Searched for: "how to protect your customer data and your reputation"
- Security (16)
- Cxo (8)
- After Hours (5)
- Social Enterprise (4)
- Collaboration (3)
- Data Centers (3)
- Developer (3)
- Microsoft (3)
- Software (3)
- Enterprise Software (2)
- Networking (2)
- Project Management (2)
- Virtualization (2)
- Apple (1)
- Banking (1)
- Cloud (1)
- Data Management (1)
- Hardware (1)
- Mobility (1)
- Storage (1)
- Tech & Work (1)
About 64 results for "how to protect your customer data and your reputation"
How much does your business lose to fraud? If you don't know the answer, fraud is likely a taboo IT security topic at your organization. Argyle Data's CEO explains why it shouldn't...
C.J. Radford predicts the usage of cloud applications will accelerate in 2015, says data-at-rest protection is imperative for enterprise cloud deployment, and more in this Q&A.
The SketchFactor app identifies neighborhoods' "sketchiness" through publicly available data, as well as user updates that other users can vote on. The crowdsourcing aspect has led...
With the cloud and big data in full swing and IoT on the rise, the time is ripe for businesses to take stock of the new legal challenges that disruptive technologies create.
The iPhone 6 was revealed on September 9, 2014. Find out what features should have Android developers scrambling to pick up the slack.
A growing number of organizations are launching commercialization ventures, offering their IT products and services to external customers. The payoff may be good -- but careful pla...
Microsoft launched a pre-release version of OWA for Android, the latest in its effort to provide a consistent Outlook experience regardless of device or platform.
Find out what the Heartbleed security threat might mean to you and your organization and how to handle it.
Of all the security threats that can impact network operations, the lowly botnet may prove to be the most damaging and hardest to eradicate. Here's how to stop, or at least minimiz...
Read about the importance of determining the ROI of implementing DDoS mitigation controls. Also, find out why small online retailers are left the most exposed to DDoS attacks.