![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Dont Get Hacked - A Guide to Protecting Your Business from Thieves
You've seen it in the news - 40 million credit cards exposed! With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be. Is it enough that users trust you? Common marketing wisdom shows that one of the most valuableassets any Internet Marketer has is trust. People go to extrememeasures to build this trust - online pictures, testimonials,audio - some even go as far as to open storefronts to givepeople that "good feeling". But all of this may simply not be enough. A recent Harris Interactive survey found that 75 percent ofconsumers polled worry that companies will share personal datawith other corporations without permissions, while 70 percentdoubt the security of online transactions and 69 percent fearthat hackers will steal their personal data submitted online. You see, just because a user trusts you, doesn't necessarilymean that the customer trusts your website oryour payment processor. Once you've established rapport with your customer base,the next step is to build trust in your website. Whether you collect credit card information yourself, or havea third party processor handle your transactions for you,it's crucial that people understand that you are seriousabout protecting their privacy and information. Here's a few things you can do to help out. *) Install a Secure Server Certificate on your server to closethat "lock" on people's browsers. Even if you don't collectcredit card information, people feel better about havingthe information they send to you be secure. Also, considerusing a "top tier" Certificate provider, such as Verisign.While other providers may have nearly equally secure solutions,the reason you are buying the certificate is to instill trustin your customers, which other providers do not necessarilyhave in abundance. *) Have a clear, clean privacy policy statement in additionto the "legalese" required by the FTC. If you don'tsell addresses, tell people so. *) Secure your server. I know that this seems obvious, but mostpeople pay no attention to their webserver or the softwarethey are running. Knowing what software you have running,and keeping up-to-date on patches will help significantly. *) Install an Intrusion Detection System (IDS) I estimate 73%or more of all websites have no intrusion detection systemin place. What this means is that not only can most websitesbe hacked easily, it is very likely that the website ownerhas no clue if they have been compromised. *) Turn off unneeded services and ports, and uninstallunused software. The premise here is that the less "stuff"on your machine, the less chance for exploit. For example,MySQL listens on the Internet for messages form other servers,yet most small websites access the database system only fromthe machine it is running on. It is very simple to makeMySQL "invisible" to the Internet - making it much moresecure if you don't need to access it from other systems.There are many, many more simple techniques like this you canapply to your server to keep hackers out. In summary, consumers are quickly becoming Internet savvyand they take their privacy seriously. There is nothing,and I mean nothing, that can hurt your credibility morethan your customers and potential customers getting SPAMto email addresses that they provided only to you - inthe best case, they will think that you sold their address.Responding that no, you didn't sell their address, but someonehacked your server and stole ALL their personal informationwon't make them feel a whole lot better about doing businesswith you in the future. Nick Temple is an e-commerce and security specialist that hasbeen practicing online for over 10 years, since 1994.Some previous clients include Verisign, Sun Microsystems,and Coupons.com. His new website, http://www.DontGetHacked.inforeveals that Internet Marketers are prime targets for hackers,and what you can do to stop them cold.
MORE RESOURCES: Opinion | What Happens When There’s a Real National Security Crisis? The New York Times AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock The Hacker News Trump moves to fire several national security officials deemed insufficiently loyal, AP sources say Star Tribune Trump fires NSC officials a day after far-right activist raises concerns to him about staff loyalty AP News Trump ousts members of National Security Council staff The Washington Post Trump fires six national security staffers after meeting with far-right activist Laura Loomer The Guardian NCS⁴ Announces 16th Annual National Sports Safety and Security Conference & Exhibition Agenda The University of Southern Mississippi Advisory warns of fast flux national security threat, urges action to protect critical infrastructure Industrial Cyber Lebanon-Syria Border Talks Can Restrain Hezbollah and Boost Security The Washington Institute Trump fires national security officials after Laura Loomer ‘excoriated’ them in Oval Office meeting AL.com Trump Moves to Fire Several National Security Officials Deemed Insufficiently Loyal, AP Sources Say Military.com Utimaco Launches Post Quantum Security App Package The Quantum Insider Trump fired at least one national security aide following pressure from far-right activist Laura Loomer NBC Los Angeles Homeland Security Investigations expects more victims in Bartow Co. labor trafficking case Atlanta News First House Democrats to head to U.S.-Mexico border in California to scrutinize Trump security policies Fox News IDF, Israel Police ignored all security dangers leading to Nova festival massacre The Jerusalem Post Congo War Security Review, April 3, 2025 Critical Threats Observers say IDF abandoned Gaza border outpost in 12-hour security lapse The Jerusalem Post Trump purges national security team after meeting conspiracist Nonstop Local News Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Commission presents a European internal security strategy European Commission Annual Assessment Lists Primary Threats to U.S. National Security AFCEA International Ivanti patches Connect Secure zero-day exploited since mid-March BleepingComputer Senate GOP's blueprint for Trump's 'big, beautiful' agenda includes tax cuts, border security and more — here's what's inside New York Post Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News White House National Security Officials Fired, Sources Say, in Trump's First Purge U.S. News & World Report Trump's national security adviser reportedly used his personal Gmail account to do government work TechCrunch DHS arrests man in McKinney accused of making terroristic threats against Homeland Security Secretary, ICE NBC 5 Dallas-Fort Worth Wayne Board of Education President Don Pavlak, Provides Update on School Security Measures - TAPinto ISC West 2025 Show Floor Spotlight: BOSCH SECURITY AND SAFETY SYSTEMS Security Info Watch Trump Fires Three White House National Security Officials WBZ NewsRadio 1030 Trump said to fire several National Security Council officials The Times of Israel Oracle's masterclass in breach comms: Deny, deflect, repeat theregister.com "Credible Threat" to 2025 Chincoteague Pony Swim Prompts New Security Policies Chesapeake Bay Magazine |
![]() |
![]() |
![]() |
RELATED ARTICLES
Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. Do You Know What your Kids Are Doing Online? It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media. Dont Get Hacked - A Guide to Protecting Your Business from Thieves You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be. A Personal Experience with Identity Theft Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. Phishing - Its Signs and Your Options Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment. Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially. Reclaim Your PC from the Internet Spies Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. Spyware Removal Spyware SolutionProbably Today's Biggest Computer Problem.You Suffer Without Knowing Your PC is Infected!"The effects can be devastating. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Data Security; Are Your Company Assets Really Secure? Is your data secure? Think again. Securing data is unlike any other corporate asset, and is likely the biggest challenge your company faces today. ![]() |
home | site map |
© 2006 |