How to Protect Employees and Consumers from Malicious Exploits - Slide 13

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
Next How to Protect Employees and Consumers from Malicious Exploits-13 Next

Update privacy and data use policies to clearly state what data is being collected, who it is being shared with and how it is being used to increase consumer trust and self-regulation. Consider multilingual policies to support users where English is a second language

The Online Trust Alliance (OTA) recently released their “2011 Top 10 Recommendations to Help Businesses Protect Consumers from Being Fooled.” This document includes a list of techniques and procedures, which can easily be implemented to help businesses and government agencies protect their customers' and employees' personal and financial data from being compromised. OTA developed the list to address the most common and dangerous threats based on a review of thousands of fraudulent emails, data breaches, hacking, and identity theft incidents.

The 2011 Top 10 recommendations address the most frequent exploits including malicious email, phishing and deceptive websites as well as emerging threats impacting online trust and confidence. In addition, OTA encourages businesses to review existing OTA best practices to protect the DNS and users' data and privacy.

More Slideshows:


Seven Sexy Smartphones This latest batch of smartphones calls attention to glasses-free 3D technology, front- and rear-facing cameras and Snapdragon processors.

UC&C Solution Deployment and User Adoption Best Practices Best practices you should apply to any UC&C implementation project.


Top 12 Job Search Sites for IT Professionals Top job boards providing job search, resume advice, survival tips and job-hunting guidance.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.