Friction the Main CX Challenge in Fraud Prevention, Report Finds

With data breaches, hacks, scams and phishing attacks all on the rise, businesses worldwide are facing a difficult challenge. On the one hand, they are being compelled to make verification harder, but on the other, from a customer experience (CX) point of view, they must do so while keeping friction to a minimum.

Topics: Customer experience CX Articles & Insights security

Aged Care In Australia

The aged care industry is in a period of sustained change. Changes to legislation, increasing security threats, demands for greater transparency, increasing consumer demands for better CX mean that the industry has no choice but to adapt. 

Dr Kevin Cheng, Founder, Osana, says his company aims to fundamentally disrupt how primary care operates and is funded, by shifting the focus from activity-based care (number of patients and consultations) to providing good health outcomes. So what does disruption look like for Australia's aged care industry?

Topics: Customer experience CX Articles & Insights security

Ping Identity Names Versent “Partner of the Year” in Asia Pacific

SYDNEY, 9 May 2018 — Ping Identity, the leader in Identity Defined Security, today announced that Versent, a Melbourne-headquartered technology, managed services and PaaS provider, has been named “Partner of the Year” for the Asia Pacific market. Versent received the award based on its commitment to driving new license revenue through customer acquisition, in addition to delivering digital identity innovation among customer organisations.

Topics: Customer experience press release security

LogRhythm once again recognised for completeness of vision and ability to execute

BOULDER, Colo.—December 6, 2017 — LogRhythm, The Security Intelligence Company, today announced that it has, once again, been positioned as a Leader by Gartner, Inc. in the 2017 “Magic Quadrant for Security Information and Event Management”* research report, for its Threat Lifecycle Management Platform.

Topics: press release AI security

7 Cybersecurity Trends to Watch in 2018

In the constantly changing world of cybersecurity, it can be difficult to make predictions. But with 2018 just around the corner, cybersecurity professionals are taking a serious look at what the future holds. 

Recently, Fifth Quadrant attended an event in which Phil Kernick, Founder and Chief Technology Officer at CQR Consulting led a discussion on where Australia's cybersecurity landscape was heading into the new year. Drawing partly on that discussion, we'll now take a quick look at 7 trends in Australian cybersecurity to watch out for in 2018.

Topics: Internet of things CX Cloud computing AI Artificial Intelligence CX Articles & Insights security Blockchain

Malwarebytes 7 Security Predictions for 2018

SANTA CLARA, Calif. – Nov. 21, 2017 – Malwarebytes, the leading advanced malware prevention and remediation solution, today announced its 2018 cybersecurity predictions. The company predicts top threats in 2018 will include a rise in browser-based cryptojacking, PowerShell-based attacks, hackers using security software as a back door, adaptive worm functionality and the growing connectivity in all industries, with both the education and healthcare sectors increasingly targeted.

Topics: press release cyber security security

My voice is my passport, verify me - Future of Authentication

Single authentication protocols. Pipe dream or not too distant future reality?

One of my favourite films is the 1992 crime thriller, Sneakers starring Robert Redford partnered with a brilliant cast of A-list actors. The film is about a group of security consultants from various backgrounds who’ve been tasked to steal a code breaking device - an algorithm that can crack any password. The villain of the film, Cosmo, played by the amazing Ben Kingsley, recognises that due to poor passwords he can change the world and topple economic systems using this algorithm in the device. Funnily enough, Cosmo’s own fortress - a toy design business - is protected with voice biometrics. 

Topics: CX Articles & Insights cyber security authentication security

You might also enjoy reading...