Perimeter eSecurity

Displaying 1-22 of 22 results

  • Webcasts // Feb 2011

    The Rise of the Machines: Defending Your Company Against Botnets

    The goal of modern malware is to silently compromise PCs, recruit them to be part of a botnet controlled by malicious attackers, and use them to steal information. Listen to this informative webcast presented by Andrew Jaquith, CTO of Perimeter E-Security and Lead Security Analyst Richard Westmoreland as they...

    Provided By Perimeter eSecurity

  • Webcasts // Jan 2011

    Advantages of Cloud Email Archiving

    Archiving in the cloud has been rapidly growing in popularity, offering a number of benefits which are attractive to companies of all sizes and all industries. These benefits are especially important in these times of tighter budgets and shrinking IT teams. However, security and legal compliance of cloud solutions continues...

    Provided By Perimeter eSecurity

  • White Papers // Aug 2009

    Will Facebook Get You Hired or Fired?

    Phishing is a common method cyber criminals use to lure individuals into giving up their personal information. Spear phishing is where the criminals target a specific group of users, for example all customers of a particular bank or credit union. Whaling is an even more directed attack at one particular...

    Provided By Perimeter eSecurity

  • White Papers // Aug 2009

    Social Networking: The Growing Threat to Businesses and Individuals

    Social Networking is a phenomenon that has officially grown out of control. It means that literally. It has grown to the point where neither the users nor the social networking companies themselves can control these monsters that have been created. It reminds of the movie Jurassic Park where a wealthy...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    The ABC's of Social Engineering & Five Ways to Protect Your Organization

    Social Engineering has been an effective method of committing fraud for centuries. Recently, however, it has been used more and more to assist criminals in perpetrating crimes that can net large sums of money. Without one social engineering method or another, most current attacks would not be successful. Social engineering...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Saving Money in Your Security Spending During a Financial Crisis

    Belts are getting tighter around all budgets and IT budgets are no exception. Now is the time for administrators and executives to look at ways of getting the most out of their IT budget. But how can one do it? How can one optimize spending while the numbers of threats...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Understanding PCI DSS Compliance

    PCI DSS version 1.1 (the current standard until October 2008 when PCI DSS version 1.2 is slated to be released) outlines best practices for credit card data that is stored, processed or transmitted. It consolidates and supersedes the requirements of the previously developed MasterCard Site Data Protection (SDP) Program and...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Institutional Identity Theft

    Identity theft is a catch-all term for crimes involving illegal usage of another individual's identity. The most common form of identity theft is credit card fraud. Identity theft is often looked at as an individual's problem. One knows something that consumers have to worry about. However organizations often spend a...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Proposed Amendments to Regulation S-P Safeguard & Disposal Rules: Risk Mitigation and Compliance Solutions for Organizations Falling Under SEC Rules

    The Securities and Exchange Commission (SEC) currently has a series of Safeguards and Disposal Rules (Section 30a of Regulation S-P) that requires institutions to adopt written policies and procedures to safeguard customer records and information. The safeguards are required to be reasonably designed to meet the objectives of the Gramm-Leach-Bliley...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Making Sense of Message Archiving Requirements

    There are many regulations that cover Message Archiving and the overall category of Electronic Media. Some of these are industry specific such as Sarbanes-Oxley (SOX), SEC regulation 17, NASD 3010, 21CFR part 11 and HIPAA. While many businesses feel like they are not required to adhere to these standards, they...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Red Flags Rule: The FTC Regulation and Solutions to Prevent Identity Theft

    The Red Flags Rule was developed pursuant to the Fair and Accurate Credit Transactions (FACT) Act of 2003. Under the Rule, financial institutions and creditors with covered accounts must have identity theft prevention programs to identify, detect, and respond to patterns, practices, or specific activities that could indicate identity theft.

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    A Comprehensive Study of Financial Data Security Breaches in the United States - 2008

    New laws and regulations regarding data security breaches and disclosure laws affect the way in which financial institutions do business. This study provides a review of the scope and impact of data security breaches in the financial industry in an effort to encourage proactive modification to risk mitigation technologies, policies,...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    8 Elements of Complete Vulnerability Management

    Off late threat landscape offers attackers a much larger selection of attack points in the form of open firewall ports for business traffic, web or others servers behind the firewall, along with all applications running internally on the network, including PCs and servers. This gives the bad guys a wealth...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Top 9 Network Security Threats in 2009

    By realizing the threats, one can work to ensure the exposure is limited. Additionally, it gives one the opportunity to look at alternative solutions. A company that has traditionally kept their security management and monitoring in-house may use this as an opportunity to look at the cost benefits of outsourcing...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    From Wagons to Trains: Data Backup and Recovery in 2009 and Beyond

    Most organizations are still stuck in the last century when it comes to developing a strategy to prevent permanent data loss. Backing up data using traditional methods such as tapes, SAN, or NAS have many problems that only get worse over time while using an online backup strategy securely over...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Simplifying Network Security With a Single Source Provider

    Many service providers began sprouting up in the late 90's and earlier this decade. Those with solid business plans, expertise, and a focus on the right industries and regulations found success and are still around today. Many failed. New MSSP's spring up all the time, but one should be weary...

