Data Protection

Cyber Security and Brand Protection Are Team Sports (Fortalice)

Sponsored by Fortalice As this holiday season approaches, are you ready to stand with your IT security counterparts and protect the brand? How many of...

By 2019, Almost Half of All Cell Phone Calls Will Be Fraudulent

Robocalls reached a record 3.36 billion in April of 2018, according to the voicemail and cell blocking app YouMail. That equates to 1,297 calls placed each second.
information security policy, fraud with credit cards

How to Establish an Effective Information Security Policy

There must be unwavering support by the leaders at the highest level of the organization in order for an information security policy to weave itself into the day-to-day operations of the business. This will only happen if the policy reflects core business objectives.

Catch Me If You Can: Scam Artists Past and Present

Similar to eBay's process, dark web sellers often solicit and publish customer feedback so perspective buyers can evaluate the criminal's reputation for delivering illegal stolen identity information as described. How's that for honor among thieves?
social engineering techniques

Retailers Now Need to Watch for These Social Engineering Techniques

So what exactly is social engineering? It is the manipulation of people into performing actions or divulging confidential information. It is a confidence (con, for short) trick for information gathering, fraud, or system access.
enterprise mobility risks

3 Ways Modern Retailers Can Minimize Enterprise Mobility Risks

In an effort to give employees access to corporate resources from anytime and anywhere, an increasing number of retailers are introducing Bring Your Own Device (BYOD) programs.
document retention guidelines

9 Tips for Developing Your Document Retention Guidelines

The retention of an infinite number of documents may become both expensive and impractical. But the premature destruction of certain documents may lead to the loss of valuable information. Where's the happy medium?
data breach liability

11 Steps to Reduce Your Data Breach Liability

What follows is a top-level list of some key steps every organization should have already taken to protect against data breach liability.
cyber attack

Get Ready Now for the Cyber Attack Risks of Tomorrow

In the United States, cyber attack risks pose a greater danger to future profits than any other risk, according to a survey of 750 experts and decision-makers among the WEF’s stakeholder community.
cyber attacks on retailers

Strengthen Your Security against Today’s Cyber Attacks on Retailers

It’s impossible to remove people from the risk equation, and security awareness campaigns have an important role to play in preventing cyber attacks on retailers.

Stay Updated

Get critical infromation for loss prevention professionals, security and retail management delivered right to your inbox.

loss-prevention-cover

Before you go ...

Get critical information for loss prevention, security and retail management professionals delivered right to your inbox.

Optimizing-Your-Employee-Theft-Policy-Special-Report-exit-pop

Get your FREE "Optimizing Your Employee Theft Policy" Guide

Promoting a culture of honesty requires implementing a strong employee theft policy and internal awareness program.

What-is-Loss-Prevention-Special-Report-exit-pop

Get your FREE "What is Loss Prevention?" Guide

Read this report to discover the history of retail security and get a glimpse at the rapidly evolving loss prevention profession.

Issues-with-ORC-and-Shoplifting-exit-pop

Get your FREE "Issues with ORC and Shoplifting" Guide

The safety of store associates, customers, and millions of dollars in potential litigation rely upon understanding these issues.

Retail-Security-Free-Special-Report-exit-pop

Get your FREE "CCTV, Alarms, and Security Training" Guide

This report shows how CCTV/video and alarm systems can enhance the safety and security of retail locations.