All Posts (2226)

Sort by

Mobile devices are actively integrated into business processes. Companies have more and more business applications and mobile devices. Employees increasingly bring their own equipment to the workplace (BYOD policy – Bring Your Own Device) and gain ac

Read more…
Views: 137
Comments: 0

How to Combat Mobile Risk Fraud

Key Highlights Of the Report 

  • Correlate device and account risk factors across online and mobile channels
  • Stop account takeover attacks from mobile devices using stolen credentials
  • Capture persistent device ID, geo-location and detailed device risk fact
Read more…
Views: 13
Comments: 0

The 10 Commandments of BYOD

The rapid proliferation of mobile devices entering the workplace feels like divine intervention to many IT leaders. It’s as if a voice boomed down from the mountain ordering all of the employees you support to procure as many devices as possible and

Read more…
Views: 166
Comments: 0

The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In a

Read more…
Views: 139
Comments: 0

Top 10 Mitigation steps in information security

A simple 4-step model to information security

  1. Maintaining & Monitoring IT resource/asset integrity 
  2. Preparing & Limiting damage/loss in the course of attack
  3. Proper Access control/Authentication & Authorization
  4. Secure Data Communication

Top 10 ste

Read more…
Views: 8
Comments: 0