Ceridian makes the protection of customer data a top priority. If you have additional questions regarding our Ceridian Information Security Program, please contact your account representative or email@example.com.
Find out how Ceridian has addressed the following vulnerabilities and what important actions you should be taking immediately.
|August 4, 2016||Fraudulent Phone Numbers|
|March 1, 2016||DROWN Vulnerability - CVE-2016-0800|
|March 3, 2015||FREAK Vulnerability (CVE 2015-0204)|
|January 27, 2015||GHOST: glibc Vulnerability (CVE-2015-0235)|
|October 16, 2014||POODLE Vulnerability|
|September 24, 2014||Bash (also known as "Shellshock") Vulnerability|
|August 28, 2014||Possible Fraudulent Emails|
|May 12, 2014||Internet Explorer Vulnerability|
|May 1, 2014||Statement on XP Elimination|
|April 7, 2014||OpenSSL Heartbleed Vulnerability|