Filter by:
Sort by:
Tags
Tags
  1. Employee Education,Visual Hacking,Enterprise
  2. Employee Education,Visual Hacking,Enterprise,Case Study
  3. Whitepaper,Data Security,Enterprise
  4. Case Study,Employee Education,Enterprise
  5. Whitepaper,Employee Education,Healthcare
  6. Whitepaper,Visual Hacking,Healthcare
  7. Case Study,Employee Education,Healthcare
  8. Whitepaper,Mobile Worker,Finance
  9. Whitepaper,Employee Education,Finance
  10. Case Study,Employee Education,Finance
  11. Whitepaper,Cloud,Education
  12. Whitepaper,Education
  13. Whitepaper,Data Security,Education
  14. Whitepaper,Data Security,Government
  15. Whitepaper,Mobile Worker,Government
  16. Whitepaper,Employee Education,Government
  17. Whitepaper,Mobile Worker,Data Security,Enterprise
  18. Whitepaper,Visual Hacking,Enterprise
  • Visual Privacy Readiness Checklist

    Educate your organization's workforce, create specific policies, and provide solutions to help prevent breaches.

    December 1, 1901 Enterprise Employee Education,Visual Hacking,Enterprise Visual Privacy Readiness Checklist
  • Case Study: Global Beverage Company

    As a U.S.-based company with global reach, the protection of visual privacy is a top concern for executives.

    December 1, 1901 Enterprise Employee Education,Visual Hacking,Enterprise,Case Study Case Study: Global Beverage Company
  • Whitepaper: Three High Risk Employees Compromising Company Security

    Separating employees into risk groups can help when building an operational strategy around visual privacy.

    December 1, 1901 Enterprise Whitepaper,Data Security,Enterprise Whitepaper: Three High Risk Employees Compromising Company Security
  • Case Study: Global Management Consulting Firm

    A Global Management Consulting Firm took steps to reduce the risk of visual hacking by employing the use of privacy filters.

    December 1, 1901 Enterprise Case Study,Employee Education,Enterprise Case Study: Global Management Consulting Firm
  • Whitepaper: Healthcare and the Importance of Visual Privacy

    The healthcare industry has gone through a data revolution over the past decade. Addressing visual privacy is more important than ever.

    December 1, 1901 Healthcare Whitepaper,Employee Education,Healthcare Whitepaper: Healthcare and the Importance of Visual Privacy
  • Whitepaper: How to Respond to a Visual Privacy Breach in Healthcare

    Learn how to build a response plan to secure medical data when a visual privacy incident is reported to limit potential harm to patients.

    December 1, 1901 Healthcare Whitepaper,Visual Hacking,Healthcare Whitepaper: How to Respond to a Visual Privacy Breach in Healthcare
  • Case Study: National Retail Pharmacy Chain

    A National Retail Pharmacy Chain uses privacy filters to supplement their compliance program with healthcare industry regulations and provides privacy training and education to employees.

    December 1, 1901 Healthcare Case Study,Employee Education,Healthcare Case Study: National Retail Pharmacy Chain
  • Dealing with the Careless Mobile Worker

    The office without walls, coupled with the vast consumerization of devices that can now access the organizational infrastructure without actually being issued by the company, has become a troublesome recipe for carelessness and data exposure.

    December 1, 1901 Finance Whitepaper,Mobile Worker,Finance Dealing with the Careless Mobile Worker
  • Financial Services: The Need for Visual Privacy

    In the financial services industry, the protection of customer data and internal financial statements is non-negotiable.

    December 1, 1901 Finance Whitepaper,Employee Education,Finance Financial Services: The Need for Visual Privacy
  • Case Study: National Retail Bank

    A National Retail Bank was able to pinpoint weak points within the organization, develop a stronger visual privacy policy and better protect against visual hacking.

    December 1, 1901 Finance Case Study,Employee Education,Finance Case Study: National Retail Bank
  • Cloud Computing in Education: Rewards and Risks

    Institutions of higher education expect to cut 20% of their IT budget by moving applications to the cloud

    December 1, 1901 Education Whitepaper,Cloud,Education Cloud Computing in Education: Rewards and Risks
  • Whitepaper: Helping Prevent Cheating in the Technology Enabled Classroom

    Cheating in schools has become easier and more prevalent in recent years.

    December 1, 1901 Education Whitepaper,Education Whitepaper: Helping Prevent Cheating in the Technology Enabled Classroom
  • Whitepaper: An Enterprise Visual Privacy Maturity Model (VPMM)

    With the explosive growth in worker mobility, enterprises are faced with more screens in public places.

    December 1, 1901 Education Whitepaper,Data Security,Education Whitepaper: An Enterprise Visual Privacy Maturity Model (VPMM)
  • How the Government’s Joint Information Environment Creates Secure Mobile Communications

    The Department of Defense and its key Information Technology players, including the Defense Information Security Agency and the DoD Chief Information Officer, are embarking on a new enterprise technology project designed to increase the efficiency of the US military in peace, crisis and war.

    December 1, 1901 Government Whitepaper,Data Security,Government How the Government’s Joint Information Environment Creates Secure Mobile Communications
  • Strengthening Security Protocols for Mobile Federal Government Employees

    The federal government sees the use of mobile devices as fundamental for its’ agencies.

    December 1, 1901 Government Whitepaper,Mobile Worker,Government Strengthening Security Protocols for Mobile Federal Government Employees
  • Whitepaper: Visual Privacy, an Under-Addressed Yet Critical Protection Area for the Federal Government

    There is both a critical need and a basic expectation that the federal government will keep sensitive and classified information secure. But how is visual privacy being addressed?

    December 1, 1901 Government Whitepaper,Employee Education,Government Whitepaper: Visual Privacy, an Under-Addressed Yet Critical Protection Area for the Federal Government
  • Whitepaper: What New Mobile Technology Means to Your Company's Data Security Policy

    The explosion of powerful mobile devices over the past few years has put them front and center in a number of enterprises as employees begin to demand they be incorporated into the corporate workflow.

    December 1, 1901 Enterprise Whitepaper,Mobile Worker,Data Security,Enterprise Whitepaper: What New Mobile Technology Means to Your Company's Data Security Policy
  • Whitepaper: Three In-Practice Approaches to Defending Against Visual Hacking

    One critical area of data-in-use protection is Visual Privacy, the act of protecting sensitive, confidential and private information from Visual Hacking, or the act of viewing or capturing sensitive, confidential and private information for unauthorized use.

    December 1, 1901 Enterprise Whitepaper,Visual Hacking,Enterprise Whitepaper: Three In-Practice Approaches to Defending Against Visual Hacking
Load More