MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CRM
June 2015
Leonard Klie
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information mark for My Articles similar articles
InternetNews
February 26, 2010
CyberSource, ThreatMetrix Team for ID Security In an effort to stay a step ahead of the scammers, firms team up to develop sophisticated new identity protection applications to help Internet retailers combat online fraud. mark for My Articles similar articles
Entrepreneur
October 2006
Melissa Campanelli
Plug and Pay Credit cards aren't the only way to pay online these days. mark for My Articles similar articles
InternetNews
August 18, 2009
Enterprise App Developers Use Insecure Data Credit card numbers, customer information, and even employee records are inadequately protected in development environments, according to a new report. mark for My Articles similar articles
Bank Systems & Technology
May 3, 2005
Deena M. Amato-McCoy
Creating Virtual Value By integrating business channels, consolidating customer histories and beefing up security, banks are improving their online offerings to provide customers with all the conveniences of branch banking in the comfort of their own homes. mark for My Articles similar articles
Bank Technology News
June 2004
Karen Krebsbach
Firms Flirt with Out-of-Band Authentication Banks weigh whether this cumbersome technology is worth the bother for consumers, particularly for on-line banking. mark for My Articles similar articles
PC Magazine
April 19, 2006
Robert Lemos
Password Policies A simple password could be the weak link that leaves your data open to attack. mark for My Articles similar articles
InternetNews
September 25, 2009
Companies Still Not Securing Customer Data New data security survey finds 71 percent admit that cost and lack of resources keeps them from making data security a top priority. mark for My Articles similar articles
PC Magazine
September 15, 2003
Sebastian Rupley
What's My Name? Do you keep a list of your user names and passwords in your wallet or PDA? If so, you're not the only one who can't remember them all. mark for My Articles similar articles
InternetNews
March 11, 2010
IBM Tops In Customer Privacy: Poll A survey of consumers and businesses places IBM at the top of the list among technology companies in protecting consumer data and privacy. mark for My Articles similar articles
InternetNews
December 17, 2004
Brian Livingston
Protect Your Passwords The plunging cost of memory gives rise to a possible solution to the password-recall problem. mark for My Articles similar articles
PC World
November 2003
Kandra & Brandt
The Great American Privacy Makeover An exclusive PC World survey reveals that even savvy Web users can do more to safeguard their privacy and data. Take the quiz and find out how vulnerable you are; then use our tips to improve your score. mark for My Articles similar articles
InternetNews
March 26, 2010
Survey: Security is the Top Priority for CEOs Study finds that 76 percent of C-level executives now say that securing their business-critical apps is the most important aspect of their data protection program. mark for My Articles similar articles
The Motley Fool
January 27, 2006
Tom Taulli
Investors Go to the CyberSource It's a dangerous world for e-commerce players. That's good news for this secure payment system provider. Investors, take note. mark for My Articles similar articles
The Motley Fool
June 18, 2011
Anders Bylund
How to Thwart Digital Thieves and Stay Safe Online You wouldn't give your keys to a stranger on the street, right? Then don't do it online. mark for My Articles similar articles
InternetNews
December 23, 2004
Brian Livingston
Protect Your Passwords -- Part 2 USB keys may free us from having to remember passwords at all. mark for My Articles similar articles
PC World
April 2003
Anne Kandra
Consumer Watch: Manage Passwords Safely -- and Simply Plagued by a plethora of passwords? Here's how to deal with them without driving yourself nuts. mark for My Articles similar articles
Bank Technology News
November 2007
Online Fraud Rates Stay Steady CyberSource estimates that fraudsters will siphon about $1.3 billion in fraudulent Internet credit card transactions this year, a 20% increase over the amount they got in 2006. mark for My Articles similar articles
InternetNews
February 2, 2010
Reusing Online Banking IDs Common, Risky Seventy-three percent of more than 4 million people surveyed by security firm Trusteer admit they use the same password on social networking sites like Facebook that they use for their online banks. mark for My Articles similar articles
InternetNews
March 3, 2010
Financial Services Firms Ripe for Data Attacks Study finds porous data protection policies and technologies are putting millions of customers - and their assets - at risk. mark for My Articles similar articles
InternetNews
July 13, 2009
Report: 85 Percent of U.S. Businesses Breached A new report has a recommendation for organizations that fear a breach and the reporting requirements that go with it. mark for My Articles similar articles
InternetNews
November 19, 2009
Web 2.0 Makeover Poses Big Risks for Gov't: Study Seventy-nine percent of government IT honchos surveyed say popular collaboration tools and cloud-computing options will put even more data at risk. mark for My Articles similar articles
InternetNews
January 12, 2011
Hacker to Expose Wi-Fi Flaw Using Amazon EC2 At next week's Black Hat conference, a security expert reportedly plans to divulge method for breaking wireless networking passwords through brute force attack. mark for My Articles similar articles
Wall Street & Technology
April 27, 2005
Jim Middlemiss
CIO Challenge: Two-Factor Authentication The rising incidence of account hijacking and identity theft has created a challenge for financial organizations that want to secure their data, but still allow clients and staff to conduct transactions online. Two-factor authentication may provide a solution. mark for My Articles similar articles
Search Engine Watch
June 26, 2010
Johnny Widerlund
9 Ways to Control Your Privacy on Social Media Sites A look at the top ways online security experts say you can restore or maintain your privacy on social networking sites. mark for My Articles similar articles
Bank Technology News
April 2007
Holly Sraeel
In the U.S., Privacy Isn't Always Convenient, Or Wanted While banks nationwide wrestle to comply with state privacy and breach notification laws, the TJX phenomenon brings the issue of consumer privacy into sharper focus: If Americans are inconvenienced in any way, they'll forgo privacy. mark for My Articles similar articles
InternetNews
July 9, 2009
Alex Goldman
Breaches Hit 70% of UK Enterprises, Study Finds A new report highlights the importance of having an enterprise-wide data security strategy. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
CFO
May 15, 2012
David Rosenbaum
Costs of Data Breaches Drop In March, the Ponemon Institute, an independent research center that examines privacy, data protection, and information-security policies, reported the first decline in at least seven years of both the organizational cost of data breaches and the cost per lost or stolen record. mark for My Articles similar articles
Bank Technology News
May 2005
John Adams
Security: Voca Tackles The Threat Within UK-based electronic payments engine Voca deploys a password management platform that automates control over access, in an attempt to stave off security breaches from inside the enterprise. mark for My Articles similar articles
InternetNews
January 30, 2004
Ryan Naraine
IE Patch Could Disrupt E-Commerce A planned fix for URL spoofing browser flaws could return error messages on Web sites that use clear text to authenticate user names and passwords. mark for My Articles similar articles
InternetNews
December 30, 2009
Twitter Blacklists 370 Shoddy Passwords To protect its users from themselves, Twitter is preventing new users from selecting some common or easily hacked passwords for their accounts. mark for My Articles similar articles
National Defense
December 2010
Eric Beidel
Cybersecurity Threatened By Common Password Buster GTRI researchers have proven that an inexpensive graphics processing unit (GPU) can bust passwords at the speed of a $100 million supercomputer. mark for My Articles similar articles
PC Magazine
November 2, 2004
Neil J. Rubenking
Revealing Passwords The passwords saved on your computer are more vulnerable than you think. mark for My Articles similar articles
T.H.E. Journal
August 2001
Joyce Lambert
New Aspects of Test Security Have you ever considered the new ways in which your tests are vulnerable to unauthorized access if you store your test files on an office or home computer? mark for My Articles similar articles
Bank Systems & Technology
March 5, 2010
Penny Crosman
Most Banks Lack Key Data Privacy, Security Controls A Ponemon Institute study finds that while most financial services firms take some steps toward data security, many come up short in critical areas. mark for My Articles similar articles
PC World
October 2003
Scott Spanbauer
Can You Pass the PC World Password Safety Test? Password rules and tools; clear your passwords; cache news to read offline; update your media players. mark for My Articles similar articles
PC Magazine
November 30, 2005
Neil J. Rubenking
Managing Password Manager How to prevent the Password Manager from automatically entering a password within Firefox after you have given it permission to do so. mark for My Articles similar articles
PC Magazine
August 31, 2010
Eric Griffith
Password Protection: How to Create Strong Passwords Every password you have is important. Every one. Here's how to make your passwords uncrackable. mark for My Articles similar articles
Wall Street & Technology
June 18, 2007
Melanie Rodier
US Businesses Still Lack Adequate Security to Protect Client Information Study shows 85% of midsize to large businesses spanning all industries reported data security breach, mostly due to stolen equipment. mark for My Articles similar articles
CRM
May 2015
Leonard Klie
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. mark for My Articles similar articles
PC World
March 2004
Andrew Brandt
E@4#N or E@4#W? How to Remember Strong Passwords Tips for creating and keeping track of a passel of passwords. mark for My Articles similar articles
Fast Company
John Paul Titlow
Google Is Gearing Up To Kill Your Email Password The company is testing a new, multi-device method for letting people log into their accounts without using a password, according to TechCrunch. mark for My Articles similar articles
Wall Street & Technology
November 6, 2006
Cory Levine
Slacking on Security Information security solution vendor Cyber-Ark reports that passwords with administrator-level permissions are too common at most firms, creating security loopholes. mark for My Articles similar articles
Entrepreneur
March 2009
Lindsay Holloway
Pin Down Your Passwords As your password collection grows unruly, look to these password tools to manage them all. mark for My Articles similar articles