Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

data breach

Results 201 - 225 of 403Sort Results By: Published Date | Title | Company Name
Published By: Debix     Published Date: Jun 30, 2008
Fraud preventative solutions are designed to avert new accounts fraud before it occurs. The strategic advantage of fraud prevention therefore lies in the ability avoid losses to institutions and consumers.
Tags : 
database security, pci, pci-dss, compliance, pci compliance, data protection, identity theft, hacker detection, hack, hacking, debix, intrusion detection, intrusion prevention, customer relationship management, customer service, customer experience management
    
Debix
Published By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : 
javelin, debix, customer service, customer experience, damage control, data breach, security breach, network security, intrusion detection, intrusion prevention, customer relationship management, customer experience management
    
Javelin Strategy & Research
Published By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : 
netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection, compliance, intrusion detection, data protection
    
NetIQ
Published By: RSA     Published Date: Aug 28, 2014
Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.
Tags : 
data breach, data access, governance, risk, prevention, security, data management
    
RSA
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Users Beware: 10 Security Tips to Share with Your Users - ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to IT admins to share with users so they are more aware of the security traps they face every day.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, network security, small business networks
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, malware, viper
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
It’s Time Businesses Wake up to the Mobile Security Reality - Bring Your Own Device (BYOD) is here to stay, and so are the associated risks. IT administrators face a new reality: pressure to account for, manage and secure an array of new endpoints. It's a giant task given the influx of smartphones and tablets, and the corresponding employee expectation - if not outright demand - for connection to the office at all times.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, mobile, byod
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
According to the report ‘Trail Blazers’ “hold the power to dethrone the current market leaders…[and] often shape the future of technology with their innovations and new product designs.” VIPRE was evaluated alongside nearly a dozen endpoint security products and was called a “highly capable solution for small and midsize enterprises with advanced needs that are looking for a solution that is easy to manage and deploy.”
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, mcafee
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
South Staffordshire College: A U.K. college with 4 campuses, 4,000 students and 500 employees became frustrated with its Kaspersky antivirus and discovered that VIPRE proves robust malware defense doesn’t have to disrupt operations, slow down machines or be difficult to manage.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, kaspersky
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Stillwater Medical Center: Healthcare provider with 1,000 employees chooses VIPRE after its old antivirus kept crashing systems, disrupting operations and failing to protect against malware infections. Learn how this hospital cured its antivirus ills with VIPRE.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, hospital
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
AtNetPlus - As an IT services company on the front lines of network defense, AtNetPlus takes choosing antivirus software very seriously. After rigorous testing of multiple antivirus products, their IT specialist chose VIPRE for its small footprint and reliable malware detections.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, atnet
    
ThreatTrack Security
Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
The way attackers are going after corporate data and infrastructure these days means that it’s not a matter of if, but when you’ll be forced to buy a ticket for the post-breach rollercoaster. But a little preparation and planning can go a long way toward making the ride as manageable and inexpensive as possible. This eBook walks you through how to get started on planning and executing an incident response for your business.
Tags : 
data breach, cyber-attack, cloud, post-breach, breach, hosting, response plan, security, it management, migration, network security, remote access, cloud computing, content management
    
INetU Managed Hosting
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery, backup and recovery, disaster recovery, data protection, database security, data loss prevention
    
Code42
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Securely store and share your firm's and your clients' tax information data. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Do you know why data encryption is important for your accountancy firm? Read this eBook to learn how using advanced encryption allows you to: • Protect your data and reputation while meeting clients’ cybersecurity expectations • Eliminate paperwork and other bothersome or time-consuming processes associated with data storage and sharing • Comply with regulations and ethics codes
Tags : 
encryption protection, data security, data management, customer protection, data breach, it security, firewall, password protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 19, 2017
Do you know why data encryption is important for your firm? Read this eBook to learn how using advanced encryption allows you to: • Avoid costly security missteps, leaks, and hacks. • Protect your firm's reputation while meeting clients' cyber security expectations. • Eliminate paperwork and other time-consuming processes associated with data storage and sharing.
Tags : 
data security, data breach, data encryption, data compliance, accounting, data protection
    
Citrix ShareFile
Published By: Canon Solutions America     Published Date: Feb 28, 2019
90% of enterprises have suffered a data breach from an unsecured printer,1 and there are many other places in your organization where data can be vulnerable. Learn how to help protect your data everywhere it lives with this free Security Primer.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Mar 28, 2019
Today’s data breaches are planned and executed with military precision. This Security Brief reveals how cybercriminals can get in and out of your network without being detected. It also gives you tips for helping secure your data, documents, and devices.
Tags : 
canon security solutions, security printing, secure printing, print security, secure print solutions, secure printing, secure documents, document security, network printer security, printer security risk, secure mobile printing, document management system, enterprise document management system, dms system
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: May 15, 2019
A data breach can erode public trust and jeopardize your transformation. But in a Center for Digital Government survey, only 26% of respondents were very confident their print environment is secure. Learn where your organization may be vulnerable.
Tags : 
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Jul 15, 2019
It’s hard to imagine running a school without printers and multifunction devices. But you should know they can put your students’ personal data at risk. Learn how you can help your school avoid the financial, legal, and social consequences of data breach.
Tags : 
    
Canon Solutions America
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search