Mitigating Retail Vulnerabilities

The threat of cybercrime against retailers is ever present. According to the 2016 Global Threat Intelligence Report, retailers are the top targets and receive up to three times the number of attacks as second placed financial institutions. Around 70% of retailers in Europe admit to being targeted while 45% of the attacks are known to have been successful. In the past 12 months, the US retail sector has also seen repeated attacks on electronic point-of-sale (POS) systems as well as consistently high volumes of phishing emails aimed at tricking insiders into giving access to corporate networks. With online takings expected to account for 21% of overall sales in 2017, cybercriminals will continue to try and profit from any vulnerabilities they can find in retail systems. To counter this, retailers have a variety of mitigation techniques available to them including VPNs. The best security remains multi-layered since no single technology can nullify all threats at all times.

Mobile Banking Apps: How Safe are They?

Mobile banking apps are set to revolutionize how we bank. According to KPMG, the number of mobile banking users globally is forecast to double to 1.8 billion over the next four years. In the UK regulators have announced new rules to let customers access details of their entire finances through a single mobile phone app by 2018. In the US mobile banking industry, technology has yet to overcome fundamental trust issues but the idea is starting to take off among financial services consumers. The banks and financial institutions are working hard to make their mobile apps as secure as possible. User behavior meanwhile has some catching up to do. For example, connections to free and unsecured Wi-Fi are open and vulnerable to fraud. To reduce security risks, it’s a good idea to use a virtual private network (VPN). This is a tried and tested way to secure the connection and encrypt all data transferred between the mobile device and the bank.

Internet Security Programs for Students

The Internet is a wondrous place. The most convenient and massive source of information. You have the luxury of accessing any web-site with a simple mouse click. Particularly useful for students. It allows everyone to find and compile all the relevant information quickly; explore popular tourist destinations; find recipes for tasty meals or maybe even get some professional help from Australian assignment writers.

Is Mobile Security Broken?

The way we work has changed. Our laptops, tablets and smartphones let us do our job from wherever we want – at the office, at home or even while on-the-move. We can also freely chat and collaborate with colleagues, customers or suppliers one-to-one or in groups using an array of cloud-based productivity apps. When it comes to mobile, the conventional security model is broken. Traditional detection and software patching techniques simply cannot keep pace. In its place, arguably one of the most reliable ways to keep sensitive proprietary data safe is mobile VPN.

Mobile payments and security — money walks, money talks

Once upon a time a mobile phone was something we used for talking. Today making a call ranks sixth on the list of most common uses for a mobile phone. Now there’s a new kid on the block that, in time, will push making a call even lower down the list. Mobile payment, or m-payment, is taking off. Early adopters like Starbucks already attribute significant revenue gains to their investment in mobile. Although overall mobile payments adoption and usage rates are still a fraction of standard credit/debit card transactions industry watchers expect this to change very quickly.

What’s in a Name? The ABCs of Mobile Device Management

BYOD? CYOD? Given the slew of acronyms flying around mobile device management (which, of course, goes by the acronym “MDM”), you’d be forgiven for losing track of what some of these actually stand for, much less the concepts they represent. As offices increasingly embrace digital technology and enable more employees to work remotely, mobile devices like phones and tablets, not to mention laptops, have increasingly phased out the traditional desktop computer. But this paradigm shift is also opening a lot of sore spots and potential security vulnerabilities around corporate data– after all, it may be more convenient for employees to be able to send work emails from their personal phones, but what kind of liability does that create for the company when their sensitive material is stored in an employee’s private cloud storage? This raises further questions about where exactly a company should expect to draw the line between personal and business use on a mobile device. The business should allow a certain degree of convenience for the employee using their device, but at the same time, it’s important to ensure there are adequate security protocols in place. To that end, it’s worth dissecting just what exactly your MDM options are: BYOD: Under a Bring-Your-Own-Device policy, employees use their own personal phones or tablets for business purposes. This policy provides the greatest flexibility to employees in terms of familiarity – it’s their own phone, after all – but it also raises some privacy concerns, for both the company and the user. In fact, 57 percent of employees polled in a Bitglass survey said they opted out of their company’s...