HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Security News & Analysis

3 Ways to Fight Retail Fraud Without Alienating Customers

Retailers' have a dilemma whose solution will require the most careful of balancing acts.

On one hand, consumers expect to have online and mobile payment technologies available as they increasingly shop from their mobile devices. Indeed, one key recommendation by experts to increase sales is to make the payment process as seamless as possible.

Yet, these technologies directly lead to fraud for the retailer – fraud on the part of their own customers (aka friendly fraud) and from hackers of the ilk that have attacked Target, Home Depot and scores of other stores.

Hence the dilemma. But reading though the lines of two reports chronicling these trends, the barest outline of a solution for retailers begins to emerge.

Office 365 Extends Email Security to Address Spammers, Phishers

Microsoft is tightening up the security of its email offerings on Office 365 through the extension of features.

The goal here is to provide a “safer client experience” that will authenticate senders and help identify untrusted senders, helping to protect your system from spam and phishing campaigns, the tech giant explained.

While Office 365 is already pretty secure, Microsoft maintains the only way to beat hackers and other Internet nuisances is to keep one step ahead.

Discussion Point: Security Experts Respond to the State of the Union Address

discussion-point-1.jpg

Cybersecurity wasn't even the stuff of dreams when George Washington delivered the first State of the Union message to Congress on Jan. 8, 1790. But fast forward to 2015 and there it was, playing a prominent role in Barack Obama's annual address to the nation.

Obama called for better cybersecurity in his televised address last night, urging Congress to pass legislation that will improve computer protection. “No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets or invade the privacy of American families, especially our kids,” he said.

Do You Know What Data Your Employees Are Sharing?

You hear a lot about Shadow IT these days. And we'll probably continue to hear more, according to Cameron Coles, senior product marketing manager for Skyhigh Networks, a cloud security company.

Shadow IT happens when departments or individual employees use technologies that aren’t sanctioned by IT — something that has been increasingly easy to do since cloud-based services arrived.

As CMSWire writer Steven Pogrebivsky noted last year, employees who use a lot of consumer-based apps tend to expect the same ease of use in the workplace. "Personal and work have collided in such a big way that employees often expect that one service will support both needs. In a perfect world that would be fine. But this isn’t a perfect world: information gets leaked, gets lost, gets stolen," he noted.  

While senior management may be away of the risks of cloud-based services, employees are often less cautious and unwittingly create a hefty problem for many organizations, Coles said.

Kofax Simplifies E-Signature Capture, Processing

2015-12-faux-digital-signature.jpg

Kofax has kicked off the New Year with the launch of a family of e-signature products that the company claims will enable organizations of all sizes to improve digital transaction management.

The new products from the Irvine, Calif.-based financial technology company include Kofax SignDoc Standard and Kofax SignDoc Enterprise, as well as integration with the Kofax TotalAgility process automation suite. What’s more, Kofax boasts it is offering the new products at prices that will make them universally accessible and disrupt the status of a very competitive market.

Contact Center Fraud: 3 Things You Need to Know

2015-9-January-stolen-bike.jpg

While the media has focused its attention on the seemingly never-ending data breaches that occurred over the past year, another type of fraud is on the rise again, threatening customer loyalty and wallet share of financial institutions and businesses in similar high-risk industries.

According to an infographic by NICE Systems, 90 percent of fraud cases involve at least one interaction in the customer contact center. In addition, after becoming a victim to fraud, 40 percent of customers close their accounts with their financial institution, and an additional 40 percent reduce their wallet share.

3 Focuses for Mobile in the Year Ahead

2015-05-January-Mesmerized.jpgDigital marketers: 2015 is here, and it’s time to play catch up. For the past 10 years, we’ve been trying to keep pace with the latest innovations, strategizing and re-strategizing to implement the next great personalization feature or web design technique. But that period of innovation has ended and, moving into 2015, we find ourselves in a new period of digital transformation. By fully implementing these innovations in the coming year, marketers can help companies transition into fully digital-first business.

Where should we start? Mobile.

Goodbye PcAnywhere: Time for New Remote Support Solutions

If you’re a pcAnywhere stand-alone customer, it’s time to migrate to a new solution. In case you haven’t heard, Symantec announced in November that its remote control stand-alone product is no longer available, and as of next Nov. 3, it will pull the plug on support.

Fortunately, Symantec has been working to provide customers with a smooth way to migrate. The company is recommending pcAnywhere customers upgrade to the Bomgar Remote Support Solution, and has partnered with Bomgar to offer customers preferred pricing.

CMSWire talked with Bomgar’s Russ Duffey, VP of business development, and Boatner Blankenstein, senior director of solutions engineering, to learn more about the significance of the partnership.

