Ipinapakita ang mga post na may etiketa na online protection. Ipakita ang lahat ng mga post
Ipinapakita ang mga post na may etiketa na online protection. Ipakita ang lahat ng mga post

Miyerkules, Pebrero 5, 2014

Protect Yourself Online From the Latest Online Predators.



On November 15, 2013 in Davis County, Utah, Police Officers began searching for a suspected predator who has been contacting hundreds of school girls with social networking sites like Facebook.

The man, who claims to be around 20 years old, gets the students' information after they "accept" his friend request online. From there, he tracks any personal information they have posted, including phone numbers, pictures or even their weekend plans.

"We don't know if this is a juvenile that's playing a prank, maybe they think it's funny, but there are some concerned students and parents, so we are taking it seriously," said Deputy Geoff Hasty from the Davis County Sheriff's Department.

Deputy Hasty has advice for parents with kids who use social media:

"Only accept friend requests from people you know for sure and not someone who could be misinterpreting themselves."

As a parent, I understand the importance of increasing security features on social networking sites to avoid online predators and hackers from hacking personal information. However, this is not always enough.

Parents should have access to their children’s social media pages to ensure that comments and posts are age-appropriate and that their social friends are also their real friends.

Not only should you use advanced security and privacy features within social networking sites set, but you should also have security features set on your computer. Hackers can access computers as well as websites if you are not using the latest software updates and security software.

Sabado, Enero 7, 2012

Are Your Standards High? Follow the Payment Card Industry Data Security Standard

Wiki describes the PCI DSS as “the standard created to increase controls around cardholder data to reduce credit card fraud via its exposure. Validation of compliance is done annually — by an external Qualified Security Assessor (QSA) for organizations handling large volumes of transactions, or by Self-Assessment Questionnaire (SAQ) for companies handling smaller volumes.” In more simple terms it means that the Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to optimize the security of credit, debit and cash card transactions and protect cardholders against misuse of their personal information. It protects your personal information from falling into the hands of hackers.

The PCI DSS was created jointly in 2004 by four major credit-card companies: Visa, MasterCard, Discover and American Express, to help protect consumer’s security. There are 6 major objectives that PCI DSS determines to accomplish.

First, a secure network must be maintained in which transactions can be conducted. This requirement involves the use of firewalls and trust seals that are strong enough to be effective without causing undue inconvenience to cardholders or vendors. Specialized firewalls are available for wireless LANs, which are highly vulnerable to eavesdropping and attacks by malicious hackers.

Second, cardholder information must be protected wherever it is stored. Security trust seals and penetration testing are crucial to having your personal information remain secure.  Digital encryption is important in all forms of credit-card transactions, but particularly in e-commerce conducted on the Internet.

Third, systems should be protected against the activities of malicious hackers by using frequently updated anti-virus software, anti-spyware programs, and other anti-malware solutions like those offered by Trust Guard. All applications should be free of bugs and vulnerabilities that might open the door to exploits in which cardholder data could be stolen or altered.

Fourth, access to system information and operations should be restricted and controlled. Cardholders should not have to provide information to businesses unless those businesses must know that information to protect theselves and effectively carry out a transaction. Every person who uses a computer in the system must be assigned a unique and confidential identification name or number.

Fifth, networks must be constantly monitored and regularly tested to ensure that all security measures and processes are in place, are functioning properly, and are kept up-do-date. Network security is essential to be successful and hacker free.

Sixth, a formal information security policy must be defined, maintained, and followed at all times and by all participating entities. Enforcement measures such as audits and penalties for non-compliance may be necessary.

PCI DSS was created to keep our online information safe and secure, away from hackers and viruses.