Cybersecurity

  • Showing 1-50 of 349 items
  • 1
  • 2
  • 3
  • ...
  • 7
  • >>
  1. Top Compliance Headaches for Financial Advisors

    Advisors who do not devote sufficient attention to compliance issues can find themselves in hot water with both regulators ...
  2. DOL Fiduciary Rule Explained as of August 14, 2017

    The Department of Labor (DOL) Fiduciary Rule expands the “investment advice fiduciary” definition under the Employee Retirement ...
  3. How Companies Use Initial Coin Offerings

    Using an ICO, a startup company recently raised $36 million… in 24 seconds.
  4. The Biggest Opportunity In Cryptocurrency

    Cryptocurrencies are perhaps the most exciting sector in the markets today. But what does the future hold for them?
  5. Second Major Ethereum Hack In a Week Leads to $34 Million Theft

    Ethereum suffered two high-profile hacks in a span of just a few days.
  6. Common Ways Scammers Get Your Info and Your Money

    These scams are currently very common and are often difficult to avoid.
  7. 6 Ways to Avoid Becoming an Identity Theft Victim

    Don't become a victim of identity theft. Take these steps to protect your identity and finances.
  8. How Safe Is Venmo And Why Is It Free?

    Venmo is a digital wallet that allows users to send money with ease. Millions use the service, but is it actually safe?
  9. What Advisors Need to Know About Ransomware

    Ransomware is malicious technology that’s becoming increasingly commonplace in corporate computer network. Here's how to ...
  10. 7 Cybersecurity Tips to Protect Your Finances

    These seven cybersecurity tips will help protect your finances from online fraud and hacking.
  11. 4 Must-Do’s for Basic Financial Safety

    When it comes to guarding your financial safety, these steps are necessary.
  12. 11 Ways to Help Prevent Identity Theft

    Identity theft is no joke. Here are 11 ways to help prevent falling victim to it.
  13. Advisors: Compliance Protocols for Cybercrimes

    Taking these steps will help to avoid falling victim to some big cybersecurity threats.
  14. Why is Cybersecurity so Important for Investors & Advisors?

    CEO of Investigative Management Group and former member of the FBI Robert Strang shares his take on why cybersecurity is ...
  15. Warren Buffett & John McAfee Had the Same 1st Job

    What do John McAfee and Warren Buffett have in common? They both had the same first job.
  16. 4 Steps Advisors Should Take After a Cyber Attack

    Taking the right steps following a cyber attack can mitigate the impact on clients.
  17. 2 Cybersecurity ETFs to Consider (CIBR, HACK)

    Consider these two cybersecurity ETFs. Cybercrime is among the the top five global risks, and the cybersecurity market is ...
  18. What’s Causing Ethereum (ETH) to Jump 900%? (MSFT,JPM,BK)

    Big banks are betting their futures on ETH's underyling technology.
  19. 5 Biggest Credit Card Data Hacks in History

    InterContinental Hotels Groups has disclosed that credit card systems at 1,200 of its hotels were successfully hacked by ...
  20. Creepy Spy Doll Banned In Germany, Still Sold In U.S.

    Two seemingly innocent talking toys can eavesdrop on your family and could be prime targets for hackers.
  21. Samsung's Galaxy 8 Could Endanger Fifth Amendment Rights (SSNLF)

    Biometrics are a gray area for the law, as far as the Fifth Amendment is concerned.
  22. Walmart and IBM Will Use Blockchain to Ensure Food Safety (WMT, IBM)

    The major U.S. retailer is experimenting with ways of using the cryptocurrency technology to help ensure that its food products ...
  23. Stop Internet Companies Selling Your Data with a VPN (CMCSA,VZ)

    Congress voted to allow internet companies to sell your internet activity without permission. Here's a hack.
  24. MoneyGram Sale to Chinese Firm Could Be Security Risk: US Officials (MGI, BABA)

    U.S. officials are concerned that the sale of U.S. money transfer company MoneyGram to Chinese online payment platform Ant ...
  25. New Counterfeit-Proof £1 introduced by the British Royal Mint

    Dubbed "the most secure coin in the world", the new British £1 coin entered circulation March 28.
  26. Keyboard Logger

    A keyboard logger is hardware or software that records every keystroke on a computer, usually for nefarious purposes and ...
  27. Bring Your Own Device (BYOD)

    Bring-Your-Own-Device (BYOD) is a company policy that allows employees to use their personal mobile devices and laptops for ...
  28. What Is Blockchain and Why Should I Care?

    While Bitcoins are still new and very volatile, the blockchain technology used shouldn't be ignored.
  29. Hacker Protection: Should You Have a Personal Cloud?

    With data breaches increasing, it's more important than ever to find the safest way to store your valuable files.
  30. Apple Denies Claim That Its System Was Hacked (AAPL)

    An Apple spokesperson has clarified that hackers did not obtain information on 300 million accounts from Apple's system.
  31. 9 Ways to Protect Your Cell Phone From Identity Theft

    Thanks to lax phone security and sophisticated hackers, cell phones are the target for identity theft.
  32. Protecting Financial Information From Hackers

    Two examples of how security measures protected clients' money from email hackers.
  33. Protect Your Small Business from Cybercrime

    Small business owners are a growing target for cyber-attacks; protect yourself and your clients.
  34. Know the Latest IRS Scams

    How do IRS scammers go about stealing your personal information? Their methods include hacking, malicious software and psychological ...
  35. Eavesdropping Attack

    Eavesdropping Attack is an incursion where someone tries to steal information that computers, smartphones, or other devices ...
  36. Data Loss

    Data loss occurs when valuable and/or sensitive information on a computer is compromised due to theft, human error, viruses, ...
  37. Advanced Persistent Threats (APT)

    An Advanced Persistent Threat (APT) is a large-scale, sophisticated, targeted attack on an organization’s computers to gather ...
  38. Hacktivism

    Hacktivism is a social or political activist plan that is carried out by breaking into and wreaking havoc on a secure computer ...
  39. Computer Abuse

    Computer abuse is the use of a computer to do something improper or illegal.
  40. Gray Box

    Gray box is the testing of software with limited knowledge of its internal workings.
  41. Threat Modeling

    Threat modeling is the act of evaluating what needs to be protected in the area of computer security, then determining what ...
  42. Zero Day Attack

    Zero Day Attack is an attack that exploits a potentially serious software security weakness that the vendor or developer ...
  43. Home Depot Pays Another $25M for 2014 Data Breach (HD)

    Home Depot has agreed to pay financial institutions a $25 million settlement for damages resulting from its 2014 data breach.
  44. A Day In The Life Of A Public Accountant

    Here's an inside look at the workdays of two experienced CPAs, to give you an idea of what it might be like to pursue a career ...
  45. Intrusion Detection System (IDS)

    Intrusion Detection System (IDS) is a computer program that automatically detects security threats and attacks by monitoring ...
  46. Data Migration

    Data migration is the process of moving stored digital information between computers, systems or formats.
  47. Cyber Identity

    Cyber identity refers to the personality or personalities that is created through a person’s online interactions.
  48. Honeypot

    A honeypot is a security measure used to prevent and dismantle cyberattacks by luring attackers to a specific area of a computer ...
  49. Macro Virus

    A macro virus infects a software program and causes a series of actions to begin automatically when the program is opened.
  50. Cyber Security Threats to Move up the Agenda? (SYMC, PANW)

    A rise in government data breaches has fuelled speculation that companies with cyber security expertise will soon start to ...
  • Showing 1-50 of 349 items
  • 1
  • 2
  • 3
  • ...
  • 7
  • >>
Hot Definitions
  1. Preferred Stock

    A class of ownership in a corporation that has a higher claim on its assets and earnings than common stock. Preferred shares ...
  2. Net Profit Margin

    Net Margin is the ratio of net profits to revenues for a company or business segment - typically expressed as a percentage ...
  3. Gross Margin

    A company's total sales revenue minus its cost of goods sold, divided by the total sales revenue, expressed as a percentage. ...
  4. Current Ratio

    The current ratio is a liquidity ratio measuring a company's ability to pay short-term and long-term obligations, also known ...
  5. SEC Form 13F

    A filing with the Securities and Exchange Commission (SEC), also known as the Information Required of Institutional Investment ...
  6. Quantitative Easing

    An unconventional monetary policy in which a central bank purchases private sector financial assets in order to lower interest ...
Trading Center