Data Breach Notification Laws: The Need for Spyware Detection Capability

Security measures that repel spyware attacks are critical to any comprehensive security plan, thanks to laws requiring companies to notify their customers if they experience a data security breach. But it’s not enough to have a plan for complying with breach notification laws. Every company’s goal should be to avoid having to give such a notification in the first place.

Featured Software Research:

ExecBlueprints: Device-Reliant vs. Data-Reliant: How Mobile and Cloud Technologies Influence Workflow

Cloud computing offers an extremely cost-effective alternative to traditional hardware-based infrastructures, but the advantages in flexibility and price must be weighed against issues of security, reliability, and capability. Business unit leaders must partner with IT to determine their needs, understand the impact of new technologies, and chart a path forward together to facilitate stability and efficiency across the entire organization.   Read More

Addressing the “Big Data” Issue: What You Need to Know

There is no doubt that big data, i.e., organization-wide data that’s being managed in a centralized repository, can yield valuable discoveries that will result in improved products and performance—if properly analyzed. Nonetheless, you must look before you leap. This white paper shows you what you need to know about big data, including the challenges big data presents, must-have practices to successfully manage a company’s big data, as well as the metrics to measure the ROI.  Read More

Five Questions About the Use of Text Messaging for Collections

The mobile phone has become the primary communications device for many people, and text messaging is a key channel. Eighty-three percent of text messages are opened within three minutes, yet few collections organizations leverage the power of this channel. Many collectors have questions about incorporating text messaging into their strategies and how to ensure they stay in compliance with applicable laws and regulations.

In order to contact a debtor on their mobile phone, do you need to... Read More

You may also be interested in these related documents:

Best of breed versus Suite Anti-spyware

The anti-spyware industry is going in two separate directions. First, there are suite products that come with other security applications, along with anti-spyware. Second, there are best-of-breed products that are purely focused on detecting and eradicating spyware. Depending on the type of organization, choosing a suite-based anti-spyware over best-of-breed software can leave a company vulnerable. Read More

The Emerging Threat of Legal Liability for Failure to Prevent Spyware Attacks

Corporations striving to comply with data security laws and regulatory initiatives must implement anti-spyware measures. Businesses who fail to take reasonable physical, administrative, and technical measures to prevent the unauthorized acquisition, alteration, or destruction of valuable information, risk costly and disruptive legal proceedings. And courts and responsible agencies will freely second-guess such decisions in the event of a data breach. Read More

Building a Business Case for Enterprise Spyware Protection

It is sometimes difficult to quantify the scope of spyware problems within corporate environments. The least noticeable effect of spyware is to slow network and desktop processing by tiny increments. But even the slightest slowdown, multiplied across the enterprise, adds up to a serious bottom line impact in decreased automated processing and worker productivity. Read More
 
comments powered by Disqus