fraud

Results 326 - 350 of 358Sort Results By: Published Date | Title | Company Name
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
Whether and organization or an individual, identity theft spells a long, expensive, and complex recovery process. However, online identity theft can be prevented with encryption software and advanced password protection.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, data security, security
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: IBM Software     Published Date: Oct 24, 2011
Read this in-depth report to find out how 117 executives of successful companies are reducing maintenance costs, downtime and safety incidents.
Tags : 
ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis, ibm data analysis, smarter planet new intelligence, rfid, sensors and actuators, epedigree, track and trace, insurance fraud, data management, data mining, knowledge management, data storage, knowledge management software
    
IBM Software
Published By: CSRSI - The Payment Advisors     Published Date: Aug 05, 2010
Most merchants don't know how to read their merchant statements. With a little knowledge, merchants can learn how to reduce their processing costs by reducing costly errors by staff, and correct errors by processors.
Tags : 
merchant processing, merchant statement, chargebacks, downgrades, fraud, pci compliance, csrsi
    
CSRSI - The Payment Advisors
Published By: SAS     Published Date: Apr 16, 2015
We often hear about how the massive volumes of data the US government collects hold a treasure trove of answers to our most challenging questions be it on population health, national security, education or how to recoup losses from tax fraud. If only the government could figure out how to make use of all that information. Texas is one example of a government that is using analytics to solve complex problems. As the case studies here demonstrate, agencies and academia in the Lone Star State are putting big data and analytics to work to eliminate waste, improve productivity and, in some cases, even enhance transparency.
Tags : 
    
SAS
Published By: SAS     Published Date: Jul 14, 2015
Case studies of organized crime rings defrauding federal subsidy programs.
Tags : 
fraud, detection, prevention, cost savings, efficiency
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
Financial institutions (FIs) must support the channels and services that consumers demand in order to remain competitive with each other and with disruptive competitors. To that end, supporting account opening, delivering new transactional features, and facilitating payments through digital channels have become table stakes. Unfortunately, the speed and convenience that these capabilities afford is a benefit to consumers and fraudsters alike. To successfully prevent fraud while retaining the benefits of offering digital financial services, FIs must understand how fraudsters are exploiting these capabilities and fight fraud with customer experience in mind.
Tags : 
finance, best practices, digital channels, demand, financial services, fraud, customer experience, business analytics, business management
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
From midsize companies and government organizations to global banks and professional sports teams, all types of organizations are using data visualization to help make sense of their data and to comprehend information quickly. Keep reading to learn how six organizations of all types and sizes are using data visualization to improve customer relationships, fight fraud and more.
Tags : 
data visualization, data, technology, fraud, security, best practices, business analytics, business intelligence, business management, data center
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
Insurance fraud has existed wherever insurance policies are written, taking different forms to suit the economic times. Today the magnitude of insurance fraud is not only startling but increasing. Recent studies by the US National Insurance Crime Bureau (NICB) reported a 24 percent rise in questionable claims for the period 2011 to 2013. The full scale of insurance fraud is not known. And if fraudulent behavior is not discovered at the time the claim is submitted, the insurer may never know it occurred. Consequently, an uninvestigated claim cant be labeled as fraudulent to investigate.
Tags : 
technology, best practices, security, analytics, insurance fraud, business analytics
    
SAS
Published By: SAS     Published Date: Apr 20, 2017
Hype and hope Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) the network of people, data, things and processes that is increasingly linked through automated connections and sensors and the future of Big Data can seem quite daunting.
Tags : 
    
SAS
Published By: Okta     Published Date: Apr 29, 2015
Creating mobile apps that capture the minds and wallets of your customers will lead to increased revenue and improved customer engagement. However, you must do so while protecting customers privacy and shielding them from fraud and other malicious activities. This report will help S&R pros understand the growing mobile authentication market and its transformative impact on customers mobile moments.
Tags : 
mobile, apps, mobile apps, s&r, fraud, okta, security, it management
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
mobile, apps, mobile apps, s&r, fraud, okta
    
Okta
Published By: NetIQ     Published Date: Jul 21, 2011
Expansion into different markets can be difficult. Read this success story about how NetIQ Directory and Resource Administrator powered NRG Energy and find out what NetIQ can do for you and your business.
Tags : 
netiq, nrg, nrg energy, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition, access control, application security, authentication, internet security, intrusion detection, intrusion prevention, policy based management, security management
    
NetIQ
Published By: Keynectis     Published Date: Aug 03, 2011
Tips for safe purchasing on the Internet. Good practices. Dangers. What to avoid. Recommendations. How can SSL help.
Tags : 
ssl, phishing, piracy, internet, fraud, e-commerce
    
Keynectis
Published By: Symantec     Published Date: Oct 02, 2012
Internet Trust Marks: Building Confidence and Profit Online
Tags : 
trust marks, online shopping, profit, fraud, phising, norton cybercrime report
    
Symantec
Published By: IBM     Published Date: Jul 24, 2012
Detect and prevent fraud by finding subtle patterns and associations in your data. IBM SPSS predictive analytics solutions have proved to be very effective at helping tax collection agencies to maximize revenues by detecting non-compliance more efficiently and by focusing investigations on cases that are likely to yield the biggest tax adjustments.
Tags : 
fraud, business, healthcare, taxes, government, ibm, spss
    
IBM
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response, security
    
Symantec
Published By: IBM     Published Date: Aug 06, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
ibm, banking, mobility, risk, mitigation, security
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
security
    
IBM
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, its online fraud to the highest degree. Although its been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: IBM     Published Date: Apr 09, 2015
This American Banker webcast, sponsored by IBM, provides new insight into cybercrime and fraud prevention. Financial institutions have invested heavily in fraud prevention technologies and programs. However, sophisticated organized crime syndicates continue to successfully attack financial institutions and their customers. These criminals adapt quickly by using advanced technology and with ever changing attack vectors to exploit information security and fraud protection gaps across payment types, banking channels, and organizational boundaries. Traditional fraud prevention technologies are simply not capable of detecting and preventing account takeover and advanced malware attacks. A new approach to counter fraud is needed.
Tags : 
finance, cyber crime, banking, security, network security, fraud prevention, anti spyware, hacker detection, internet security, security management
    
IBM
Published By: IBM     Published Date: Jul 14, 2016
Fraud can happen in any organizationbig or small even in yours. Read this e-book to learn how to identify risks in your organization. It details how and why fraud happens in many organizations, four steps to prevent and detect fraud through internal controls, and why properly designing controls is a crucial step.
Tags : 
best practices, detect fraud, business management, internal control, security, business intelligence
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, security, fraud prevention, technology, loss reduction, fraud, fraud management, knowledge management, enterprise applications
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.