RSS feed Get our RSS feed

News by Topic

online media

Results 126 - 133 of 133Sort Results By: Published Date | Title | Company Name
By: GoToTraining     Published Date: Apr 06, 2011
This new eBook by Tom Bunzel explores how to successfully take in-person training online; strategies for utilizing the Web and social media to enhance learning; and what to look for in an online training solution.
Tags : citrix gototraining, online training, online presentation, video conferencing, web social media, tom bunzel
     GoToTraining
By: GoToTraining     Published Date: Apr 06, 2011
In this eBook, Terrence Gargiulo, president of makingstories.net, explores the fundamentals of online learning, including drivers, benefits and how to create an online learning strategy that maximizes business value.
Tags : citrix gototraining, virtual learning, virtual training, online learning strategy, live online learning, social media, cbt, web-based learning
     GoToTraining
By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : pci, compliant, data, centers, engagement, connect, ecommerce, compliance
     Dell Storage
By: Adobe     Published Date: Jun 06, 2013
Video is a powerful way to reach audiences both for publishers and advertisers. You already know people are watching online video more than ever, but what are they watching? When are they watching it? What are consumers' preferred methods of watching? The Adobe Digital Index team explored these questions and other topics important to marketers and advertisers looking to make a bigger splash through the video. The research in The U.S. Digital Video Benchmark shares findings on device usage, social marketing, TV Everywhere and Ad placement
Tags : digital video, online video, digital video consumption, social media and video, tv content, online video marketing
     Adobe
By: uberVU via HootSuite     Published Date: Apr 23, 2013
If you want to influence the online conversation about your company, you need dedicated brand advocates who can participate in social media on your behalf. Advocates are invested in your success, aligned with your objectives and willing to defend your company. But where can you find them? Donít look far. Your best potential social advocates are actually your own employees.
Tags : social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, social media marketing
     uberVU via HootSuite
By: Adobe     Published Date: May 15, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. Youíll see critical metrics on everything from mobile trends to conversion ratesóso you can develop new strategies for success in 2014.
Tags : adobe, adobe digital index, benchmarking, marketing, smartphone, tablet, stick rate, conversion rate
     Adobe
By: Adobe     Published Date: Aug 14, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. Youíll see critical metrics on everything from mobile trends to conversion ratesóso you can develop new strategies for success in 2014. Get the report now to learn and discover: - New mobile usage trends - The power of continual site improvement - Why time spent on websites is higher than ever
Tags : online marketing, marketing practices, mobile usage trends, web analytics, market research, mobile marketing
     Adobe
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, itís online fraud to the highest degree. Although itís been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
Start   Previous    1 2 3 4 5 6     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics