Tag Archives: Cybersecurity

Protecting your wallet in the digital age

In days gone by, keeping your wallet safe while out and about just meant making sure it was still in your pocket. But with a variety of new payment technologies such as contactless payment or Chip and PIN being developed and rolled out, and hackers becoming increasingly creative about how they access and use your information, times are changing fast.

While we all want speedier, more convenient payment options, have you stopped to consider the level of personal information you now carry around about yourself, and whether you are still doing such a good job of keeping your wallet safe in today’s digital age?

As National Cyber Security Awareness month continues, I’ve jotted down a few of my top tips:

When is a wallet, not a wallet?

There has been much talk of the ‘digital wallet’ in recent years, but with NFC payments now enabled through schemes such as Apple Pay and Android Pay, your smartphone could now be considered a wallet on its own. As such, you’ll need to consider both its physical and cyber security. This means taking steps such as considering where you’re carrying and using your phone, making sure you have software to protect it from malware, and ensuring you only use it at trusted locations for sensitive transactions such as money transfers.

Does you wallet speak for itself?

With contactless payment systems becoming more popular, especially in Europe, even cards in your wallet could speak without you knowing. If you card has the ‘contactless’ Wi-Fi type symbol on it then it most likely has RFID technology that allows details to be read from the card without the need to swipe or insert into a chip and pin reader. This also means that if a cybercriminal can get close enough to your card then they might be able to read some of the data from it. Wallet manufacturers are now producing wallets that add pockets of protection for you to store cards of this type. I recently purchased one and now it stores both my driver’s licence and contactless cards in the protected zone.

Putting a PIN in your security

With the increase in payment technologies such as Chip and PIN and contactless, the contents of your traditional wallets are also more vulnerable than ever before. So what steps should you take here?

Just as you wouldn’t leave your house keys in your front door, your card or phone’s PIN number should never be written down and certainly not left with the card or phone itself. If you have trouble remembering the PIN provided by your bank, you should change it to a number that’s easier for you to remember – but not so easy that others could guess it. When entering your PIN, you should also hide it from anyone who might be looking!

While not yet mainstream in the U.S., ‘touch and go’ NFC payment from a phone or ‘contactless’ RFID from a credit card is already common in Europe. Making a payment in seconds is appealing to many of us, but this convenience comes with a number of other security considerations. In the UK, there is currently a cap of $45 (£30) on such purchases – minimising the risk of significant purchases being made on a stolen card or phone. For anyone still feeling nervous, it is possible to ‘opt out’ and request a simple Chip and PIN card.

Beyond these more ‘high-tech’ tips, there are other points of best practice that should always be observed in protecting your financial security.

Check what you’re paying for

As cashless payment becomes the norm, it’s easy to lose track of what you’re spending, and even if you’re the one spending it! Always make sure to check your bank statement, even if online, for any ‘rogue’ payments. Many of us have the attitude that ‘it won’t happen to me’, but fraudsters will often start with small amounts that may go unnoticed to those who aren’t vigilant.

Bin those receipts

Is your wallet bulging with six months’ worth of receipts? If so, de-clutter! Receipts can carry a whole host of valuable information including your credit card details or signature. Keep any important receipts for returns, warranties or business expenses, at home and make sure to shred the rest. Expired cards should also be cleared out of your wallet. While you can’t use them anymore, your information could still be of use to a potential fraudster.

Having taken my wallet with me on various travels abroad recently, I know I’ve kept these tips in mind, and fingers crossed, remained fraud free! Hopefully they will help you do the same!

Is the cloud more secure for you? Only you hold the answer

Thinking of using the cloud, but have doubts whether it’s secure enough? You are not alone. Many enterprises hesitate to fully embrace it, fearing that their sensitive data might get compromised when stored online. But is the risk really high or can it be managed?

The post Is the cloud more secure for you? Only you hold the answer appeared first on We Live Security.

AVG works with National Federation of Independent Business to raise awareness of online security

Read the headlines and you would think cyber-crime was all about big brands fighting to keep customer data out of hackers’ hands.

You might even think it is about governments and cyber-espionage.

But behind the headlines, there is a day-to-day story of small business under attack.

So to mark National Cyber Security Awareness Month, we’re working with the National Federation of Independent Business (NFIB) to share free tools and resources and about online threats.

Through October, we’ll help NFIB members and small business owners learn more about some of the practical issues around cybersecurity.

We’ll share information about the common tricks and tactics of hackers, and we’ll explore the issues around Bring Your Own Device (BYOD) and the challenge of keeping a business secure when the lines are blurring between an employee’s personal tech and their professional life.

This week we’re encouraging small business owners and NFIB members to take our AVG Small Business IT Security Health Check.

It’s a simple free tool to help business owners think about how well-prepared they are against cyber threats.

The tool poses 17 multiple choice questions across a range of security topics: from password security to IT infrastructure.

There are also questions about what plans business owners have in place to deal with the fall-out if a security breach happens and customer, employee or suppliers’ personal information is compromised.

In the weeks ahead, we’ll share updated versions of our free ebooks through the NFIB’s regular email newsletter to members:

  • Digital Policy Guide
    What kind of issues emerge from employees and business owners using social media for personal and professional life? This guide looks at how social media can be a positive tool for businesses – and a management challenge if it’s misused. Download the guide.
  • Hackers and Hacking
    What are hackers looking for and what are their common tricks and tactics? Employees’ payroll data? Customer and suppliers’ bank details? This guide covers the threat of hacking, the motives behind it, what is at risk and how to combat these kinds of attacks. Read the ebook.
  • Bring Your Own Device
    Mobile tech from smartphones to tablets means that employees can keep in touch with friends and family on the same device they use to keep track of work emails, appointments and data. So what does that mean for your business? This guide looks at the issues around BYOD.

Sadly, there’s no way to stop hackers from trying to breach the virtual defences of small businesses. Wherever they are in the world, hackers will keep trying to find valuable data and disrupt business operations. And as Steve Chabot (R-OH), Chairman of the Congressional Small Business Committee, explained earlier this year, 71 percent of cyber-attacks are targeted at businesses with fewer than 100 employees.

So we hope our association with the NFIB will spread awareness of the issues and help small business owners feel better prepared to deal with online threats and ready to take steps to make their businesses more secure in future.

Global Trends in Cybersecurity: What I learned from the CERT-RO conference

Earlier this week, CERT-RO organized its 5th Annual Conference in Bucharest focusing on “Global trends in Cybersecurity”. Avira team members had the pleasure of attending the event not only as guests but also as sponsors and speakers.

The post Global Trends in Cybersecurity: What I learned from the CERT-RO conference appeared first on Avira Blog.