A Look Back: Broken Promises of the Mobile Enterprise

Thumbnail image for 2014-14-December-uncommitted-ViewApart.jpg

Perhaps nothing in information technology offers a richer mix of expectation and disillusionment than the mobile enterprise. It's become like the lover who keeps promising a long-term relationship but never commits.

Since workers became enamored with smartphones eight years ago, it has seemed obvious those devices will one day connect with the applications and data within the company's fire-walled network. And that will happen. It just didn't happen in 2014.

Mobile devices and the enterprise have yet to form a happy marriage. Despite significant advances this year, hurdles remain before the mobile enterprise can achieve the kind of speed, safety and productivity that office workers have come to expect from their network.

A Look Back: 6 Internet of Things Trends from 2014

2014-25-December-look-back-3.jpg

2014 has lit up with a flurry of new products, developments and focus on how businesses can use the Internet of Things (IoT) to improve business processes and the customer experience.

But wait. IoT isn’t exactly the new kid on the block, so why so much activity this year? Michele Pelino, a Forrester Research principal analyst, attributed the rising interest to a dip in communication fees and sensor costs.

“Sensors and microprocessors that once cost hundreds of dollars are now available for as little as the cost of a cup of coffee,” she said. “Communication costs are also experiencing similar declines, with many wireless operators cutting fees to pennies per month per meter for the cellular link to support smart meters. On the other hand, expanding network availability in mature markets has enabled solution deployment.”

A long way from connected toasters and vending machines, experts predict that IoT will become a $1.9 trillion (Gartner), $7.1 trillion (IDC) or $19 trillion (Cisco) market, depending on which source you believe.

CMSWire's Top 10 Hits of 2014: Web CMS

2014-December-Top-10

It’s been a year of drama for the Web CMS space — or at least a fourth quarter of drama – with rumors aplenty at year-end around Ektron sales and mergers and news of Drupal’s “highly critical” security flaw.

Some of these stories made CMSWire’s Top 10 list for the year, but we had lots more to report about Web CMS, including trends, new players and myths about the world’s leading open-source CMS.

How to Be Smart with Your Corporate Data

2014-19-December-be-smart.jpg

The cyber attack against Sony Pictures revealed a treasure trove of titillating sensitive corporate data: emails that revealed the true feelings of certain producers for certain movie stars, sensitive compensation data for employees up and down the company's food chain, and scripts of future movies.

The attack has been declared the work of a mysterious group that calls itself the Guardians of Peace — a group US intelligence officials have concluded are involved with the North Korean government.

But imagine how foolish – and how liable – the IT security shop at Sony Pictures would look if this information leaked to the public through its own sloppy policies and willingness to look the other way as employees took short cuts to make their work processes easier. That is, imagine the headlines if this data had been snatched from an unprotected or minimally protected collaboration app that resided in the cloud.

For that's a major vulnerability at many companies, concludes SailPoint's Annual Market Pulse Survey.

Getting a Grip on Information Governance

Cyberspace is looking a lot like the Wild West these days, with outlaw hackers ready to rob you of your data and the sheriff nearby looking to make sure you’re sticking to the letter of ever-tightening laws.

Are you ready?

A new Forrester Consulting survey report, Governance Takes a Central Role as Enterprises Shift to Mobile, commissioned by Druva, a data protection and governance firm, shows that more and more companies are responding to these pressures by boosting spending on information governance (IG) and adopting new systems to better-manage data.

6 C's for More Efficient IT In 2015 [Infographic]

There’s no getting away from the inevitable round of IT predictions that mark the end of every year. Just about every research company and IT vendor has its own list — and 451 Research is no exception.

This time it comes in the shape of 6 C’s for 2015 that cover a range of issues from content management to containers to cloud and crowd working. Combined, they envisage a year that will see workers using more agile IT, largely through cloud and converged platforms. These same workers will also be more mobile and disassociated from the enterprise.

Box Has a Problem and a New Trust Initiative

First off, let’s get one thing straight: Box is not in the Enterprise File Sync and Share (EFSS) business.

“We certainly do that,” says Box executive Whitney Bouck, every time I ask her if Box is an EFSS provider. “But that’s not where the value is,” she always adds “that’s table stakes.”

So what does Box do? According to its SEC S-1 registration it is “a cloud-based, mobile-optimized Enterprise Content Collaboration platform that enables organizations of all sizes to easily and securely manage their content and collaborate internally and externally.”

How’s that for an elevator pitch?

Not too good. But, to be fair, it probably wasn’t crafted to be one.
 

Displaying 1-15 of 451 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >