Security Awareness Blog: Cyber Security Awareness News, Online Safety Advice & Security Cat
Jun06, 2019

Credit Card Skimming is an Increasing Risk for eCommerce Retailers

By |Guest Post|

Credit card skimming – the use of hardware or software to steal credit card details – has long been a problem for retailers and the credit card industry. Whether criminals attach physical skimming machines to ATMs or inject skimming software into eCommerce applications, skimming hurts customers and retailers alike. But a recent wave of targeted skimming attacks by the Magecart criminal group and others increases the stakes for retailers. Online retailers generally use third-party payment [...]

May28, 2019

How Much for That Data in the Window?

By |Ask The Experts, Tips and Tricks, Winn Schwartau|

What follows is an edited excerpt from Winn Schwartau’s latest book “Analogue Network Security”, available here.  Question: How much is an autographed picture of Chuck Norris worth? Answer: Whatever someone is willing to pay for it. In the real, physical world of commerce, the free market economy does a good job of establishing value; both perceived and real. Perceived value is how much folks think something is worth, and real value is how much hard-earned [...]

May08, 2019

How Do Security Breaches Affect Reputation and Operations?

By |Guest Post|

Data is the lifeblood of all businesses in the 21st century. Organizations use data for competitor analysis, market behavior prediction, process optimization, and more. With the right data, companies can easily get an edge in their industries and optimize their performance to lower costs and make higher profits. This explains why cybercriminals are constantly launching attacks on organizations’ data systems. A data security breach can cause significant damage to your business. Depending on the type [...]

Apr30, 2019

PII: The Journey to Understanding Personally Identifiable Information

By |Security Awareness 101|

PII, or personally identifiable information, is sensitive data that could be used to identify, contact, or locate an individual. Examples of PII Personally identifiable information includes, but is not limited to: Home addresses Personal phone numbers National ID numbers Personal email addresses Credit card numbers Examples of Non-PII Info such as business phone numbers, business email addresses, race, religion, gender, workplace, and job titles, are typically not considered personally identifiable information. But they [...]

Apr24, 2019

Your Security Awareness Program: Make it personal

By |Guest Post|

User engagement represents one of the biggest challenges a security awareness program (SAP) can face. With so many processes, procedures, policies, and content being pushed to employees on a nearly daily basis, it can be an overwhelming amount of information for any individual to retain (or even care about). Knowing this, what is the best way to increase engagement? To increase the adoption rate of your program and your employees’ engagement in your monthly activities, [...]

Load More Posts