7 tips to stay safe while shopping online

February 20, 2019

This content is general in nature and does not constitute legal, tax, accounting, financial or investment advice. You are encouraged to consult with competent legal, tax, accounting, financial or investment professionals based on your specific circumstances. We do not make any warranties as to accuracy or completeness of this information, do not endorse any third-party companies, products, or services described here, and take no liability for your use of this information.

Spotlight

Intralinks

When teamwork and collaboration really matter – there’s Intralinks. Trusted globally for nearly two decades, we bring collaboration and document sharing that’s safe, secure, compliant and fully auditable. Whether it’s documents or files, you can get work done quickly regardless of what you’re using at your desk or on the move — all you need is a browser and a web connection. We give you complete control over your valuable information and content — even after you’ve shared files outside your network or organization. We set you free to do more, with greater productivity, and without worry. Gartner likes us too. They’ve crowned us top supplier of enterprise collaboration and social software solutions. Since we started in 1996, more than $28 trillion of transactions have passed through our cloud without a breach. We work with all manner of organizations including financial services, life sciences, high technology, oil & gas, and manufacturing.

Other Infographics
news image

Cybersecurity in Retail Infographic

Infographic | February 15, 2020

77% of consumers believe that cybersecurity and data privacy is the 3rd most important factor when selecting a retailer, even outranking discounts and brand reputation. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer.

Read More
news image

Artificial Intelligence in Cybersecurity

Infographic | April 4, 2022

Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity.

Read More
news image

Cybersecurity: main and emerging threats in 2021

Infographic | January 27, 2022

The progress of digital transformation has inevitably led to new cybersecurity threats. Cybercriminals take advantage of the Covid-19 pandemic, in particular by targeting organisations and companies working remotely. Parliament has adopted its position on a new EU directive that reflects how cybersecurity threats have evolved and introduces harmonised measures across the EU, including on the protection of essential sectors.

Read More
news image

Alarming Cyber Security Stats to Know in 2022

Infographic | June 29, 2022

Attackers use multiple tactics to get access to your credentials and among those phishing is the most commonly used method. Every 9 out of 10 cyber-attacks start with a phishing email and end up costing millions of dollars to the organizations.

Read More
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Cybersecurity for Small Businesses

Infographic | May 25, 2021

Small businesses often ignore security precautions. Sometimes it’s due to a lack of resources, other times it’s because they think hackers won’t care. On the contrary, 58% of all malware attacks are targeted at small businesses, because hackers know there is no proper security in place.

Read More

Spotlight

Intralinks

When teamwork and collaboration really matter – there’s Intralinks. Trusted globally for nearly two decades, we bring collaboration and document sharing that’s safe, secure, compliant and fully auditable. Whether it’s documents or files, you can get work done quickly regardless of what you’re using at your desk or on the move — all you need is a browser and a web connection. We give you complete control over your valuable information and content — even after you’ve shared files outside your network or organization. We set you free to do more, with greater productivity, and without worry. Gartner likes us too. They’ve crowned us top supplier of enterprise collaboration and social software solutions. Since we started in 1996, more than $28 trillion of transactions have passed through our cloud without a breach. We work with all manner of organizations including financial services, life sciences, high technology, oil & gas, and manufacturing.

Events