Don’t Give Hackers the Combination to Your Digital Safe!

Are you a business owner? If so, some of your most treasured and valuable possessions are kept within the solid, steel-like confines of your website and its server. Just as you should lock and protect your tangible safe with all its valuable possessions, so should you do with your digital safe.

safe_combination

“I’m not worried,” you say, “I have an SSL certificate.” Well, I hate to be the bearer of bad news, but an SSL certificate doesn’t lock and protect your website. It just locks and protects credit card transactions. And just to keep the “digital safe” analogy going, once you have given hackers access to your website by not scanning it for security vulnerabilities, they will open it. Once open, they can edit the combination to your digital safe, sending all your customers’ credit card information securely and safely (locked and protected through the SSL) to their bank instead of yours.

Legitimate business owners keep their websites protected and safe from hackers by having Trust Guard run daily security scans to check for vulnerabilities. Don’t think your site has issues and that it never will? Think again. 86% of the time, when Trust Guard scans a website for the first time, it fails. 86%. That’s more than 4 out of every 5 websites. Now how confident do you feel? Visit Trust Guard today! Contact Shayne@trust-guard.com. He’ll give your website a free initial scan to let you know if you’ve already given hackers the combination to your digital safe.


Read the rest of the article here:
http://epicecommercetools.com/2016/12/19/whats-the-combination-to-your-digital-safe/


Check out these awesome articles for FREE!
How to Recover from Business Setbacks
Live Chat: The Perfect Matchmaker!
Tips to Improve Your Email Security
Care More about Your Customers!

Tips to Improve Your Email Security

You should definitely do what you can to secure your e-mail from casual snooping:

email_security

1. Use an account from a major provider like Google, Microsoft, or Yahoo. Do they get hacked? Yes. Are they safer than most? Yes.

2. Use a strong password and two-factor authentication enabled. If your phone uses a fingerprint reader, take advantage of that added convenience by locking your phone with a strong alphanumeric password. Target a 12- to 14-character minimum, since shorter passwords are more susceptible to brute force attacks – the longer and more random the better. Two-step authentication (or 2FA) means using a combination of multiple credentials to get into your account, usually a password and a six-digit code sent to your phone or generated by an authenticator app.
3. For truly sensitive communications that you want to keep private, use Signal or WhatsApp or even Facebook Messenger’s “Secret Conversations” feature.


Read the full article here:
http://epicecommercetools.com/2016/12/05/top-three-email-security-tips/


Want some more awesome content:
Hackers Drive Away in Tesla Cars by Accessing Mobile App
Millennials Want Online Businesses to Provide Live Chat
Care More about Your Customers!
Answer These 5 E-Commerce Questions!

Hackers Drive Away in Tesla Cars by Accessing Mobile App

According to SCMagazineUK, Norwegian app security firm Promon has demonstrated through research that cyber-criminals could take control of Tesla vehicles, to the point where they can locate, unlock and drive the car away unhindered. Such a hack, possible by exploiting a lack of security in their smartphone app, gives criminals total control of the vehicle, providing additional functionality to that exposed by Keen Security Labs in a different hack in late September.

tesla_vulnerable

This is all done by attacking and taking control of the Tesla app. This underlines the vital importance of app security, and the wider implications this could have for IoT-connected devices in general. (IoT refers to the ever-growing network of physical objects that feature an IP address for internet connectivity, and the communication that occurs between these objects and other internet-enabled devices and systems.) Most people understand the importance of online website security – and only visiting sites that constantly check for vulnerabilities, but few consider the potential issues with mobile security.

Read the complete article here:
http://www.onlinewebsitesecurity.com/tesla-cars-hacked/

Want an awesome deal on protecting your website from hackers?
Trust Guard is offering their security scanning services and other products at 50% off for a limited time. Just visit Trust Guard.com and then enter the secret discount code: STO50.

