Premium Banking Content
-
Reducing The Threat Of Stolen And Compromised Credentials
6/1/2016
Compromised and stolen credentials continue to be a thorn in the life of the health IT security professional. A recent Cloud Security Alliance survey found more than 65 percent of respondents believed compromised credentials would be the root cause of a security breach.
-
What Banks Can Learn From Recent Data Breaches
11/25/2014
It’s good to learn from your own mistakes, but it’s better to learn from someone else’s. In the case of banks — and those in charge of their IT security — it’s much better to learn from the mistakes of JPMorgan and other recent high-profile victims, as opposed to making similar mistakes yourself.
-
Threat Report Concludes: Services Providers Must Become Security Providers
5/9/2014
Jeffrey Lyon, the founder of Black Lotus, discusses the findings of his company’s recent Q1 2014 Threat Report.
-
Mobile POS Hardware: Alternatives To The iPad/iPhone
8/20/2013
Frank Riso, senior director of global lead retail for Motorola Solutions, discusses mobile point of sale solution options.
-
CIT Builds A Strong Managed Services Foundation With Automation Platform
8/6/2013
Computer Integration Technologies (CIT) is a comprehensive IT services firm with an impressive portfolio of offerings – from application training, to hardware products and services, to software development and more. Nearly 10 years ago, it added managed services into the mix, recog- nizing the growing market opportunity for supporting its SMB (small to midsize business) customers around the clock under a monthly fee arrangement.
-
Managed Services: Why It's Good For Business
7/3/2013
As technology becomes increasingly complex, more companies are outsourcing their IT management and maintenance functions. The idea of outsourcing IT has become so appealing that worldwide spending for IT outsourcing is increasing. IT service providers are responding to this growing need by introducing a new business model, managed services, which can take the burden of IT management off their clients’ back. This eBook provides an overview of managed services and outlines steps you can take to add managed services to your IT service offering.
-
PCI Compliance Is More Than A Matter Of Dollars (And Sense)
6/21/2013
Are Your Clients Properly Protected Against Lost or Stolen Data?
-
IP Video For SMBs
6/11/2013
Rapid growth using limited available resources presents plenty of challenges for small to medium-sized businesses (SMB), and the challenges extend to their choice of video surveillance systems. In contrast to large companies that can target personnel and resources to specialized areas, SMB customers often have to make do with less and call on their employees to wear “multiple hats.”
-
Key Characteristics Of A Tremendous Payment Processing Partner
5/31/2013
Through the 1990s, evaluating payment partners was as easy as sorting out the revenue offering–a simple question of who will pay the biggest share of the profit on merchants signed together. In the 2000s, additional values like gift card solutions, PCI security strategies and mobile payment options became important measuring sticks when deciding how to participate most effectively in the valuable revenue stream represented by your customers’ merchant accounts.
-
4 EMV Facts That POS VARs Overlook
5/31/2013
EMV has seen huge success in Europe and is quickly making its way to the U.S., presenting huge opportunities for VARs. EMV cards utilize an embedded chip to encrypt data for each and every transaction. The chip is activated electronically and can alternate between verification methods, whether prompting the user for a pin (chip and pin) or a signature to complete the transaction. Although MSR has been a huge component of the POS landscape in past years, there are several key reasons why EMV needs to be on every POS VAR’s radar moving forward.