Clicky Web Analytics

Bad Actors Work Well Outside of Hollywood
Author: Michael Osterman on April 17, 2014 - 10:15 PM
messaging wire osterman michael

Criminals and other bad actors are rapidly evolving their online identity fraud techniques to move quickly and commit their crimes. More hackers and bad actors are attacking enterprises than ever before, fueling a sense of urgency around finding timely solutions to reduce risk for online services, credit card processors, e-commerce merchants and consumers. Consequences include:

· Cybercriminals signing up for new accounts using fraudulent information including bogus user names, email addresses, and domains. This access readies attacks against online service providers and can quickly damage a trusted brand’s reputation

· Bad Actors hijack legitimate registered customer accounts using valid customer login and password data. All for unlawful purposes such as sending high volumes of spam to distribute malicious software or phishing scams designed to defraud consumers of financial information by masquerading as a trustworthy entity.


 
Do You Archive Content From Mobile Devices?
Author: Michael Osterman on April 10, 2014 - 11:27 PM
messaging wire osterman michael

One of the most important shifts in corporate work over the past several years has been the adoption of mobile devices in the workplace and the impact this has had on how employees do their jobs. Consider:

· Our research found that 33% of the typical information worker’s time is spent doing work on a mobile device.

· We also found that 42% of work-related content is accessed via mobile devices, while 31% of content is created on mobile devices.

· A growing number of users have deployed mobile applications and cloud-based storage repositories that house corporate content without any sort of IT oversight.

Despite the rapid growth in the proportion of work that is now being accessed and created on mobile devices, our research found that only 50% of the work generated on a mobile device is actually ever archived to a central corporate location so that it is accessible for eDiscovery, regulatory compliance or other purposes.

 
messaging wire engineers discussing messaging wire
Reader's Comments
Messaging Wire Columns



messaging wire