How to use credit card scanning technology to avoid fraud, stay protected and maintain security compliance
We all know that sinking feeling when we’re using a personal laptop and there is a glitch and we can’t get it to work –Read more How to use credit card scanning technology to avoid fraud, stay protected and maintain security compliance
While many of us have tended to view cybercrime as someone else’s problem when it comes to credit card protection, that “she’ll be right” mentalityRead more Are you leveraging the latest technologies to reduce your security and compliance costs?
Cybercrime continues to rise across the globe and Australian organisations have so far been somewhat complacent about the impact of a data [...]Read more Financial Cost Of Data Breaches On Affected Companies In Australia 2015
Pause-and-resume recording is quickly becoming a legacy solution that no longer efficiently serves the purpose it was designed for, namely to [...]Read more Pause and Resume call recording in the contact centre
Card Holder Data (CHD) discovery tools are becoming essential in identifying none secure sensitive data locations. Since December 2013, a series [...]Read more Credit card data discovery tools lay the foundation for good data security
Ponemon Institute 2013 Cost of Data Breach report The 2013 Cost of Data Breach report published by the Ponemon Institute (sponsored by Symantec) [...]Read more Cost of data breach report (with Australian Statistics)
Mandatory data breach notification laws would result in greater security for Australians and improved protection of their sensitive information. [...]Read more The benefits of mandatory data breach notification laws in Australia