You have a top-flight antivirus solution deployed and managed on your system. Your hardware firewall is automatically updated and continuously monitored by a great security team. You’ve blocked access to all known malicious and questionable web sites. Your email...
As U.S. banks deploy chip-enabled EMV debit and credit cards, most articles on the subject imply the new cards will dramatically reduce fraud. According to a 2014 report by Aite Group, 37% of all U.S. credit card fraud involved theft of credit card numbers and...
With the release of version 8, Veeam introduced Cloud Connect. This new feature allows you to easily send your backup data off-site to a third party data center. As opposed to on-line backup systems like Carbonite or Mozy, Veeam allows you to maintain complete control...
According to the American Medical Association, your company may be fined up to $1.5 million per year for HIPAA non-compliance. The first step of HIPAA compliance is making sure all of the companies who have access to your systems are, themselves, compliant. If you...
Teller capture – also known as teller scan or front counter capture – is a processing workflow designed to take advantage of shifts in retail banking: the decrease in transaction volume performed at brick and mortar locations coupled with the prevalence of the x9.37...
There is a familiar theme in all security breaches, regardless of scale: careless oversight and failure to act proactively. Let these cautionary tales help ensure your organization does not fall victim to cyber criminals who will always exploit those who fail to...