Posted on 24th Dec 2012 by Gemalto
Happy holidays! By now you have likely bought the gifts, sent the cards, and decorated the house. Before we know it, 2013 will be here. But before we look ahead to the New Year, let’s take a moment to look back over 2012. And what a year it was! Looking over our blogs, 2012 was [...]
Posted on 7th Sep 2012 by Ken Abbott
In his iconic role as cop John McClane, star of the Die Hard series, Bruce Willis became renowned for foiling the antics of some of Hollywood’s most notorious bad guys. But, according to recent reports, Bruce has now set his sights on an altogether different opponent. A number of news organisations across the globe have [...]
Posted on 21st Feb 2012 by Ken Abbott
Most of us have more than one life. If this sounds strange, I’m referring of course to the digital life that more and more of us subscribe to every day. But when our time comes to an end, the question of what happens to our digital assets is an increasingly important question. Personally, I have my Twitter, [...]
Posted on 8th Dec 2011 by Ken Abbott
Santander Universities Global Division develops innovative new technlogies, including university smart cards. Vicente Prior de Castro describes the multiple uses for these ID cards, including the latest innovation, EMV contactless payment.
Posted on 1st Sep 2011 by John Ahlberg
Using secure eBanking devices reduces online fraud because a hacker cannot access (or take) money from your online banking accounts using only your stolen login information. The hacker would also need the device, a smart bankcard and reader or a secure USB token. Still not convinced you should use secure eBanking devices? Read on!
Posted on 22nd Aug 2011 by Ray Wizbowski
In light of all the recent cyber attacks costing companies money, reputation and customer trust, stronger security and additional layers is increasingly becoming top of the shopping list for IT professionals. But there is still some confusion as to what are the best security elements that need to be in place to provide the best [...]
Posted on 21st Jul 2011 by John Ahlberg
In the last of our series of online banking infographics we show our ten steps for implementing a secure service. The most important step is to properly plan their deployment taking into account not only the technical constraints but also employee and customer communication.
Posted on 13th Jun 2011 by Ray Wizbowski
Fujitsu recently launched a biometric authentication technology which it claims can identify one individual out of data from a million people. Taking under two seconds to complete both fingerprint and palm vein recognition the system appears largely foolproof. But do we really need this level of biometrics?
Posted on 10th Jun 2011 by Michael Magrath
It is critical that consumers are certain that the site they visit is the one they intended to access. A new policy signed by the Obama Administration will change the way we do business on the internet.
Posted on 1st Jun 2011 by Ray Wizbowski
In an increasingly digital and cloud-based world, as we hand over our relationship status and birth dates to Facebook, log our whereabouts on Twitter and Foursquare, upload our photos to Flickr and work off the corporate network from an airport, café or at home, there is one thing we refuse to let go of: gadgets.