Understanding Customer Experience

,
by Andre Schwager    and Chris Meyer From the February 2007 Issue HBR.  Anyone who has signed up recently for cell phone service has faced a stern test in trying to figure out the cost of carry-forward…

Week in Breach

This week, accidental data exposure erodes brand reputation, ransomware disrupts operations, and insurers increase their scrutiny of cybersecurity policies.  Dark Web ID Trends: Top Source Hits: ID Theft Forums Top Compromise Type: Domain …

COVID-19 Impact on U.S. Consumer Technology Spending

MARKETS AND TRENDS COVID-19 Impact on U.S. Consumer Technology Spending COVID-19's impact on consumer spending is uneven. See why the previous 30 days saw increased spending and what to expect in the next 30 days with IDC's David Myhrer. JUNE…

Week in Breach

June 3rd, 2020 by Kevin Lancaster This week in The Week in Breach, slow breach responses put customers at risk, a malware attack undermines the benefits of shopping online, and a new study reveals that frequently resetting passwords is essential…

Are Your Documents Safe? Free yourself from security risks with our guide

,
Lots of things threaten the security of your print environment and the documents it touches. It’s especially challenging as you try to safely bridge the physical and digital worlds. Fortunately, you can take steps to protect your document…

Cloud Computing Security Issues and Solutions

McAfee, LLC Cloud computing presents many unique security issues and challenges. In the cloud, data is stored with a third-party provider and accessed over the internet. This means visibility and control over that data is…

5 CRITICAL STEPS IN THE CHANGE MANAGEMENT PROCESS

, , , ,
Businesses must constantly evolve and adapt to meet a variety of challenges—from changes in technology, to the rise of new competitors, to a shift in laws, regulations, or underlying economic trends. Failure…