January, 2013

article thumbnail

18.4% of us internet users got at least one of their account compromised

Elie

Almost one in five US Internet users report that one of their online accounts had been comprised at some point. That is the result of the study I conducted using Google Consumer Surveys. This a much higher percentage than I imagined and it emphasizes how pervasive account compromises are.

article thumbnail

Do your customer calls all look the same? They shouldn’t.

Dark Reading

Without the ability to verify the Caller ID or ANI, all customer calls can look the same to call center agents. This a risky proposition for any financial institution that handles thousands of customer calls each day. In other words, if all calls appear the same there’s no way to answer some of the key questions all banks should know about customer calls, such as: Which calls are trustworthy?

Banking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Canada’s Anti-Spam Law (CASL) – Proposed New Regulations Would Soften Impact

Privacy and Cybersecurity Law

Draft Regulations recognize CASL should not apply to “regular business communications” Industry Canada has published long-awaited draft Regulations that would lessen the impact […].

article thumbnail

Children’s Online Privacy Protection: U.S. Developments Compared to Canada

Privacy and Cybersecurity Law

There were two important developments in the U.S. regarding children and mobile technologies. FTC Staff Report On December 10, 2012, […].

Mobile 40
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.