Home Data Protection

Data Protection

retail data management

Taking a Dip into Retail Data Management

As we increasingly turn to data for the insights that drive our decisions, we do so with the assumptions that the data is available to us, we can use it, and—even more importantly—that it is correct. None of this happens without excellent retail data management. (Bonus: LPM Podcast content!)
SD card

Is Your Data Protected Against These 4 Risks?

According to the 2018 Cost of Data Breach study, the retail industry ranked fifth in frequency of data breaches. Since the dawn of the digital age, we've fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers.
Data Protection training

8 Cybersecurity Predictions for Retail in 2019 and Beyond

Managing cybersecurity risks while balancing the appropriate prevention will continue to play a major role throughout all sectors. The need to have advanced response plans to a cyber incident come to the forefront in 2019.
hacktivist

LPM Insider’s Top 5 Data Protection Articles of 2018

Posts about Facebook security, cyber risk trends, and scam artists past and present all made it into the top five for the data protection category.
corporate data security

Increased Corporate Data Security Spending Underscores Need for Personal Data Protection

Data security is a task that only the government and business leaders need to worry about, right? Wrong!
intellectual property theft cases

The ‘Why’ behind Intellectual Property Theft Cases

It’s important to consider how a sense of entitlement can motivate wrongdoing, according to experts. For many of today’s workers, experts say, it’s not stealing at all—it’s leaving with what’s theirs.

Cyber Security and Brand Protection Are Team Sports (Fortalice)

Sponsored by FortaliceAs this holiday season approaches, are you ready to stand with your IT security counterparts and protect the brand? How many of...

By 2019, Almost Half of All Cell Phone Calls Will Be Fraudulent

Robocalls reached a record 3.36 billion in April of 2018, according to the voicemail and cell blocking app YouMail. That equates to 1,297 calls placed each second.
information security policy, fraud with credit cards

How to Establish an Effective Information Security Policy

There must be unwavering support by the leaders at the highest level of the organization in order for an information security policy to weave itself into the day-to-day operations of the business. This will only happen if the policy reflects core business objectives.

Catch Me If You Can: Scam Artists Past and Present

Similar to eBay's process, dark web sellers often solicit and publish customer feedback so perspective buyers can evaluate the criminal's reputation for delivering illegal stolen identity information as described. How's that for honor among thieves?

Stay Updated

Get critical infromation for loss prevention professionals, security and retail management delivered right to your inbox.