Executive Resources

Hanging on the Telephone: Antivirus Cold-calling Support Scams

Source: Eset
Service support scammers rely on the naiveté of their victims in order to persuade them to grant access to their computers and credit card details. There’s very little a security company can do directly to prevent this activity, apart from keeping its own software up to date so as to detect malware and block as many threats as possible. Read this white paper to find out about different types of scams that threaten your data security.



Related content:

Business Strategy: Thwarting Cyberthreats and Attacks Against Healthcare Organizations

A new IDC Health Insight study finds healthcare providers are top targets for cybercriminals, because health information is now the most valuable asset on the black market. Help protect your organization by learning how others are investing in their cyberstrategy and reviewing cybersecurity best practices.

Are Your Legacy Applications Suitable for the cloud? 3 Critical Evaluation Activities to Ensure Migration Success

Many enterprises are currently planning or are in the process of migrating their critical business applications to the cloud as the trend toward the hybrid enterprise continues to gather momentum. Even if a legacy application is deemed technically possible to migrate, without understanding the cost to the business and the performance ramifications for end users, the impact could be disastrous. Here are some factors that should influence cloud migration decisions for legacy applications.

Agile Data Masking: Toward a More Secure and Agile Enterprise

Data masking has long been a key component of enterprise data security strategies. However, legacy masking tools could not deliver secure data, undermining their impact. This white paper explores how data as a service can deliver on the promise of masking, while increasing organizational flexibility and agility.

Keeping Up with Production: How Agile Data Management Speeds Time to Market

Software development across industries is undergoing a constant revolution, driving toward more efficient processes, while data management is trapped with slow legacy systems. This document from Gleanster outlines how data as a service transforms data from drag to driver.

Agile Data Masking: Critical to Data Loss Prevention and Threat Reduction

Over the past several years data loss and data leaks have been a regular part of headline news. This surge in data leak activity has prompted many organizations to reevaluate their exposure to data leaks and institute automated, agile approaches to data masking. Well-implemented data masking secures data delivery and enhances compliance and security while accelerating data management processes.