Do you appreciate awesome content?
Your E-Commerce Business Needs these Three Policies!
Six Ways to Price Match!
Who Provides Better Service, You or Lego’s?
Hackers Could Destroy Your Good Reputation

Consumers Are Tired of Online Security Warnings

According to a study by the National Institute of Standards and Technology (NIST), online security threats are  still an issue.

Security fatigue, or simply being tired of online security warnings has made some people feel indifferent towards potential risks.

security-threatThe paper found that people feel “overwhelmed” with having to be on constant alert from cyber attacks. They are also negatively affected by the proliferation of online security measures available to protect themselves. As a result, many ignore the warning signs of a possible attack. As one individual remarked: “I get tired of remembering my username and passwords.”

Mary Theofanos, co-author of the study and computer scientist at NIST, said:
“Years ago, you had one password to keep up with at work. Now people are being asked to remember 25 or 30. We haven’t really thought about cyber security expanding and what it has done to people.” However, sites like LastPass can help us keep track of our passwords.

Read the full article here:
http://blog.trust-guard.com/security-warnings/

Check out this awesome content!
Cyber Attacks in 2014 Cost the World $445 Billion
Are You Vulnerable to Hackers? Get a Free Scan!
Hackers Are Able to Access Millions of Smart Phones!
Iris Recognition is the Future of Mobile Security

After Getting Hacked, Yahoo! Offers Online Security Strategies

So far as they know, the hack did not include unprotected passwords, payment card data, or bank account information. According to Bob Lord, CISO of Yahoo!, the company is taking the following actions to protect the online security of  their past and current users:yahoo-mobile-verification

  • We are notifying potentially affected users. The content of the email Yahoo! is sending to those users will be available at  https://yahoo.com/security-notice-content beginning at 11:30 am (PDT).
  • We are asking potentially affected users to promptly change their passwords and adopt alternate means of account verification. (No matter what online account you have, e-commerce or not, you should change the password at least every six months).
  • We invalidated unencrypted security questions and answers so they cannot be used to access an account.
  • We are recommending that all users who haven’t changed their passwords since 2014 do so.
  • We continue to enhance our systems that detect and prevent unauthorized access to user accounts.
  • We are working closely with law enforcement on this matter.

To read the complete article, click on the following link:
http://epicecommercetools.com/2016/09/28/after-hack-yahoo-offers-online-security-tips/

Want more awesome content?
Yahoo Hack Begs for Improved Passwords and Security
Hackers Could Destroy Your Good Reputation
Hackers Are Able to Access Millions of Smart Phones!
Are You Vulnerable to Hackers? Get a Free Scan!

Yahoo Hack Begs for Improved Passwords and Security

Yahoo acknowledged that hackers stole the account information of at least 500 million users. Information intercepted by the Yahoo hack included names, email addresses, telephone numbers, birth dates, passwords, and security questions.


yahoo_hack

If you had/have a Yahoo account, you should assume that your PII (Personally Identifiable Information) was stolen. Changing Yahoo passwords will be just the start for many of you. Comb through other services — especially those for which you provided a Yahoo email address to create an account — to make sure passwords used on those sites aren’t too similar to what you were using on Yahoo. Change passwords for sites that contain sensitive information like financial, health, business, or credit card data.

Read the full article here:
http://www.onlinewebsitesecurity.com/yahoo-hack/

Want more great content?
Congressional Act Protects Online Shoppers
Hackers Could Destroy Your Good Reputation
Hackers Are Able to Access Millions of Smart Phones!
Is Your Website Safe from Hackers?

Hackers Could Destroy Your Good Reputation

If you’re not careful, hackers will steal your customer’s money, personal information and their loyalty to you and your business.

