Posts tagged for “Identity theft”

Executive Conversations

Sometimes the Best Offense is a Good Defense

June 12th, 2019

In evaluating the data from the 2019 Unisys Security Index™, which was just released today, it shows that security concerns remain at a historically-high level around the world. Since its inception in 2007, the Unisys Security Index has provided a statistically-robust measure of concern about security in four major categories: national, financial, internet and personal.

Continue reading...

Financial Industry Insights

Banking on the Go: Security Face-off

September 12th, 2014

Banks need a highly reliable customer-centric mobile security solution which is not just limited to a device. Find out more on the top two threats facing banks in the mobility space and how they can keep ahead of cyber-rookies.

Continue reading...

Security

Theft by Hacking: Three of the Top Six Threats (Part I)

September 13th, 2011

How do you stop hackers from getting past ineffective legacy barriers and pwning your organization’s sensitive data? Discussed here are three of six principal threats IT faces from hackers.How do you stop hackers from getting past ineffective legacy barriers and pwning your organization’s sensitive data? Discussed here are three of six principal threats IT faces from hackers.How do you stop hackers from getting past ineffective legacy barriers and pwning your organization’s sensitive data?How do you stop hackers from getting past ineffective legacy barriers and pwning your organization’s sensitive data?

Continue reading...

Security

The Unseen Dangers of Knock-off Mobile Devices

March 14th, 2011

L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.L.A. Port Police seized more than $10 million in counterfeit iPods, iPhones.

Continue reading...

APAC Voices

National Consumer Fraud Week Takes Scams Personally

March 8th, 2011

Few IT managers understand that there is a veritable service gap with regard to service management. And fewer still know what causes it and how to bridge it. Closing the gap starts by merging the right people and roles into teams and combining this team with a strong process that provides project and initiative clarity.

Continue reading...