by SecureKey | Mar 27, 2014 | Passwords and Credentials
The biggest difference between proactive security procedures and reactive ones can be directly tied to the financial damages that come with a major instance of data loss. Some firms will view privacy issues as rare and, as a result, decide to not pay much mind or...
by SecureKey | Mar 27, 2014 | Authentication
Financial services firms have been highly aggressive in their pursuits of advanced banking and transaction technology in the past several years, and as data tends to be sensitive in this sector, access controls have been a focal point of priorities. From mobile...
by SecureKey | Mar 26, 2014 | Privacy
The retail sector has been among the worst performers in the access control arena for the past several months, as several domestic and international organizations have fallen victim to significant data breaches. Target has been labeled as the biggest single loss...
by SecureKey | Mar 25, 2014 | BYOD
The health care sector has been a hotbed for technological innovation in recent years, as more providers adopted novel tools such as cloud computing, electronic medical records and mobile devices to improve patient care and drive efficiency. Organizations in this...
by SecureKey | Mar 19, 2014 | Authentication
Banks continue to become more technology-dependent, and have commonly launched a variety of new strategies that work to capitalize on consumer interest for mobile applications. While mobile banking and payment processing has been a rapidly growing trend in Canada, the...