How to Protect Employees and Consumers from Malicious Exploits - Slide 11

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
Next How to Protect Employees and Consumers from Malicious Exploits-11 Next

Enable encryption on all wireless routers and access points and hide your SSID (Service Set Identifier Names), or name it to help ensure that SSID does not provide details which identify your business. Change your keys frequently to help prevent key disclosure or unauthorized use. If you are providing free wireless services, limit how and when your network can be used, monitor usage and keep the network isolated from your business network.

The Online Trust Alliance (OTA) recently released their “2011 Top 10 Recommendations to Help Businesses Protect Consumers from Being Fooled.” This document includes a list of techniques and procedures, which can easily be implemented to help businesses and government agencies protect their customers' and employees' personal and financial data from being compromised. OTA developed the list to address the most common and dangerous threats based on a review of thousands of fraudulent emails, data breaches, hacking, and identity theft incidents.

The 2011 Top 10 recommendations address the most frequent exploits including malicious email, phishing and deceptive websites as well as emerging threats impacting online trust and confidence. In addition, OTA encourages businesses to review existing OTA best practices to protect the DNS and users' data and privacy.

More Slideshows:


Seven Sexy Smartphones This latest batch of smartphones calls attention to glasses-free 3D technology, front- and rear-facing cameras and Snapdragon processors.

UC&C Solution Deployment and User Adoption Best Practices Best practices you should apply to any UC&C implementation project.


Top 12 Job Search Sites for IT Professionals Top job boards providing job search, resume advice, survival tips and job-hunting guidance.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.