Quantcast
Channel: Data Protection – Loss Prevention Media
Browsing all 130 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

9 Tips for Developing Your Document Retention Guidelines

Data security best practices that include an active document retention and destruction policy is critical for any business and must be considered a priority for today’s retail enterprise. With the...

View Article


3 Ways Modern Retailers Can Minimize Enterprise Mobility Risks

In an effort to give employees access to corporate resources from anytime and anywhere, an increasing number of retailers are introducing Bring Your Own Device (BYOD) programs. These programs have...

View Article


Retailers Now Need to Watch for These Social Engineering Techniques

When you think of hacking, breaches, or cyber security, what do you think of? Probably software or technology. We often forget the human side. But humans continue to play a big role. In fact, more than...

View Article

How to Establish an Effective Information Security Policy

While technology has helped to revolutionize the retail industry, the revolution has come with new risks. Internal and external security threats put a company’s data and data systems at risk on a daily...

View Article

Catch Me If You Can: Scam Artists Past and Present

You may have heard of Frank Abagnale. You definitely have if you read the article he wrote for the March/April 2003 issue of LP Magazine—or if you saw the 2002 movie Catch Me If You Can, starring...

View Article


By 2019, Almost Half of All Cell Phone Calls Will Be Fraudulent

Robocalls reached a record 3.36 billion in April of 2018, according to the voicemail and cell blocking app YouMail. That equates to 1,297 calls placed each second. Phone calls solutions provider First...

View Article

The ‘Why’ behind Intellectual Property Theft Cases

For more than a decade, the CERT Program at Carnegie Mellon University’s Software Engineering Institute has been gathering and analyzing actual malicious insider incidents. Based on case patterns, it...

View Article

Increased Corporate Data Security Spending Underscores Need for Personal Data...

Data security is a task that only the government and business leaders need to worry about, right? Wrong! Corporate data security is very big business. The worldwide projected spend on information...

View Article


Image may be NSFW.
Clik here to view.

Cyber Security and Brand Protection Are Team Sports (Fortalice)

Sponsored by Fortalice As this holiday season approaches, are you ready to stand with your IT security counterparts and protect the brand? How many of you have a working relationship with your IT...

View Article


LPM Insider’s Top 5 Data Protection Articles of 2018

Have You Deleted Your Facebook Account Yet? Facebook misses Crisis 101 basics in the latest data breach scandal. By Bill Turner,LPC It all began when it came to light recently that Cambridge Analytica,...

View Article

8 Cybersecurity Predictions for Retail in 2019 and Beyond

The last 24 months have been filled with news of breaches, attacks, and privacy concerns with no end in sight. Here are my 2019 cyber security predictions. 1. Both consumer and commercial IoT (Internet...

View Article

Is Your Data Protected Against These 4 Risks?

When people think of security threats that retail organizations face every day, their initial thoughts are often data breaches and cyberattacks. That is no surprise, as these incidents are what usually...

View Article

Retailers Now Need to Watch for These Social Engineering Techniques

So what exactly is social engineering? It is the manipulation of people into performing actions or divulging confidential information. It is a confidence (con, for short) trick for information...

View Article


How to Establish an Effective Information Security Policy

There must be unwavering support by the leaders at the highest level of the organization in order for an information security policy to weave itself into the day-to-day operations of the business. This...

View Article

Catch Me If You Can: Scam Artists Past and Present

Similar to eBay's process, dark web sellers often solicit and publish customer feedback so perspective buyers can evaluate the criminal's reputation for delivering illegal stolen identity information...

View Article


By 2019, Almost Half of All Cell Phone Calls Will Be Fraudulent

Robocalls reached a record 3.36 billion in April of 2018, according to the voicemail and cell blocking app YouMail. That equates to 1,297 calls placed each second.

View Article

Cyber Security and Brand Protection Are Team Sports (Fortalice)

Sponsored by Fortalice As this holiday season approaches, are you ready to stand with your IT security counterparts and protect the brand? How many of you have a working relationship with your IT...

View Article


The ‘Why’ behind Intellectual Property Theft Cases

It’s important to consider how a sense of entitlement can motivate wrongdoing, according to experts. For many of today’s workers, experts say, it’s not stealing at all—it’s leaving with what’s theirs.

View Article

Increased Corporate Data Security Spending Underscores Need for Personal Data...

Data security is a task that only the government and business leaders need to worry about, right? Wrong!

View Article

LPM Insider’s Top 5 Data Protection Articles of 2018

Posts about Facebook security, cyber risk trends, and scam artists past and present all made it into the top five for the data protection category.

View Article
Browsing all 130 articles
Browse latest View live