Quantcast
Channel: Data Protection – Loss Prevention Media
Browsing all 130 articles
Browse latest View live

What is Cryptocurrency and How Does It Work?

Since the Bitcoin boom of 2017, more people than ever have become interested in cryptocurrency, going so far as to buy it as a form of investment. But cryptocurrency was not designed to be bought and...

View Article


Image may be NSFW.
Clik here to view.

Are RFID-Blocking Wallets Necessary to Prevent Credit Card Theft?

The security threat from an airborne information transfer is obvious—any in-range reader could capture the same information.

View Article


Image may be NSFW.
Clik here to view.

E-commerce Grows and Risk Follows. What to Look for in 2021

A core principle in e-commerce security is that more fraud always accompanies more transactions, increasing retailers' risk.

View Article

Image may be NSFW.
Clik here to view.

In Search of a Better Customer Experience, Retailers Create Cyber...

As retailers expand their online operations, the sheer expanse of their attack surface makes protection more difficult.

View Article

Image may be NSFW.
Clik here to view.

Genetec Helps Ensure Organizations Don’t Have to Choose between Privacy and...

“Organizations should never have to choose between protecting the privacy of individuals and their physical security,” said Pierre Racz of Genetec.

View Article


Image may be NSFW.
Clik here to view.

What You Need to Know about the Cyber-Espionage Attack Linked to Russia

The hackers infiltrated systems in the private and public sectors by adding malware to a legitimate software update from SolarWinds.

View Article

Image may be NSFW.
Clik here to view.

How Internet of Things Security Is Impacting Retailers

The need for retailers to have a robust process for gaining control over Internet of Things security is only growing.

View Article

Image may be NSFW.
Clik here to view.

Why Retailers Should Reach Out to an Ethical Hacker

The world of retail tends to move in cycles—perhaps using an ethical hacker is the next trend in retail security and data protection.

View Article


Image may be NSFW.
Clik here to view.

T-Mobile’s Recent Data Breach and Two-Factor Authentication

T-Mobile's recent data breaches shows the faults in 2FA using SMS.

View Article


Image may be NSFW.
Clik here to view.

An A-Z Plan for Corporate Cybersecurity Success

As cyberattacks increase and become more dangerous, every company must have a solid cybersecurity game plan in place, then follow it closely.

View Article
Browsing all 130 articles
Browse latest View live