There have been a great many cyber crimes involving the purposeful destruction of personal and corporate reputations. These include cases of hackers gaining access to websites and social media accounts and changing messages or posting as the individual or company.

bad-reputation

Attacks like these can be very damaging if not caught quickly. You can help avoid the destruction of your reputation by:

  • Monitoring all accounts frequently. This way, messages posted by someone who is unauthorized will be caught quickly.
  • Changing passwords often, and asking clients to do the same.
  • Regaining control of accounts as soon as possible when there has been a breach in security.
  • Mitigating damage with consumers by employing goodwill efforts for any issues that the hack may have caused. Then make sure you honestly address the issue immediately.

 

Read the full article here!
http://blog.trust-guard.com/hackers-destroy-good-reputation/

Want more good content? Check out these free articles!
Is Your Website Safe from Hackers?
Three Cool Sites for Free Images!
Need More Customers? Give Your Visitors Peace of Mind!

Department of Commerce Releases Cyber Security Framework

The Department of Commerce Provides Website Owners with High-Level Security Guidelines

nist-cyber-security-framework

Each function maps to key categories of desired outcomes (e.g., “Asset Management,” “Access Control”). Each category then expands to a series of more specific outcomes and technical/management activities. These are then tied to dozens of “informative references,” such as ISO/IEC, ISA, and COBIT, which are well-established implementation standards. The Framework doesn’t include specific practices or requirements. Instead, it’s meant to facilitate an iterative process that involves “detecting risks and constantly adjusting one’s security program and defenses.”

Companies that utilize the NIST Cyber Security Framework must comply with other respected entities and their related rules such as the FTC and the Payment Card Industry. Those that accept or process or provide technology in relation to payment card data must comply with specified Payment Card Industry (PCI) rules, including specific data security standards (PCI DSS) and implementation protocols.

Read the full article here:
http://blog.trust-guard.com/nist-cyber-security-framework/

Want More Security-Related Info? Check Out These Articles!
Hackers Are Able to Access Millions of Smart Phones!
Is Your Website Safe from Hackers?
Cyber Attacks in 2014 Cost the World $445 Billion

Hackers Are Able to Access Millions of Smart Phones!

Computer security firm Check Point and its mobile threat research team revealed details of what it says are a set of “four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets.” They call the set of vulnerabilities QuadRooter.

This type of extensive security problem shows how vulnerable our mobile devices are to security threats from hackers. All it takes it to download the wrong app and, often without even realizing it, our personally identifiable information will have been hacked. If you are using one of the above devices, we suggest you go to your phone distributor or carrier to get the patch to fix the security hole as soon as possible.

QuadRooter vulnerabilities are found in software drivers that ship with Qualcomm chipsets. The drivers, which control communication between chipset components, become incorporated into the Android “builds” that manufacturers develop for their devices. Check Point says that since the vulnerable drivers are pre-installed on devices at the point of manufacture, they can only be fixed by installing a patch from the distributor or carrier. Distributors and carriers issuing patches can only do so after receiving fixed driver packs from Qualcomm.

Some of the latest and most popular Android devices found on the market today use these Qualcomm chipsets, including:

images
DEF CON Has Had Security-Focused Gatherings Every Year Since 1993.

 

BlackBerry Priv
Blackphone 1 and Blackphone 2
Google Nexus 5X, Nexus 6 and Nexus 6P
HTC One, HTC M9 and HTC 10
LG G4, LG G5, and LG V10
New Moto X by Motorola
OnePlus One, OnePlus 2 and OnePlus 3
Samsung Galaxy S7 and Samsung S7 Edge
Sony Xperia Z Ultra

To read the entire article, including more info about DEF CON and their 2016 get-together in Las Vegas, click here:
http://www.onlinewebsitesecurity.com/hackers-can-access-millions-smart-phones/

Want More? Click on the following links to read additional articles about hackers and security vulnerabilities:
Is Your Website Safe from Hackers?
Keep Your Customer’s Privacy Safe with Trust Guard’s Privacy Safe Seal
Are You Vulnerable to Hackers? Get a Free Scan!
Keeping Hackers Away!