Home
 > Research and Reports > White Papers > Fraud Alert: Phishing-The Latest Tactics and Potentia...

Fraud Alert: Phishing-The Latest Tactics and Potential Business Impact

Source: Symantec
Phishing continues to grow and effect both consumers and businesses. Read this guide so that you are able to help protect yourself and your customers from these harmful attacks.


Featured publications:

TEC 2013 CRM Buyer's Guide for Medium and Large Enterprises
Published On: March 28 2013 Great customer service is the best (some say the only) way to truly stand out from the competition. CRM vendors are helping companies rise to the challenge with new tools for building and measuring relationships. In the 2013 TEC CRM Buyer’s Guide, analyst Raluca Druta walks you through the latest CRM developments and looks at how trends like customer experience management, mobility, and social media integration are changing the way companies do business. Read More...
Webinar: Expanding BI's Potential with Predictive Analytics
Source: Technology Evaluation Centers Published On: October 22 2013 Business intelligence (BI) is an essential decision-making tool. But it can do even more for you when you power it with predictive analytics. In this IBM TechTalk webinar, Jorge Garcia, senior BI and Data Management analyst at Technology Evaluation Centers, will show you how predictive analytics goes beyond traditional analysis of past and present data to help you "see ahead." Read More...
The Skillsoft Impact Analysis: The Fast Track to Gaining Powerful Insights into the Strengths and Opportunities of Your Elearning Investment
Source: Skillsoft In this age of big data, decision makers on all levels are clamoring for business-driven data regarding the effectiveness of human capital investments. Hard quantifiable evidence, like business impact or ROI, can be complex and seem out of reach in the face of rapid change and constrained L&D resources. This paper introduces a simplified process and toolkit, and shares some of the key findings uncovered since its inception. Read More...


You may also be interested in these related documents:

The Tangled Web: Silent Threats and Invisible Enemies
Source: Symantec When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks. Read More...
How to Defend Against New Botnet Attacks
Source: Symantec In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against—and these compromised “robot” computer networks don’t seem to be going away in the near future. Learn about new and sophisticated botnets, how they can affect your business network, and the steps you can take to protect your company from a botnet attack. Read More...
Reducing Operational Risk of IT Service in Finance
Source: Proxima Technology An overview for CIOs of the provision and management of IT services at a level that addresses the risk management issues raised by the Basel Committee's New Capital Accord expected to become effective during 2006. Because of the dependence financial institutions have on IT services, the accord requires adequate provision to assure the availability of these services. Centauri Business Service Manager is presented as the solution: one that allows a CIO to assess current risk levels, measure ongoing risk and support a process of ongoing improvement to reduce this risk. Furthermore, Centauri provides the financial institution with a cost-effective balanced scorecard to improve decision-making. Read More...

 
comments powered by Disqus



Recent Searches

©2014 Technology Evaluation Centers Inc. All rights reserved.