Loading...

Follow IT Security Central on Feedspot

Continue with Google
Continue with Facebook
or

Valid

Perhaps because of their incredible scope or their shocking prevalence, data breaches are creating a lot of buzz right now. It seems that a new event happens every week, and even though companies rightly fear an attack from an external source, internal threats pose a hidden risk, accounting for a substantial number of data breaches. […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

How employee monitoring software could have prevented the expensive and embarrassing 1MDB scandal It’s been a tough month for Goldman Sachs. The bank is engulfed in the 1MDB scandal that has sunk its stock price and significantly damaged its prestigious status in the financial sector. It’s a lurid tale with all the accouterments and trappings […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Understanding the Real Purpose of Employee Monitoring Software   Technology is an intricate and inextricable part of the modern workforce. It enables fresh opportunities, invites in new markets, and encourages innovation. In 2018 and for the foreseeable future, it remains the conduit for building compelling companies. Of course, that reality has all kinds of caveats. […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

By Isaac Kohen, published in Help Net Security  Is your security approach exposing your organization to risk? The answer is “yes” if your security strategy focuses exclusively on external threats. If the breaches of the last 24 months have taught us anything – it’s that insider threats are a cause for equal if not greater concern. In […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

As is the case with any call center, success largely depends on a company’s ability to deliver great customer service in a high-stress environment. To out-service the competition, businesses need a way to maximize their call center agents’ performance, have them respond to customer complaints rapidly, increase engagement and improve the overall quality of service […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Failing to protect your business’ data could have serious repercussions for your brand By Isaac Kohen, published in TechRadar  After decades of an eager and unbridled embrace of the online ecosystem, companies and consumers are becoming painfully aware of the vulnerabilities associated with the digital age. A superfluous series of high-profile data breaches, cases of […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

As we are quickly approaching the end of 2018, the prevalence and pervasiveness of data breaches are at an all-time high. As Wired reported earlier this year, “Corporate security isn’t getting better fast enough, critical infrastructure security hangs in the balance, and state-backed hackers from around the world are getting bolder and more sophisticated.” October is […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

In almost every way, technology and computing have never been more integral to the business experience. Companies accumulate and respond to the deluge of data created by the digital age, and employees navigate an online ecosystem to connect with clients, peddle products, and communicate with one another. To be sure, this transition to a digital-first […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

In case you haven’t had time to keep up with the latest cybersecurity statistics, we’ve created this list to help you get ready for 2019. The 30 Cybersecurity Stats that Matter Most 87% of organizations said they need up to 50% more budget for cybersecurity. Unfortunately, only 12% believe they will get an increase over […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Data Loss Prevention – DLP – software can depict a very traditional technology depending on who you ask. But what does it mean to the enterprise in 2018? How is it performing to meet the ever-evolving threats beyond what’s hitting global companies right now that are causing data breaches and enabling insider threats to cause […]
Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview