A guide to securing remote access in financial services

In hacking circles, financial services organisations are a prime target – as the rewards can be substantial. This has meant IT departments in financial services have been wary of establishing remote working policies.

This whitepaper from CensorNet examines the typical examples of cyber threats facing financial services organisations, regulatory concerns, and best practices for securing remote...

Employee communications and the deskless revolution

Thanks to an ongoing paradigm shift in the way we approach work, people are spending more and more time working from a location other than their office desk. With the latest advancements in technology and communication, we can communicate with employees no matter where they are at any time.

So what does this mean for corporate communicators? How do we maintain productivity, influence company culture, and engage our employees in this deskless revolution?

This whitepaper from...

Analysing compliance in the finance industry (Français)

If you work in the finance industry, you'll already be familiar with how 'tickbox' courses work. A set of slide titles down the side; a narration that more than likely just repeats what's written on the slides; an easy multiple choice question at some point to 'prove' that employees understand the course; and a metaphorical tick at the end. Well done, you've ticked off compliance.

But who is that helping - and is it even helping the employer? This...

Analysing compliance in the finance industry (Español)

If you work in the finance industry, you'll already be familiar with how 'tickbox' courses work. A set of slide titles down the side; a narration that more than likely just repeats what's written on the slides; an easy multiple choice question at some point to 'prove' that employees understand the course; and a metaphorical tick at the end. Well done, you've ticked off compliance.

But who is that helping - and is it even helping the employer? This...

Analysing compliance in the finance industry

If you work in the finance industry, you'll already be familiar with how 'tickbox' courses work. A set of slide titles down the side; a narration that more than likely just repeats what's written on the slides; an easy multiple choice question at some point to 'prove' that employees understand the course; and a metaphorical tick at the end. Well done, you've ticked off compliance.

But who is that helping - and is it even helping the employer? This...

Building a business case for an employee communications app

If you are putting together a communications mobile project, building a well thought-out business case to get executive and stakeholder buy-in is the most important step to your success.

This whitepaper from Sitrion examines the importance of internal communications to the strategic direction and success of your organisation, as well as providing a how-to guide to help make the business case for your employee communications app...

The most powerful ways to have an impact on employee engagement

An engaged workforce is a critical component to the success of your company. When employees are engaged and behind your vision and strategy, they are more motivated and focused on your organisation’s business goals.

This whitepaper from Sitrion looks at the best practices for increasing employee engagement, and how mobile technology can play a pivotal role in internal...

The top five pitfalls to avoid in your data protection strategy

Done correctly, data protection is a critical differentiator for your business. Done poorly, it can be costly, waste valuable staff time, and hold the organisation back from meeting key service level agreements.

This whitepaper from Veritas outlines five critical pitfalls to avoid when building a successful data protection strategy for your...

Examining the escalating threat of DDoS attacks

DDoS attacks have evolved into sophisticated multi-vector attacks at the network and application layers that can deplete resources very quickly and generate major service outages. Any enterprise and government organisation is at risk from the escalating threat of DDoS attacks. Download the White Paper from A10 to learn:

The evolution of DDoS attacks: more massive, more sophisticated, more devastating How volumetric attacks target bandwidth and network components How application attacks...

Validating DDoS threat protection: Ensuring your solution works in real-world conditions

Multi-vector DDoS attacks are overwhelming traditional security solutions and as a result, existing DDoS defense strategies must be re-evaluated. New DDoS solutions require horsepower and capabilities to deal with the volume and complexity of simultaneous attacks.


Download this whitepaper, Validating DDoS Threat Protection, to learn:

Classification of DDoS attack types An approach on how to effectively mitigate DDoS Attacks The importance of Performance Validation to ensure...