Posts Tagged ‘strong authentication’

Trend alert: events are going cashless with payment wristbands


Posted on 24th Jun 2015 by in Financial Services

Contactless payments are surging in popularity, and a new wearable is joining the lineup: the wristband. Major events across the globe have started using contactless wristbands to make transactions easier, faster, and more fun for attendees and merchants alike. These wristbands are designed with embedded contactless technology that can securely link to a user’s payment card information. The user […]

Has your business unwrapped mobile security threats over the festive period?


Posted on 12th Jan 2015 by in Enterprise Security

With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help businesses ensure they haven’t unwrapped mobile security threats over the festive period.

[Report] 77% of SMB IT pros cite employees as weakest link in Cloud security


Posted on 19th Nov 2014 by in Enterprise Security

When it comes to cloud security, what are the pressing concerns of IT pros at SMBs?  We went straight to the source – IT professionals at SMBs – and asked them. Our colleagues at CloudEntr, with the help of the Spiceworks IT community, recently surveyed 430+ IT pros to find what SMBs were really thinking about the […]

Why Microsoft isn’t to blame for Home Depot’s breach: an appeal for strong authentication


Posted on 14th Nov 2014 by in Enterprise Security

Home Depot dealt with its data breach by switching operating system but upon closer inspection it would perhaps have been better to invest in strong authentication technology and staff training.

Three things for the CFO to consider when evaluating cyber-risk for the executive management team


Posted on 7th Nov 2014 by in Enterprise Security

The CFO arguably has the top job when it comes to assessing risk and making decisions on security investments. Most will have the support of the CIO in evaluating all the risks associated with technology, but have they considered all the issues that modern working practice expose the executive management team to?

Three life lessons on security from our favorite superhero movies


Posted on 31st Oct 2014 by in Enterprise Security

CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.

EMV gains steam as President Obama signs Chip & PIN law in the U.S.


Posted on 22nd Oct 2014 by in Financial Services

President Obama sent a strong message to American consumers and the payments industry by endorsing the highest level of security for government payment cards and terminals.  He set the government the task of “leading by example”  by calling for “chip & PIN” EMV cards to combat fraud on 3 million credit cards issued to government […]

More than EMV: President Obama’s executive order paves the way for more secure online services


Posted on 22nd Oct 2014 by in Corporate

Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals.  My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]

Should your executive assistant be a security expert?


Posted on 17th Oct 2014 by in Enterprise Security

We believe the executive assistant is among those with the keys to the company’s lifeblood and information, so shouldn’t we be giving them the same level of protection as CxOs?

One Device to Control Them All


Posted on 12th Sep 2014 by in Mobile

CTIA Super Mobility Week showed us that it’s never been more clear that there’s a massive influx of connected devices that are crossing over both work and personal activities. The biggest challenge is no longer in getting connected, but in securely managing all those connections and remembering the myriad of passwords and user names – on […]