January, 2013

article thumbnail

18.4% of us internet users got at least one of their account compromised

Elie

Almost one in five US Internet users report that one of their online accounts had been comprised at some point. That is the result of the study I conducted using Google Consumer Surveys. This a much higher percentage than I imagined and it emphasizes how pervasive account compromises are.

article thumbnail

Do your customer calls all look the same? They shouldn’t.

Dark Reading

Without the ability to verify the Caller ID or ANI, all customer calls can look the same to call center agents. This a risky proposition for any financial institution that handles thousands of customer calls each day. In other words, if all calls appear the same there’s no way to answer some of the key questions all banks should know about customer calls, such as: Which calls are trustworthy?

Banking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canada’s Anti-Spam Law (CASL) – Proposed New Regulations Would Soften Impact

Privacy and Cybersecurity Law

Draft Regulations recognize CASL should not apply to “regular business communications” Industry Canada has published long-awaited draft Regulations that would lessen the impact […].

article thumbnail

Children’s Online Privacy Protection: U.S. Developments Compared to Canada

Privacy and Cybersecurity Law

There were two important developments in the U.S. regarding children and mobile technologies. FTC Staff Report On December 10, 2012, […].

Mobile 40
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.