    Provided By Perimeter eSecurity

  • Webcasts // May 2009

    Red Flags Rules - FTC Regulations and Your Responsibilities to Prevent Identity Theft

    Identity Theft is on the rise, and the government has taken notice. As of May 1st, the Federal Trade Commission, the federal bank regulatory agencies, and the National Credit Union Administration (NCUA) have issued regulations (the Red Flags Rule) requiring financial institutions and creditors to develop and implement written identity...

    Provided By Perimeter eSecurity

  • Webcasts // Apr 2009

    Perimeter eSecurity's 2008 Financial Institution Data Breach Study

    In 2008, data breaches hit the financial industry hard. These data breaches exposed personal information that thieves could leverage to steal identities. This resulted in financial loss for the victims and major repercussions for the breached organization, including an average cost of $200 per compromised record and a loss of...

    Provided By Perimeter eSecurity

  • White Papers // Apr 2009

    A Comprehensive Study of Retail Data Security Breaches in the United States

    The Payment Card Industry Data Security Standard (PCI/DSS) is changing the way in which retail organizations protect sensitive information. This study is designed to review the scope and impact of data security breaches in the retail industry in an effort to encourage proactive modification to risk mitigation technologies, policies and...

    Provided By Perimeter eSecurity

  • Webcasts // Mar 2009

    Is Your Organization's Business Continuity Prepared for the Next Natural Disaster?

    In a world of uncertainty, there is one thing one can be sure of - nobody can predict when an organization will be a victim of a natural disaster. Storms, fires, floods, hackers, viruses, theft, power outages or even human error can result in critical systems becoming inaccessible and loss...

    Provided By Perimeter eSecurity

  • Webcasts // Feb 2009

    The Perfect Storm: How the Current Recession Is Threatening Your Network and What You Can Do to Protect Your Organization

    It's no secret that organizations face a myriad of network security threats each day. The current recession has only made matters worse. Budget cuts, reduced headcount, and a lack of resources are pushing the capability of IT departments to their limits, weakening many organizations' security posture. Meanwhile hackers, thieves, disgruntled...

    Provided By Perimeter eSecurity

  • Webcasts // Jan 2009

    Top 9 Network Security Threats of 2009 and How You Can Protect Your Organization

    The presenter of this webcast explores the most prevalent threats to the network in 2009 and the steps one can take to mitigate the most risk. The attendee will see that layers of protection within the network can control the threat exposure and provide a strong defense against the latest...

    Provided By Perimeter eSecurity

  • Webcasts // Feb 2011

    The Rise of the Machines: Defending Your Company Against Botnets

    The goal of modern malware is to silently compromise PCs, recruit them to be part of a botnet controlled by malicious attackers, and use them to steal information. Listen to this informative webcast presented by Andrew Jaquith, CTO of Perimeter E-Security and Lead Security Analyst Richard Westmoreland as they...

    Provided By Perimeter eSecurity

  • Webcasts // May 2009

    Red Flags Rules - FTC Regulations and Your Responsibilities to Prevent Identity Theft

    Identity Theft is on the rise, and the government has taken notice. As of May 1st, the Federal Trade Commission, the federal bank regulatory agencies, and the National Credit Union Administration (NCUA) have issued regulations (the Red Flags Rule) requiring financial institutions and creditors to develop and implement written identity...

    Provided By Perimeter eSecurity

  • Webcasts // Apr 2009

    Perimeter eSecurity's 2008 Financial Institution Data Breach Study

    In 2008, data breaches hit the financial industry hard. These data breaches exposed personal information that thieves could leverage to steal identities. This resulted in financial loss for the victims and major repercussions for the breached organization, including an average cost of $200 per compromised record and a loss of...

    Provided By Perimeter eSecurity

  • Webcasts // Feb 2009

    The Perfect Storm: How the Current Recession Is Threatening Your Network and What You Can Do to Protect Your Organization

    It's no secret that organizations face a myriad of network security threats each day. The current recession has only made matters worse. Budget cuts, reduced headcount, and a lack of resources are pushing the capability of IT departments to their limits, weakening many organizations' security posture. Meanwhile hackers, thieves, disgruntled...

    Provided By Perimeter eSecurity

  • Webcasts // Mar 2009

    Is Your Organization's Business Continuity Prepared for the Next Natural Disaster?

    In a world of uncertainty, there is one thing one can be sure of - nobody can predict when an organization will be a victim of a natural disaster. Storms, fires, floods, hackers, viruses, theft, power outages or even human error can result in critical systems becoming inaccessible and loss...

    Provided By Perimeter eSecurity

  • Webcasts // Jan 2009

    Top 9 Network Security Threats of 2009 and How You Can Protect Your Organization

    The presenter of this webcast explores the most prevalent threats to the network in 2009 and the steps one can take to mitigate the most risk. The attendee will see that layers of protection within the network can control the threat exposure and provide a strong defense against the latest...

