Articles tagged with: phishing

Consumer Reports to Include Cybersecurity and Privacy in Product Reviews

Consumer Reports to Include Cybersecurity and Privacy in Product Reviews

Include Cybersecurity and Privacy in Product Reviews, cybersecurity, privacy, cybersecurity standards, data security, password

Consumer publication Consumer Reports will soon begin considering cybersecurity and privacy safeguards when scoring products.

The group, which issues scores that rank products it reviews, said it had collaborated with several outside organizations to develop methodologies for studying how easily a product can be hacked and how well customer data is secured.

12 tips for implementing secure business practices

12 tips for implementing secure business practicesBy Help NET Security on 12 December 2016

backup, CXO, insider threat, Internet of Things, passwords, phishing, PoS, strategy, tips

Security experts prepared a list of a dozen tips for implementing secure business practices during the 2016 holiday season.

 

1. Limit temporary worker privileges

Many organizations employ temporary workers during the holidays to address increased demand for their products or services, and backfill employees on vacation. Criminal organizations know this and seek to take advantage of the potential “insider threat,” specifically that temporary workers may be less familiar with corporate policies and practices. Organizations should limit temporary employees’ access to corporate systems based on those individuals’ needs to do their jobs. Therefore, if a criminal successfully social engineers a temporary worker in order to carry out an attack on the organization, the fraudster’s access to sensitive company data will be kept to a minimum.