<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / protecting</title>
<link>http://netvouz.com/lillymark/tag/protecting?feed=rss</link>
<description>lillymark&#39;s bookmarks tagged &quot;protecting&quot; on Netvouz</description>
<item><title>Avoid Serious Repercussions by Effectively Combating Enterprise Spear Phishing</title>
<link>http://www.articlesnatch.com/Article/Avoid-Serious-Repercussions-by-Effectively-Combating-Enterprise-Spear-Phishing/6181883</link>
<description>Spear-phishing isn&#39;t going anywhere, for as long as people use social networks and email continues to be a key workplace communication channel, spear-phishing will be a weapon of choice for cybercrime, and tacklingtargeted spear phishing attacks is a major challenge for corporations as it is aimed at people and not at the technology.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 30 Oct 2013 06:15:52 GMT</pubDate>
</item><item><title>Detect &amp; Monitor Phishing Incidents with Effective Anti-Phishing Solutions</title>
<link>http://goarticles.com/article/Detect-and-Monitor-Phishing-Incidents-With-Effective-Anti-Phishing-Solutions/7914012/</link>
<description>The frequencies in the high profile security breaches across the globe are mainly because of the increase in the sophisticated hacking attacks in recent times. Phishing attacks are on the rise and are one of the key risk areas that organizations need to develop specific control measures.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 16 Oct 2013 06:05:37 GMT</pubDate>
</item><item><title>Protect Your Company against Phishing with the Right Solution</title>
<link>http://issuu.com/phishnix/docs/protect_your_company_against_phishi</link>
<description>The increase in the convenience of technology has also brought with it a distressing increase in cybercrime rates and security breaches over the years. Phishing - a scam that generates billions of dollars threatening the integrity of online transactions between customers and e-business houses, these advanced and targeted security attacks are becoming one of the most commonly employed techniques to spread malware.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 30 Oct 2013 06:38:27 GMT</pubDate>
</item><item><title>Technology Created Specifically to Protect against Phishing Attacks</title>
<link>http://mywikibiz.com/Technology_Created_Specifically_to_Protect_against_Phishing_Attacks</link>
<description>Phishing refers to the “act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” However, most of the people do not consider phishing as a real threat.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 04 Sep 2013 04:29:10 GMT</pubDate>
</item><item><title>Estuate Saves Lives by Protecting Critical FDNY Data</title>
<link>http://www.estuate.com/success-stories/estuate-saves-lives-by-protecting-critical-fdny-data-success-story</link>
<description>Download the success story to learn how Estuate worked with FDNY to create an in-house Disaster Recovery (DR) capability, ensuring there is no loss of data if the production database fails.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 23 Sep 2013 04:51:38 GMT</pubDate>
</item><item><title>Global Information Risk Management (IRM) company Announces Partnership with Exafort to Offer Information Security and Risk Mana</title>
<link>http://aujas.com/news_details.aspx?id=85</link>
<description>The solution and services includes Compliance &amp; Risk Management, Data Protection, Identity Management Solution, Network-Based Security and User Education. This offering will help Cloud services customers protect sensitive data and address concerns of security, compliance and privacy.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 24 Sep 2012 10:26:27 GMT</pubDate>
</item><item><title>Protecting PHI on Mobile Devices Not to be taken Lightly</title>
<link>http://www.egestalt.com/blog/2014/05/05/protecting-phi-on-mobile-devices-not-to-be-taken-lightly/</link>
<description>Although there has been enough and more said about the importance of encryption in safeguarding protected health information (PHI), data breaches resulting due to lack of encryption seem to still be occurring. Almost every other day there is a new headline about a healthcare institution or a hospital encountering a HIPAA breach</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 06 May 2014 11:00:23 GMT</pubDate>
</item><item><title>Protecting PHI on Mobile Devices Not to be taken Lightly</title>
<link>http://www.egestalt.com/blog/2014/05/05/protecting-phi-on-mobile-devices-not-to-be-taken-lightly/</link>
<description>Although there has been enough and more said about the importance of encryption in safeguarding protected health information (PHI), data breaches resulting due to lack of encryption seem to still be occurring. Almost every other day there is a new headline about a healthcare institution or a hospital encountering a HIPAA breach</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 06 May 2014 11:01:26 GMT</pubDate>
</item></channel></rss>