    Provided By Perimeter eSecurity

  • White Papers // Aug 2009

    Social Networking: The Growing Threat to Businesses and Individuals

    Social Networking is a phenomenon that has officially grown out of control. It means that literally. It has grown to the point where neither the users nor the social networking companies themselves can control these monsters that have been created. It reminds of the movie Jurassic Park where a wealthy...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Red Flags Rule: The FTC Regulation and Solutions to Prevent Identity Theft

    The Red Flags Rule was developed pursuant to the Fair and Accurate Credit Transactions (FACT) Act of 2003. Under the Rule, financial institutions and creditors with covered accounts must have identity theft prevention programs to identify, detect, and respond to patterns, practices, or specific activities that could indicate identity theft.

    Provided By Perimeter eSecurity

  • White Papers // Aug 2009

    Will Facebook Get You Hired or Fired?

    Phishing is a common method cyber criminals use to lure individuals into giving up their personal information. Spear phishing is where the criminals target a specific group of users, for example all customers of a particular bank or credit union. Whaling is an even more directed attack at one particular...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    A Comprehensive Study of Financial Data Security Breaches in the United States - 2008

    New laws and regulations regarding data security breaches and disclosure laws affect the way in which financial institutions do business. This study provides a review of the scope and impact of data security breaches in the financial industry in an effort to encourage proactive modification to risk mitigation technologies, policies,...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    8 Elements of Complete Vulnerability Management

    Off late threat landscape offers attackers a much larger selection of attack points in the form of open firewall ports for business traffic, web or others servers behind the firewall, along with all applications running internally on the network, including PCs and servers. This gives the bad guys a wealth...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Top 9 Network Security Threats in 2009

    By realizing the threats, one can work to ensure the exposure is limited. Additionally, it gives one the opportunity to look at alternative solutions. A company that has traditionally kept their security management and monitoring in-house may use this as an opportunity to look at the cost benefits of outsourcing...

    Provided By Perimeter eSecurity

  • White Papers // Apr 2009

    A Comprehensive Study of Retail Data Security Breaches in the United States

    The Payment Card Industry Data Security Standard (PCI/DSS) is changing the way in which retail organizations protect sensitive information. This study is designed to review the scope and impact of data security breaches in the retail industry in an effort to encourage proactive modification to risk mitigation technologies, policies and...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    From Wagons to Trains: Data Backup and Recovery in 2009 and Beyond

    Most organizations are still stuck in the last century when it comes to developing a strategy to prevent permanent data loss. Backing up data using traditional methods such as tapes, SAN, or NAS have many problems that only get worse over time while using an online backup strategy securely over...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    The ABC's of Social Engineering & Five Ways to Protect Your Organization

    Social Engineering has been an effective method of committing fraud for centuries. Recently, however, it has been used more and more to assist criminals in perpetrating crimes that can net large sums of money. Without one social engineering method or another, most current attacks would not be successful. Social engineering...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Simplifying Network Security With a Single Source Provider

    Many service providers began sprouting up in the late 90's and earlier this decade. Those with solid business plans, expertise, and a focus on the right industries and regulations found success and are still around today. Many failed. New MSSP's spring up all the time, but one should be weary...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Saving Money in Your Security Spending During a Financial Crisis

    Belts are getting tighter around all budgets and IT budgets are no exception. Now is the time for administrators and executives to look at ways of getting the most out of their IT budget. But how can one do it? How can one optimize spending while the numbers of threats...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Understanding PCI DSS Compliance

    PCI DSS version 1.1 (the current standard until October 2008 when PCI DSS version 1.2 is slated to be released) outlines best practices for credit card data that is stored, processed or transmitted. It consolidates and supersedes the requirements of the previously developed MasterCard Site Data Protection (SDP) Program and...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Institutional Identity Theft

    Identity theft is a catch-all term for crimes involving illegal usage of another individual's identity. The most common form of identity theft is credit card fraud. Identity theft is often looked at as an individual's problem. One knows something that consumers have to worry about. However organizations often spend a...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Proposed Amendments to Regulation S-P Safeguard & Disposal Rules: Risk Mitigation and Compliance Solutions for Organizations Falling Under SEC Rules

    The Securities and Exchange Commission (SEC) currently has a series of Safeguards and Disposal Rules (Section 30a of Regulation S-P) that requires institutions to adopt written policies and procedures to safeguard customer records and information. The safeguards are required to be reasonably designed to meet the objectives of the Gramm-Leach-Bliley...

    Provided By Perimeter eSecurity

  • White Papers // Jun 2009

    Making Sense of Message Archiving Requirements

    There are many regulations that cover Message Archiving and the overall category of Electronic Media. Some of these are industry specific such as Sarbanes-Oxley (SOX), SEC regulation 17, NASD 3010, 21CFR part 11 and HIPAA. While many businesses feel like they are not required to adhere to these standards, they...

    Provided By Perimeter eSecurity

  • Webcasts // Jan 2011

    Advantages of Cloud Email Archiving

    Archiving in the cloud has been rapidly growing in popularity, offering a number of benefits which are attractive to companies of all sizes and all industries. These benefits are especially important in these times of tighter budgets and shrinking IT teams. However, security and legal compliance of cloud solutions continues...

    Provided By Perimeter eSecurity