guide to learn what are challenges exist and the key benefits for businesses to look for in selecting a partner. Compare now!
Tags : 
    
LifeLock
Published By: Key Private Bank     Published Date: Aug 23, 2017
"The latest Key Private Bank whitepaper takes a deeper look at the types, methods and impacts of fraud and identity theft - and how you can prepare and protect your family and your wealth from this growing threat. ©2017 KeyCorp. E89861 170620-248192"
Tags : 
identity theft, fraud, wealth protection, fraud prevention, prepare, cybercrime, cyberattack, phishing, types of fraud
    
Key Private Bank
Published By: CA Technologies     Published Date: Jan 09, 2015
This white paper focuses on new ways to help and protect the Business and shows new trends which have changed the demands on IT organizations and the business. The world of IT has changed dramatically over the past 1-2 years, as cloud and mobility have changed the demands on IT organizations and the business. As a result, IT must evolve how it interacts with the business to help the business grow and succeed.
Tags : 
identity-based security, business protection, identity, security solutions, new trends to secure business
    
CA Technologies
Published By: Intel     Published Date: Aug 10, 2012
Learn about Intel IPT with Public Key Infrastructure including protected transaction display as well as One Time Password (OTP).
Tags : 
it management, remote diagnoses, reimaging, pcs, intel, enterprise security, save time, save money, cloud computing, virtualization
    
Intel
Published By: Symantec     Published Date: Apr 09, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Published By: Symantec     Published Date: Apr 09, 2012
This white paper explains the licensing and proper use of Symantec SSL Certificates for securing multiple Web servers and/or multiple domains and subdomains in the network configurations.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign
    
Symantec
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.