9 Tips for Developing Your Document Retention Guidelines
Data security best practices that include an active document retention and destruction policy is critical for any business and must be considered a priority for today’s retail enterprise. With the...
View Article3 Ways Modern Retailers Can Minimize Enterprise Mobility Risks
In an effort to give employees access to corporate resources from anytime and anywhere, an increasing number of retailers are introducing Bring Your Own Device (BYOD) programs. These programs have...
View ArticleRetailers Now Need to Watch for These Social Engineering Techniques
When you think of hacking, breaches, or cyber security, what do you think of? Probably software or technology. We often forget the human side. But humans continue to play a big role. In fact, more than...
View ArticleHow to Establish an Effective Information Security Policy
While technology has helped to revolutionize the retail industry, the revolution has come with new risks. Internal and external security threats put a company’s data and data systems at risk on a daily...
View ArticleCatch Me If You Can: Scam Artists Past and Present
You may have heard of Frank Abagnale. You definitely have if you read the article he wrote for the March/April 2003 issue of LP Magazine—or if you saw the 2002 movie Catch Me If You Can, starring...
View ArticleBy 2019, Almost Half of All Cell Phone Calls Will Be Fraudulent
Robocalls reached a record 3.36 billion in April of 2018, according to the voicemail and cell blocking app YouMail. That equates to 1,297 calls placed each second. Phone calls solutions provider First...
View ArticleThe ‘Why’ behind Intellectual Property Theft Cases
For more than a decade, the CERT Program at Carnegie Mellon University’s Software Engineering Institute has been gathering and analyzing actual malicious insider incidents. Based on case patterns, it...
View ArticleIncreased Corporate Data Security Spending Underscores Need for Personal Data...
Data security is a task that only the government and business leaders need to worry about, right? Wrong! Corporate data security is very big business. The worldwide projected spend on information...
View ArticleCyber Security and Brand Protection Are Team Sports (Fortalice)
Sponsored by Fortalice As this holiday season approaches, are you ready to stand with your IT security counterparts and protect the brand? How many of you have a working relationship with your IT...
View ArticleLPM Insider’s Top 5 Data Protection Articles of 2018
Have You Deleted Your Facebook Account Yet? Facebook misses Crisis 101 basics in the latest data breach scandal. By Bill Turner,LPC It all began when it came to light recently that Cambridge Analytica,...
View Article8 Cybersecurity Predictions for Retail in 2019 and Beyond
The last 24 months have been filled with news of breaches, attacks, and privacy concerns with no end in sight. Here are my 2019 cyber security predictions. 1. Both consumer and commercial IoT (Internet...
View ArticleIs Your Data Protected Against These 4 Risks?
When people think of security threats that retail organizations face every day, their initial thoughts are often data breaches and cyberattacks. That is no surprise, as these incidents are what usually...
View ArticleRetailers Now Need to Watch for These Social Engineering Techniques
So what exactly is social engineering? It is the manipulation of people into performing actions or divulging confidential information. It is a confidence (con, for short) trick for information...
View ArticleHow to Establish an Effective Information Security Policy
There must be unwavering support by the leaders at the highest level of the organization in order for an information security policy to weave itself into the day-to-day operations of the business. This...
View ArticleCatch Me If You Can: Scam Artists Past and Present
Similar to eBay's process, dark web sellers often solicit and publish customer feedback so perspective buyers can evaluate the criminal's reputation for delivering illegal stolen identity information...
View ArticleBy 2019, Almost Half of All Cell Phone Calls Will Be Fraudulent
Robocalls reached a record 3.36 billion in April of 2018, according to the voicemail and cell blocking app YouMail. That equates to 1,297 calls placed each second.
View ArticleCyber Security and Brand Protection Are Team Sports (Fortalice)
Sponsored by Fortalice As this holiday season approaches, are you ready to stand with your IT security counterparts and protect the brand? How many of you have a working relationship with your IT...
View ArticleThe ‘Why’ behind Intellectual Property Theft Cases
It’s important to consider how a sense of entitlement can motivate wrongdoing, according to experts. For many of today’s workers, experts say, it’s not stealing at all—it’s leaving with what’s theirs.
View ArticleIncreased Corporate Data Security Spending Underscores Need for Personal Data...
Data security is a task that only the government and business leaders need to worry about, right? Wrong!
View ArticleLPM Insider’s Top 5 Data Protection Articles of 2018
Posts about Facebook security, cyber risk trends, and scam artists past and present all made it into the top five for the data protection category.
View Article