identity theft

Results 1 - 25 of 75Sort Results By: Published Date | Title | Company Name
By: Akamai Technologies     Published Date: May 07, 2018
Learn about Akamai Cloud Security Solutions Akamai’s web application firewall and DDoS solutions include easy-to-deploy, low-maintenance solutions for enterprises.
Tags : identity, theft, revenue, technical, support, data, confidential
     Akamai Technologies
By: LifeLock     Published Date: Jan 17, 2018
Download this whitepaper for a few tips that brokers can benefit from. In this article, Dennis Connor III, vice president of voluntary benefits for Tompkins Insurance Agencies in Batavia, New York, discusses his views on how benefit brokers can be more effective in positioning identity theft protection with their clients.
Tags : 
     LifeLock
By: IBM     Published Date: Oct 26, 2017
The right identity and access management solution can integrate with a healthcare provider’s EMR system to help keep sensitive medical data safe—and keep the organization compliant. It can provide valuable insights and visibility into accounts, access privileges and entitlements, across the wide range of users. By closing the gaps in identity protection, organizations can fight the threats of inadvertent misuse and intentional theft that may lead to security breaches.
Tags : healthcare, electronic medical records, access management solutions, identity protection, medical data
     IBM
By: Key Private Bank     Published Date: Aug 23, 2017
"The latest Key Private Bank whitepaper takes a deeper look at the types, methods and impacts of fraud and identity theft - and how you can prepare and protect your family and your wealth from this growing threat. ©2017 KeyCorp. E89861 170620-248192"
Tags : identity theft, fraud, wealth protection, fraud prevention, prepare, cybercrime, cyberattack, phishing, types of fraud
     Key Private Bank
By: LifeLock     Published Date: Feb 24, 2017
ID Theft impacts presenteeism, absenteeism, and productivity. Improve employee retention and engagement and help drive greater employee value through a high-touch benefit.
Tags : 
     LifeLock
By: LifeLock     Published Date: Feb 24, 2017
If you’re not offering identity theft protection services as part of your portfolio, your competition could be.
Tags : 
     LifeLock
By: LifeLock     Published Date: Feb 24, 2017
The essential employee benefit is identity theft protection. If you want to attract and retain the best talent and help protect them from identity theft, include the best employee benefit.
Tags : 
     LifeLock
By: LifeLock     Published Date: Feb 24, 2017
Identity theft among your employee populsation can result in hundreds of hours in lost productivity. Many employers are choosing to protect their workforce with today's essential benefit - identity theft protection. Find out how you can help now.
Tags : 
     LifeLock
By: LifeLock     Published Date: Feb 24, 2017
Identity theft (IDT) is a critical concern for people around the world. Providing identity theft protection as an employee benefit helps safeguard employees from fraud, scams and threats to their personal credit ratings. And, this low-cost benefit can make your employment benefits package more attractive. In this program, Todd Davis, founder of LifeLock, discusses the options for identity theft coverage, how to drive participation in such coverage and how to use your IDT benefit to improve employee retention and engagement.
Tags : 
     LifeLock
By: Cox Business     Published Date: Dec 19, 2016
Exposing data or suffering downtime not only creates risks to patient safety, supports identity theft and damages the hospital's reputation, but can also result in signi?cant HIPAA penalties. The costs include the time your staff spends responding to the attack and lost productivity when systems are unavailable or work needs to be redone. Investing in computer and network security is a smart ?nancial decision for hospitals.
Tags : 
     Cox Business
By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : est practices, identity theft, security, protection
     LifeLock
By: LifeLock     Published Date: Aug 23, 2016
ID theft has escalated to an all-too-possible nightmare that involve weeks, if not months, to resolve. Download this practical comparison guide to learn what are challenges exist and the key benefits for employers to look for in selecting a partner. Compare now!
Tags : best practices, identity theft, security, protection, business technology
     LifeLock
By: LifeLock     Published Date: Aug 23, 2016
This eBook focuses on the benefits of offering identity theft protection through the workplace, including reducing risk, streamlining remediation and choosing the right partner.
Tags : best practices, identity theft, security, protection, business technology
     LifeLock
By: LifeLock     Published Date: Aug 23, 2016
Every employee has a risk of having their identity stolen. Provide your employees with identity theft management by offering LifeLock.
