Make sure your wedding plans go without a hitch with scam advice

by

Make sure your wedding plans go without a hitch with scam advice.
All of these transactions are potentially liable to fraudulent action by scammers.
l Obtain a physical address and contact details for the vendor and verify this information.
l Obtain a contract before paying money for services.
Fully read and understand what is offered before applying a signature and note the terms of cancellation.
l For services such as wedding photography, beware of websites using fake images.
Look for inconsistencies in style, meet the photographer, and ask to view sample albums.
Trading standards officers also advise paying for services by credit card, as they offer protection for single item purchases above £100 and below £30,000.
Even if a company goes into liquidation before the big day, a refund can be claimed through the credit card company.
Always take precautions and research that the options available are genuine when spending large sums of money on services.” For advice, or to report any problems to trading standards officers call 03454 04 05 06.

Data Breach

The next generation of cybersecurity professionals is being created by the Girl Scouts

by

Tech leaders will soon be able to look to the Girl Scouts for both their cookie and cybersecurity needs.
The first-ever national Girl Scout Cybersecurity training badges will roll out in 2018, teaching girls grades K-12 programming, ethical hacking, and how to avoid security incidents, as part of a partnership with Palo Alto Networks, the organizations recently announced.
Girl Scouts of the USA has ramped up the number of STEM badges and programs offered in recent years, including new robotics badges, Girl Scouts CEO Sylvia Acevedo told TechRepublic. “As we were in the final stages of testing and piloting badges coming out, we asked girls what they might want,” Acevedo said. “Loud and clear, one of the big areas of interest was computer science, and, specifically, cybersecurity.”
SEE: Information Security Certification Training Bundle (TechRepublic Academy) At the Daisy level, for grades K-1, the cybersecurity badges will focus on establishing and protecting your digital identity, including building firewalls around the information you post online. “Those numbers are staggering, and have not been trending in a positive direction, so it’s clear that we need to find new and creative ways to address the talent deficit and lack of diversity in our industry,” Rinki Sethi, senior director of information security at Palo Alto Networks, told TechRepublic. “We have the national reach, we can scale, and we have a girls-only environment that helps girls persist in these technical skills,” Acevedo added.
Other tech companies are also looking to develop a new cyber talent pipeline.
The Girl Scouts have long supported women entering STEM fields, Acevedo said: Some 90% of all female astronauts who have gone into space were Girl Scouts.

UK defence secretary threatens military strikes against hackers

by

UK defence secretary threatens military strikes against hackers.
The UK could carry out military strikes in response to cyber attacks, the UK defence secretary has said.
Sir Michael Fallon told the Chatham House think tank the UK had the ability to respond to hackers “from any domain – air, land, sea or cyber”.
Sir Michael also emphasised the UK’s ability to carry out “offensive” cyber attacks of its own.
His comments came after hackers mounted a “determined attack” on the UK Parliament last Friday.
Companies across the globe, including one of Britain’s biggest companies, advertising agency WPP, are reporting that they have been struck by a major ransomware cyber-attack.
And in May, NHS services across England and Scotland were hit by a large-scale cyber-attack that has disrupted hospital and GP appointments.
Sir Michael said that, when identified, perpetrators should be prosecuted when possible but the UK was investing in “full spectrum capabilities” ranging from cyber attacks to more conventional military responses.
To respond in kind to any assault at a time of our choosing.” “I want to reassure you about Queen Elizabeth, the security around its computer system is properly protected and we don’t have any vulnerability on that particular score.”

Four Steps to Protect Your Business From A Data Breach

by

Plan, train & protect With high-profile data breaches regularly hitting the headlines, it’s essential for every business to take action to protect their customers’ data.
From restricting physical access to your computer systems to using high-tech data encryption tools, you can reduce your risk of becoming the latest victim of cyber criminals.
Encryption software scrambles the text in a file, making it look like garbage to anyone who copies the file from a stolen hard drive or intercepts it while it is being sent over the Internet.
Use Two-Factor Authentication If a criminal manages to log into your company’s computer system, they could cause serious damage to your network or steal sensitive data.
A good way to ensure this doesn’t happen is to require your employees to use two-factor authentication to log into their work accounts.
In addition to asking for a password, a system using two-factor authentication also requires an employee to input a code, which is sent via SMS or email.
In order to circumvent this system, a data thief would have to not only guess the employee’s password but also gain access to their mobile device or email account.
Provide Data Security Training For Employees Even if you have strong security systems in place, a data breach could still occur if your employees don’t follow company policies correctly.
For example, employees may use weak passwords that are easy to guess, copy sensitive data onto USB sticks so they can work with it at home, give outsiders access to your company premises, or leave company laptops or mobile devices in places where criminals can access them.
Therefore, you should have a plan in place to reduce the damage if a data breach occurs.

