Posts Tagged ‘fraud’

Self cyber-defense and security for c-level executives on the move

0

Posted on 24th Oct 2014 by in Enterprise Security

C-level executives are arguably a business’ most valuable and vulnerable asset. We’ve compiled five tips so you can encourage them to defend themselves when they’re out and about.

More than EMV: President Obama’s executive order paves the way for more secure online services

0

Posted on 22nd Oct 2014 by in Corporate

Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals.  My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]

Here we go again

0

Posted on 22nd May 2014 by in Enterprise Security

It’s happened again, this time to “The World’s Online Marketplace” – eBay. The online auction giant announced yesterday that a database, holding the personal details of up to 223 million users, was hacked. Ebay has asked 128 million users to change their account passwords in the wake of the breach.  The cybercriminals were able to […]

How valuable is your boss?

0

Posted on 25th Apr 2014 by in Enterprise Security

Anyone who works in a corporate environment knows that the CEO is often considered one of the most valuable assets within an organization, with access to contacts, sensitive and confidential information and knowledge of the wider industry. Many high-flying executives who travel a lot have chauffeur-driven cars or are given charter flights to minimize the […]

Facebook offers mobile payments – ‘Like’

0

Posted on 22nd Apr 2014 by in Corporate

You can’t not step outside and see how mobile usage is affecting mainstream and consumer behavior – from toddlers playing with iPads to people walking into lampposts as they fail to look up from their device when out and about. Given the tremendous increase in mobile usage in recent years, it’s hardly surprising that expectations […]

Do you “speak” EMV? Six terms you need to know to get ready for EMV payments

1

Posted on 22nd Apr 2014 by in Financial Services

A whole new language is coming with EMV credit cards. Did you know that an EMV credit card isn’t used by swiping it?  “Swiping” will someday be a term of the past (along with the mag-stripe relics that swiping supports).  Credit cards with an EMV chip are “dipped”, “waved”, or “tapped.”  Not to worry, it’s […]

96 Hours Later, What Does Heartbleed Mean for Your Business?

0

Posted on 14th Apr 2014 by in Enterprise Security

This content was originally posted on our CloudEntr blog site April 11, 2014. The dust is settling on what has been an explosive week in digital security. Just 96 hours ago, Codenomican and researchers at Google announced they had uncovered a major security threat affecting more than 66% of the web. Making CVE-2014-0160 or what they […]

EMV Payment Security Hits US National Spotlight

0

Posted on 29th Jan 2014 by in Corporate

EMV payment technology has finally gotten its big break in the US in the way of national news coverage. After several recent high-profile payment card data breaches, more Americans have started to ask whether it’s time for the US to abandon magnetic stripe payment technology in favor of more secure EMV. Yes, it’s time. For more […]

The Truth About EMV in the US: Card-Not-Present Fraud

0

Posted on 28th Aug 2013 by in Corporate

To continue our discussion about popular myths and misconceptions about EMV payment cards, let’s talk about card-not-present (CNP) fraud – the kind where the merchant never sees you or your card. In other words, the merchant never verifies that the person making the transaction is the legitimate cardholder by checking the signature or seeing that […]

How safe is the data on your laptop?

0

Posted on 20th Aug 2013 by in Enterprise Security

Picture this: You or a colleague take a business trip abroad, maybe to Shanghai.  The customs agent insists on inspecting your laptop.  He takes it out of sight, just for 30 minutes, and then returns it to you.  How would you know if your data was accessed?  30 minutes is plenty of time to copy […]