Tags : best practices, identity theft, security, protection, business technology
     LifeLock
By: LifeLock     Published Date: Aug 23, 2016
While most employers provide employees with protection for healthcare, accident and illness, many employees are missing protection for identity theft. Employers can now add value to their benefit package and help keep employees protected while on the job.
Tags : cyber crime, best practices, identity theft, security, protection, business technology
     LifeLock
By: LifeLock     Published Date: Aug 23, 2016
The impact of data breaches and identity theft on a business cannot be overstated. Offering identity theft protection is one solution. Discover how to help protect your business and your employees if they have a non-employer related fraud attack.
Tags : best practices, identity theft, security, protection
     LifeLock
By: LifeLock     Published Date: Aug 23, 2016
In an always-on, ever connected world, the risk of identity theft is real. There is a new identity fraud victim every two seconds. LifeLock identity theft protection helps safeguard against identity fraud by monitoring millions of transactions per second provide services that remediation-only or credit monitoring-only services don’t offer – with no benefit deductible or service co-pay.
Tags : best practices, identity theft, security, protection, business technology
     LifeLock
By: LifeLock     Published Date: May 10, 2016
ID theft has escalated to an all-too-possible nightmare that involve weeks, if not months, to resolve. Download this practical comparison guide to learn what are challenges exist and the key benefits for businesses to look for in selecting a partner. Compare now!
Tags : 
     LifeLock
By: Thawte     Published Date: Oct 06, 2015
The cost of cybercrime in the UK has reached a staggering £27bn – but what’s the actual threat to your business? From data breaches, phishing and spam, to identity theft, malware and vulnerabilities - learn how they can damage your business and the steps you can take to protect yourself.
Tags : cybercrime, business threats, phishing and spam, identity theft, security
     Thawte
By: Thawte     Published Date: Oct 06, 2015
40% der deutschen Unternehmen sind in den vergangenen zwei Jahren Opfer von Internetkriminalität geworden. Doch wie genau wird Ihr Unternehmen bedroht? Von Datenlecks, Phishing und Spam bis hin zu Identitätsdiebstahl, Malware und Schwachstellen: Informieren Sie sich über die möglichen Auswirkungen dieser Bedrohungen auf Ihr Unternehmen und geeignete Schutzmaßnahmen in unserem neuen Leitfaden von Thawte.
Tags : cybercrime, business threats, phishing and spam, identity theft, security
     Thawte
By: Thawte     Published Date: Oct 06, 2015
Au Royaume-Uni, le coût de la cybercriminalité a atteint le chiffre record de 27 milliards de livres. Mais quelle est la menace réelle pour votre entreprise? Violations de données, usurpation d’identité, phishing, spams, malwares, vulnérabilités... découvrez l’ampleur du risque et les mesures à prendre pour vous protéger.
Tags : cybercrime, business threats, phishing and spam, identity theft, security
     Thawte
By: Okta     Published Date: Apr 29, 2015
2014 was a banner year for security breaches. According to the Identity and Theft Research Center, there were 783 reported U.S. data breaches, a 27.5% increase from 2013. Keeping your company and customer data safe is no longer just an IT problem; it's a top concern for C-level executives as well. Your company's reputation and bottom line depend on keeping corporate data secure — yet employee mobility is making this a huge challenge. Read this eGuide to learn how to avoid these challenges with simpler, smarter authentication.
Tags : theft, research center, c-level, okta, theft research, security, it management
     Okta
By: IBM     Published Date: Apr 09, 2015
IBM Security Trusteer solutions provide a layered security approach that can help overcome the pitfalls of two-factor authentication. They can help identify the root cause of malware and phishing attacks, defend against identity theft and thwart the evolving tactics of today’s fraudsters.
Tags : security, ibm, two factor identification, layered security, verification, phishing, malware, identity theft
     IBM
By: LifeLock     Published Date: Mar 02, 2015
Learn about what each of our identity theft protection services has to offer, so you can choose the service that’s right for you.
Tags : 
     LifeLock
By: LifeLock     Published Date: Mar 02, 2015
Today’s workers and consumers conduct more transactions online and through mobile devices than ever before. Their always-connected lifestyles free them to work and play as they like, but may increase the risk of identity fraud.
Tags : 
     LifeLock
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com