Imagine a library whose doors are locked every night. But one night, a burglar manages to sneak in. All the books and manuscripts are gone, right? What if it can’t happen in this library? What if the books themselves are locked down, and the ones the robber does manage to
Tag: data security
New Research Reveals: Consumers Crying out for Better Personal Data Security in Call Centres
Do you know six million consumers end relationship with organizations each year due to call centre security concerns? Do you know multiple security passwords are more of a pain to consumers? Banks top the list of organisations consumers trust least with their personal data, according to a survey conducted by Avaya,
Mac security: How to protect your data, and stay malware free
In the past few years, there's been increasing interest in malware targeting Apple Macintosh users. Fake antivirus programs like Mac Defender, and its variants, were spotted about five years ago. Just last year, Mac users were quaking in their boots after the Flashback Trojan appeared to have a huge infection base.
Samsung gets serious about data security with KNOX
The word “Knox” usually brings up images of Fort Knox — that impenetrable fortress of solitude that has served as the Department of the Treasury’s Bullion Depository. So, naming an app that’s sole purpose is to secure data from prying eyes is apropos. Once you understand the specific purpose of
10 security best practice guidelines for businesses
Businesses need extreme security measures to combat extreme threats. Here are 10 best practices that provide defense against the majority of all security threats. More>>
SQL Injection Attack
No cyber criminal (that we know of) has stolen more credit cards than Albert Gonzalez. Originally indicted by a federal grand jury for breaking into T.J. Maxx’s credit card processing operations, Albert Gonzalez and his team are accused of criminally hacking some of the best-known companies in America including; Dave
15 Crucial Data Security Tips For Young Entrepreneurs
Considerations for Using Tokenization to Mask Your Sensitive Data
When companies think of protecting sensitive data, they are most likely to think of encryption as the means to obfuscate the real data. Tokenization can be a good alternative to encryption in some cases, or it can be a complementary solution that works with encryption to provide a very high
Addressing Data Security Challenges in the Cloud
Though virtualizing and pooling IT resources in the cloud enables organizations to realize significant cost savings, these benefits cannot be unlocked without addressing new data security challenges posed by cloud computing. More>>