Fraud Alert: Phishing-The Latest Tactics and Potential Business Impact

Phishing continues to grow and effect both consumers and businesses. Read this guide so that you are able to help protect yourself and your customers from these harmful attacks.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

TEC 2013 CRM Buyer's Guide for Medium and Large Enterprises

  • Source:
Great customer service is the best (some say the only) way to truly stand out from the competition. CRM vendors are helping companies rise to the challenge with new tools for building and measuring relationships. In the 2013 TEC CRM Buyer’s Guide, analyst Raluca Druta walks you through the latest CRM developments and looks at how trends like customer experience management, mobility, and social media integration are changing the way companies do business.
  • Written By:
  • Published On: March 2013

Webinar: Expanding BI's Potential with Predictive Analytics

  • Source: Technology Evaluation Centers
Business intelligence (BI) is an essential decision-making tool. But it can do even more for you when you power it with predictive analytics. In this IBM TechTalk webinar, Jorge Garcia, senior BI and Data Management analyst at Technology Evaluation Centers, will show you how predictive analytics goes beyond traditional analysis of past and present data to help you "see ahead."
  • Written By:
  • Published On: October 2013

The Skillsoft Impact Analysis: The Fast Track to Gaining Powerful Insights into the Strengths and Opportunities of Your Elearning Investment

In this age of big data, decision makers on all levels are clamoring for business-driven data regarding the effectiveness of human capital investments. Hard quantifiable evidence, like business impact or ROI, can be complex and seem out of reach in the face of rapid change and constrained L&D resources. This paper introduces a simplified process and toolkit, and shares some of the key findings uncovered since its inception.
  • Written By:
  • Published On:

You may also be interested in these related documents:

The Tangled Web: Silent Threats and Invisible Enemies

When cyber-criminals stage attacks on businesses with covert malware, spam, and scams that drain employee productivity, users aren’t aware they’ve been victimized. Rich media, open-source platforms, and social-networking sites are vulnerable to these threats. Learn how a hosted Web security and content filtering service intercepts all types of Web-borne attacks.
  • Written By:
  • Published On:

How to Defend Against New Botnet Attacks

In 2008, botnets were responsible for 90 percent of spam. The ever-changing nature of botnets makes them hard to detect and even harder to defend against—and these compromised “robot” computer networks don’t seem to be going away in the near future. Learn about new and sophisticated botnets, how they can affect your business network, and the steps you can take to protect your company from a botnet attack.
  • Written By:
  • Published On:

Reducing Operational Risk of IT Service in Finance

An overview for CIOs of the provision and management of IT services at a level that addresses the risk management issues raised by the Basel Committee's New Capital Accord expected to become effective during 2006. Because of the dependence financial institutions have on IT services, the accord requires adequate provision to assure the availability of these services. Centauri Business Service Manager is presented as the solution: one that allows a CIO to assess current risk levels, measure ongoing risk and support a process of ongoing improvement to reduce this risk. Furthermore, Centauri provides the financial institution with a cost-effective balanced scorecard to improve decision-making.
  • Written By:
  • Published On: