One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1770246
Date de publication 2020-06-22 11:00:00 (vue: 2020-06-23 06:15:42)
Titre 3 Steps to better cybersecurity in touchless business solutions (part 1 of 3)
Texte                             guy using a touchless  app                                Image Source This blog was written by an independent guest blogger. The current pandemic that has upended our lives and wreaked havoc across the world have also humbled countries to a shocking degree. As borders closed, so did major sectors, industries, and businesses. Brick-and-mortar establishments had to cease operations and resume their business remotely to comply with quarantine measures.  As conditions are getting better, the next challenge is for governments to restore both lives and livelihoods. Businesses are now preparing strategies and solutions on how to get safely back to work while complying with quarantine guidelines released by policymakers and preserving both their workforce and customers.  All the countries that kept their economy going followed rigorous physical distancing rules, aside from other measures to contain transmission chains. These countries give hope that getting back to a “new normal” is indeed possible, even if we do not see an end yet to this global tragedy. The demand for social distancing is hastening our transition to a more digital economy. Businesses need to streamline their operations, automate, and integrate touchless solutions to preserve human touch and prevent contamination. But heightened automation and touchless technology also call for more robust cybersecurity systems to prevent fraud, data breach, and attacks. This is a 3-part series discussing ways to better cybersecurity in touchless business solutions, with recommended preventive measures against cyber attacks that keep both business and clients secure. Practice extra caution in cashless payment solutions. Because of the severity of the virus attack on individuals, many establishments in different countries have banned cash payments altogether. Debit/credit card payments were made touchless manually, with cashiers letting consumers swipe their cards on the PED, which are then cleaned and sanitised after every use.  But a more straightforward way to go touchless is to go cashless, with the use of E-wallet payment systems and payment apps. An E-wallet is an app that lets you store money, transfer directly to your bank account, so you can use your mobile to shop and pay for items by scanning a QR code. The E-wallet can be connected directly to a consumer’s debit/credit account. The more cautious consumer can also top up or load just the cash they need on their E-wallets before making any transaction. No matter what system consumers use, every part of the sale is digital from payment to receipts. Even for microbusinesses in small communities, cashless payment is still possible through online payment apps. Risks in cashless payment solutions ●Smishing attacks Smishing is a kind of phishing attack where someone tricks you into giving your credentials through a phone call or SMS message. It has become a significantly growing threat in the world of online security. The pandemic only encouraged hackers to intensify their smishing efforts. Untrusted apps and phishing SMSes are giving cyber attackers full access to consumer’s phone and e-payments. For instance, a hacker can send a phishing SMS disguised as c
Notes
Envoyé Oui
Condensat ●lost ●smishing ●wireless “new  these ability able about access account across action added after against agrees ahead all allowing also altogether always any app apply apps are aside assistant attack attackers attacks automate automatically automation available avoid aware back bank banking banned because become been before being best better biometric blocked blocker blocking blog blogger borders both breach brick bring browse business businesses but buy buys call calling can card card’s cards care careful carry cash cashiers cashless caution cautious cease chains challenge change check checked chip cleaned clicking clients closed code codes comes coming communities commute company comply complying compromised conditions connected consumer consumer’s consumers contact contactless contacts contain contamination convenience convenient countries credentials credit cta cumbersome current customers cyber cyberattacks cybercriminals cybersecurity damaging data debit debit/credit degree demand despite details device devices did different digital digitally directly discussing disguised distancing doubt download downloaded during ease easy economy effective efforts email emails embedded enabled encouraged end especially essential establishment establishments even every excellent extra facial find finding followed found fraud freebies frequencies frequency from full function gather get getting give gives giving global going gone goods governments growing guest guidelines hacker hackers had has hastening have having havoc health heightened high hope hopefully how however human humbled identification identity image including increased incredibly indeed independent individuals industries infected insert inserted instance integrate intensify intercept irregularity items its just keep kept kind know known legitimate lets letting like link links list livelihoods lives load lock log login long longer lose losing loss lost luxury machines made major making malware manually many matches matter may measure measures message messages messaging microbusinesses might missing mobile money more mortar most national need new newly next non normal” normally nose not now numeric offer once one online only open operations options other outweighs owner’s pandemic part password passwords pattern pay paying payment payments pays ped person personal phishing phone phones physical pin places policymakers pos possible practice preparing preserve preserving pretend prevent prevention preventive private productivity promo promotions protected protocol provided provider public purchase purse quarantine quickest quickly radio readily receipts receive recognition recommended regard regularly released remember remotely response responsible restore resume retail rfid rigorous risks robust routinely rules running safely safety sale sanitised say scanning sectors secure securing security see seems send sends sent series service services severity shocking shop should significantly simple simplest since skim skimmers skimming small smart smartphones smishing sms smses social solutions some someone something source specific stay steal stealing step steps stolen store straightforward strategies streamline succeeding such swipe system systems taking tasks technology theft then these think threat threats through time tool top touch touchless tracking tragedy transaction transactions transfer transition transmission tricks trojan trust trusted turn twice two under unlock unnecessary unsafe untrusted upended url use using usually verification verify virus viruses voice walking wallet wallets wary way ways what whatever when whenever where whether which who will wireless without work workforce world wreaked written yet your
Tags Threat
Stories
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: