Data theft

Results: 1222



#Item
11Computing / Technology / Computer hardware / Intel vPro / Laptops / Intel / Out-of-band management / Intel AMT versions / Centrino

Protect Laptops and Data with Intel® Anti-Theft Technology It’s not your laptop. It’s your business. Lock it tight. Technology Brief for IT Professionals 3rd generation Intel® Core™ processor family Intel® Anti-

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2013-04-17 10:42:14
12Identity documents / Misconduct / Crime / Identity theft / Human behavior / Fraud / Identity fraud / Genealogy / Association of Professional Genealogists / Birth certificate / Phishing / Data breach

Microsoft Word - Case for Open Public Records.doc

Add to Reading List

Source URL: www.apgen.org

Language: English - Date: 2014-03-23 19:56:49
13Prevention / Security / Data security / Safety / Identity documents / Computer security / National security / Registered Traveler / Transportation Security Administration / Privacy / Internet privacy / Identity theft

Verified Identity Pass, Inc. (“VIP”), the former owner and operator of the Clear Registered Traveler program, ceased operations on June 22, 2009. Through bankruptcy court proceedings, VIP is selling its assets to Alc

Add to Reading List

Source URL: img.clearme.com

Language: English - Date: 2015-08-19 09:50:28
14Economy / Business / Employment compensation / Labour economics / Health care / Labour law / Minimum wage / Home care / Unemployment / Health insurance / Wage theft / Living wage

DATA BRIEF | FEBRUARYGiving Caregivers a Raise: The Impact of a $15 Wage Floor in the Home Care Industry Introduction Thousands of home care workers have taken to the streets

Add to Reading List

Source URL: nelp.org

Language: English - Date: 2015-03-06 20:35:14
15Security / Prevention / Secure communication / Safety / Data security / Data breach / Security breach notification laws / Identity theft / Computer security

From: To: Cc: Subject: Date:

Add to Reading List

Source URL: ouhsc.edu

Language: English - Date: 2016-04-28 10:00:22
16Security / Secure communication / Prevention / Data security / Data breach / Identity theft / Computer security / SafeNet / Anthem medical data breach / Personal Data Privacy and Security Act

BREACH LEVEL INDEX TOP BREACH RECORDS BY SOURCE SECOND QUARTER RECAP

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
17Security / Secure communication / Prevention / Data security / Data breach / E-commerce / Identity theft / Computer security / SafeNet / Anthem medical data breach / Personal Data Privacy and Security Act

BREACH LEVEL INDEX TOP BREACH RECORDS BY SOURCE THIRD QUARTER RECAP

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
18Security / Secure communication / Prevention / Data security / Data breach / Identity theft / SafeNet / Computer security / Personal Data Privacy and Security Act

FIRST QUARTER RECAPTOP BREACH RECORDS BY SOURCE Malicious insider ( 52% )

Add to Reading List

Source URL: breachlevelindex.com

Language: English - Date: 2016-08-03 15:31:24
19Misconduct / Spamming / Crime / Computing / Cybercrime / Social engineering / Identity theft / Phishing / Computer virus / Computer security / Email spam / Email

THE FACTS: PHISHING AND SPEARPHISHING What is “phishing?” Email attack is the preferred method for many hackers. Verizon’s 2013 Data Breach Investigations Report found that “more than 95% of all attacks tied to s

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
20Security / Secure communication / Prevention / Data security / Data breach / Identity theft / Electronic health record / Computer security / Health Insurance Portability and Accountability Act / Mobile device management / Information privacy / Mobile app

stethoscope on keyboard laptop

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2016-01-25 16:10:03
UPDATE