Retailers – Why Include Encryption?

Retail is the most culpable industry for data-loss in 2014. Retailers have reason to be scared.

The spate of data breaches is relentless and unforgiving. Data breach concerns run headstrong into the reality that consumers assume their personal data and their bank balances are safe. More and more people are switching to debit and credit cards, or even their mobile phones, to pay when they shop. With the 2014 holiday season right around the corner, organizations cannot afford the brand damage or loss of market share a data breach evokes.

Based on front-line experience providing data security solutions, WinMagic offers 5 key observations and lessons on the unique security challenges facing retailers and details proactive steps and strategies to implement to avoid a data breach.

Download the eBook today and learn from experts
the 5 steps to avoid a major data breach!

Download now

Previous Post
Does your Organization have a BYOD Policy?
Next Post
‘Tis the Season… to Watch Out for Breaches

Related Posts

“Extracting BitLocker keys from a TPM”

(Pre-Boot Authentication: Wisdom in Security – Part 3) In my September 2018 blog “Pre-Boot Authentication. Wisdom in Security Part 2”  I concluded that: “Bottom Line: ‘No PBA’ is not a wise choice for enterprises Microsoft’s reasoning that you don’t need…

620,000 reasons to encrypt

I’ve talked about it before and as an organization we’re constantly trying to tell people and organizations that encryption should be the first line of defense for data on portable devices such as laptops. And yet again, we’re seeing a…
Read more

PCI DSS 3.0 and Encryption

Version 3.0 of PCI DSS (Payment Card Industry Data Security Standard) was released in November 2013 and now that version 2.0 became inactive at the end of last year all organizations should have made the transition to version 3.0. (more…)
Enterprise Encryption for Linux

Enterprise Encryption for Linux

Linux has built in encryption for several years now, yet enterprises still struggle with encryption on Linux laptops.  Why is that? To answer this question, let’s first review the disk encryption capabilities that are built into Linux: (more…)

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu