The Best Security Advice from Leading Experts

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22
Next The Best Security Advice from Leading Experts-11 Next

Beware of Fake Users Infiltrating Websites

A study from Ponemon Institute and TeleSign looked at the impact of fake users that infiltrate websites and business networks. The study found that 82 percent of companies struggle with fake users. Even though these fake accounts hurt the business, resulting in hundreds of thousands (or more) of dollars lost or stolen or paid in fines and/or lost business, 64 percent of companies prefer a registration that's easy to use rather than one that requires a lot of security hoops to jump through.

Larry Ponemon of the Ponemon Institute says,

"It is up to the companies themselves to come up with a registration approach that works for everyone. Fake users are one of the first steps in the chain of crime, impacting consumers and businesses both directly and indirectly through acts of fraud, theft of information and control of data."

Read more at Fake Users Infiltrate Websites; Companies Allow It to Avoid Friction in Registration.

Your company's data — client information, payment information, personal files, bank account details — is always at risk of falling into the wrong hands. And every day, security threats seem to come from a new place.

In this slideshow, we have collected some of the best advice that leading security experts have shared with IT Business Edge recently, identifying areas of data vulnerability and helping you develop strategies for securing your data and information systems.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.