Remove Data Remove Online Remove Security
article thumbnail

Six Ways to Protect Yourself and Your Family on Data Privacy Day

Perficient

As we mostly are working remotely these days, securing your space when you’re not in the safeguards of the office walls are critical. Perficient places a high value on data security and has several processes and tools in place to protect colleague and client information, but what about the everyday person?

Data 535
article thumbnail

How to control sensitive data on unmanaged devices with MCAS

Perficient

In this day and age, protecting your organization’s sensitive data has started to become exceedingly difficult. In today’s blog, I’ll show you how you can block downloading of files with sensitive data to unmanaged devices with the use of session policies in Microsoft Cloud App Security (MCAS).

Data 520
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to control sensitive data on unmanaged devices with MCAS (Part 2 of 2)

Perficient

In this blog, we’re going to change things up a bit and instead of only blocking downloads we’re going to create another session policy to block cut/copy, paste, and print activities of sensitive data on an unmanaged device. Lastly, we’re only going to look at Teams, Exchange, and SharePoint Online for our apps.

How To 520
article thumbnail

Perficient’s Cloud Modern Data Platform Approach – Customer Journey & Capabilities

Perficient

can leverage the Modern Data Platform approach. This Digital Transformation approach will help enterprises looking to re-platform, helping various Line of Businesses embark on the journey for Self Service Analytics, Modern fully managed Data Platform services etc. Security Architects. Align them to Scores. Solutions Architects.

Data 497
article thumbnail

New Data: Twice As Many Online Shoppers Believe Credit Cards Are More Secure Than Debit Cards

PYMNTS

It is well known that shoppers tend to behave differently online than they do in brick-and-mortar stores — and this extends to how they choose to pay at checkout. One of the more notable differences is their tendency to favor credit cards online and other options such as digital wallets over debit cards.

Cards 210
article thumbnail

Making Meaningful Data Reports with Microsoft Power BI

Perficient

Create Power BI r eports to effectively translate your business data . Microsoft’s Power BI is a versatile platform that allows users to connect to and transform data to make meaningful and interactive visualizations. Using Dataverse as a data source also eases security concerns.

Report 393
article thumbnail

TSYS Attacked With Ransomware, Has Data Posted Online

PYMNTS

TSYS , a payment processing company, has suffered a ransomware attack and had some data posted online, according to a report from Krebs on Security. However, TSYS said the malware didn't jeopardize card data and that the attack had only targeted the company's administrative wing. "We Columbus, Ga.-based

Online 226