Credit Card Fraud

Make sure your wedding plans go without a hitch with scam advice

by

Make sure your wedding plans go without a hitch with scam advice.
All of these transactions are potentially liable to fraudulent action by scammers.
l Obtain a physical address and contact details for the vendor and verify this information.
l Obtain a contract before paying money for services.
Fully read and understand what is offered before applying a signature and note the terms of cancellation.
l For services such as wedding photography, beware of websites using fake images.
Look for inconsistencies in style, meet the photographer, and ask to view sample albums.
Trading standards officers also advise paying for services by credit card, as they offer protection for single item purchases above £100 and below £30,000.
Even if a company goes into liquidation before the big day, a refund can be claimed through the credit card company.
Always take precautions and research that the options available are genuine when spending large sums of money on services.” For advice, or to report any problems to trading standards officers call 03454 04 05 06.

The New Rules of Identity Theft Protection for Employees

by

The New Rules of Identity Theft Protection for Employees.
And the child continues showing up on her pharmacy records as a dependent.
“To this day, I don’t know if my name is in the baby’s medical record,” she notes.
Her insurance information had been stolen and used by someone else to obtain medical care.
But medical identity theft also poses a serious risk to employee health.
Medical identity theft is thus, above all, a quality-of-care issue.
While medical identity fraud is the fastest growing type of identity crime, identity theft generally continues its march unabated.
The number of US data breaches recorded in 2016 set an all time high of 1,093—a 40 percent increase from 2015, notes an authoritative Data Breach Report by ITRC.
For an employer to fully protect its employees, health insurance information will require the same attention and care that financial institutions have offered to their credit card customers.
For more information about how to help your employees protect themselves from identity theft, don’t miss Kevin’s session, How the Growing Threat from Medical Identity Fraud Puts Your Employees & Company At Risk—And What You Can Do About It only at the 9th Annual Employer Healthcare & Benefits Congress, October 2 – 4 in Los Angeles.

How the High-Risk Processing Industry Can Combat the Costly Surge in Card Testing Fraud

by

This testing explosion is driven by the need of criminals to quickly identify which stolen credit card numbers are active before customers discover the theft and close the account.
The high-risk processing industry is especially susceptible to these issues since many merchants operate in the less-secure card-not-present online environment.
But, not only does automated card testing reveal which cards can be used to make fraudulent purchases, it also creates secondary problems for merchants.
The first order problem for merchants is that unless they actively employ fraud prevention tools to combat card testing they leave themselves open to fraudsters making large purchases that customers will contest.
Over time the mishandling of these false positives can have a serious negative impact on a merchant’s brand.
That requires security software tuned to the patterns that indicate card testing is being attempted.
Other solutions include apps that can identify when transactions are coming from human buyers rather than automated scripts or bots.
High-risk merchants should look for processing solutions that include state-of -the-art fraud prevention software.
Wrap Up The false positives created by the surge in card testing fraud are hurting the high-risk payments industry.
Merchants and processors need to take significant steps to combat fraudsters who use sophisticated software automation to identify card numbers they can use to make illegal purchases.

E-commerce fraud losses down 35%

by

E-commerce fraud as a percentage of sales dollars has been declining since the first quarter of 2016.
For the report, fraud was examined across the industries of alcohol, tobacco and cannabis; apparel; consumer electronics; cosmetics and perfumes; department stores; furniture, appliance and home improvements; health, leisure and hobbies; jewelry and precious metals.
And while e-commerce fraud has been declining in most, the two exceptions are department stores and jewelry and previous metals.
According to the study, the use of machine learning as prevention is one of the reasons for the decline in fraud losses, amounting to a total decrease of almost 35% from Q1 2016 to Q1 2017.
As the number of individuals who have had their credit card details stolen continues to rise, more and more consumers are aware of the risks.
“So much so that consumers are less surprised and more commonly annoyed by this form of cybercrime.
With banks and card issuers managing these instances on a regular basis, most consumers know they are protected but that they will suffer inconveniences due to this fraud for a few weeks or possibly even a few months,” a spokesperson from PYMTS told FierceRetail.
According to PYMTS, over the past year, retailers have grown their investment in fraud prevention in both scale and quality.
As retailers continue to see more of their sales coming from their online stores, they have become painfully aware of the lack of protection that have against credit card fraud online, whereas they are (almost) fully protected with EMV in brick-and-mortar sales over the counter.
This combination of desired features helps explain the rise in demand for Guaranteed Fraud Protection as retailers leveraging this service will never pay a chargeback (per the guarantee) but are also assured they will see more orders accepted since the solution provider is only paid for accepted orders.