Security Information |
Dont Get Hacked - A Guide to Protecting Your Business from Thieves
You've seen it in the news - 40 million credit cards exposed! With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be. Is it enough that users trust you? Common marketing wisdom shows that one of the most valuableassets any Internet Marketer has is trust. People go to extrememeasures to build this trust - online pictures, testimonials,audio - some even go as far as to open storefronts to givepeople that "good feeling". But all of this may simply not be enough. A recent Harris Interactive survey found that 75 percent ofconsumers polled worry that companies will share personal datawith other corporations without permissions, while 70 percentdoubt the security of online transactions and 69 percent fearthat hackers will steal their personal data submitted online. You see, just because a user trusts you, doesn't necessarilymean that the customer trusts your website oryour payment processor. Once you've established rapport with your customer base,the next step is to build trust in your website. Whether you collect credit card information yourself, or havea third party processor handle your transactions for you,it's crucial that people understand that you are seriousabout protecting their privacy and information. Here's a few things you can do to help out. *) Install a Secure Server Certificate on your server to closethat "lock" on people's browsers. Even if you don't collectcredit card information, people feel better about havingthe information they send to you be secure. Also, considerusing a "top tier" Certificate provider, such as Verisign.While other providers may have nearly equally secure solutions,the reason you are buying the certificate is to instill trustin your customers, which other providers do not necessarilyhave in abundance. *) Have a clear, clean privacy policy statement in additionto the "legalese" required by the FTC. If you don'tsell addresses, tell people so. *) Secure your server. I know that this seems obvious, but mostpeople pay no attention to their webserver or the softwarethey are running. Knowing what software you have running,and keeping up-to-date on patches will help significantly. *) Install an Intrusion Detection System (IDS) I estimate 73%or more of all websites have no intrusion detection systemin place. What this means is that not only can most websitesbe hacked easily, it is very likely that the website ownerhas no clue if they have been compromised. *) Turn off unneeded services and ports, and uninstallunused software. The premise here is that the less "stuff"on your machine, the less chance for exploit. For example,MySQL listens on the Internet for messages form other servers,yet most small websites access the database system only fromthe machine it is running on. It is very simple to makeMySQL "invisible" to the Internet - making it much moresecure if you don't need to access it from other systems.There are many, many more simple techniques like this you canapply to your server to keep hackers out. In summary, consumers are quickly becoming Internet savvyand they take their privacy seriously. There is nothing,and I mean nothing, that can hurt your credibility morethan your customers and potential customers getting SPAMto email addresses that they provided only to you - inthe best case, they will think that you sold their address.Responding that no, you didn't sell their address, but someonehacked your server and stole ALL their personal informationwon't make them feel a whole lot better about doing businesswith you in the future. Nick Temple is an e-commerce and security specialist that hasbeen practicing online for over 10 years, since 1994.Some previous clients include Verisign, Sun Microsystems,and Coupons.com. His new website, http://www.DontGetHacked.inforeveals that Internet Marketers are prime targets for hackers,and what you can do to stop them cold.
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Identity Theft -- 10 Simple Ways to Protect Your Good Name! Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. Identity Theft Offline -- So Many Possibilities Chris Simpson, head of Scotland Yard's computer crime unit was unpleasantly surprised to learn how easy it is to cheat anybody out of his or her personal info -- by means of a fake survey.This survey wasn't a scam; in fact, it was an experiment. Protecting Your Home Both Inside and Out If you are a parent, you have probably wondered at one time or another, what more you can do to protect your children and yourself, not only physically but emotionally, mentally, spiritually etc. Today many parents and families are discouraged. Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. An Open Door To Your Home Wireless Internet Network Security? This is not some new fangled techno-speak, it is a real tool to be used for the protection of your wireless internet network and LAN. African American SMBs have to realize that if your Internet connection is on 24/7 then your network, and it is a network that your computer is connected to, is at risk. How To Avoid Hackers From Destroying Your Site? Recently, my site and other internet accounts ( http://www.nabaza. Spyware, This Time Its Personal! First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission.. Firewall Protection - Does Your Firewall Do This? The first thing people think about when defending their computers and networks is an up-to-date antivirus program. Without this most basic protection, your computer will get a virus, which could just slow it down or potentially bring the pc to a complete standstill!So anti-virus software is the answer?An anti-virus solution on it's own is not the answer to all of your problems, it can only protect you so much; in fact test have shown that a new pc running Windows XP if left connected to the Internet unprotected will be infected with viruses and remotely controlled via unauthorised persons within 20 minutes! To protect you against hackers and often to prevent spyware and 'scumware' from communicating directly with their servers about information it may have picked up from your pc, a firewall should form the key part of your e-security solution. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. Spyware Removal Spyware SolutionProbably Today's Biggest Computer Problem.You Suffer Without Knowing Your PC is Infected!"The effects can be devastating. The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. |
home | site map | contact us |