DigiCert

Displaying 1-3 of 3 results

  • White Papers // Oct 2009

    Protecting the Security of Education Records

    Academic and administrative computing systems used to be more isolated - either intentionally for security reasons or as a result of limited interconnectivity with other computers - but today it seems that nearly any information that an administrator, teacher, student or parent might need can be obtained through a network...

    Provided By DigiCert

  • White Papers // Jun 2009

    Phishing: A Primer on What Phishing Is and How It Works.

    Phishing is just one of the many ways that the Internet can be used to get people to unknowingly provide their personal financial information to fraudsters. A phishing attack is most often initiated with a special type of spam (unsolicited email) containing a link to a misleading domain name, which...

    Provided By DigiCert

  • White Papers // Jun 2009

    Phishing: A Primer on What Phishing Is and How It Works

    Phishing is just one of the many ways that the Internet can be used to get people to unknowingly provide their personal financial information to fraudsters. A phishing attack is most often initiated with a special type of spam (unsolicited email) containing a link to a misleading domain name, which...

    Provided By DigiCert

  • White Papers // Jun 2009

    Phishing: A Primer on What Phishing Is and How It Works.

    Phishing is just one of the many ways that the Internet can be used to get people to unknowingly provide their personal financial information to fraudsters. A phishing attack is most often initiated with a special type of spam (unsolicited email) containing a link to a misleading domain name, which...

    Provided By DigiCert

  • White Papers // Jun 2009

    Phishing: A Primer on What Phishing Is and How It Works

    Phishing is just one of the many ways that the Internet can be used to get people to unknowingly provide their personal financial information to fraudsters. A phishing attack is most often initiated with a special type of spam (unsolicited email) containing a link to a misleading domain name, which...

    Provided By DigiCert

  • White Papers // Oct 2009

    Protecting the Security of Education Records

    Academic and administrative computing systems used to be more isolated - either intentionally for security reasons or as a result of limited interconnectivity with other computers - but today it seems that nearly any information that an administrator, teacher, student or parent might need can be obtained through a network...

    Provided By DigiCert