social software media

Results 26 - 30 of 30Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Mar 29, 2011
Wondering how you can use social media channels to join the conversation with your customers? Find out how software solutions can help you capture and analyze massive amounts of social media data and prepare individualized responses while integrating with your business software through a unified IT architecture.
Tags : 
social media intelligence, social media channel, sap, sap business objects dashboard
    
SAP
Published By: Jive     Published Date: Feb 13, 2014
Becoming a social business: integrating social software throughout enterprise
Tags : 
jive, social business, social software, social, social media
    
Jive
Published By: Jive     Published Date: Feb 13, 2014
Changing the Face of Healthcare with Social Business Software
Tags : 
jive, social, social business software, social media, healthcare
    
Jive
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, itís online fraud to the highest degree. Although itís been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: