Does password autofill make hacking easier?

Password autofill is undeniably convenient, but do you know the dangers of using this common browser feature? Here’s what you should be aware of when using it and how to secure yourself from potential cyberattacks through this feature. The risks of password autofill Password autofill is a convenient feature found in most browsers and password […]

The dangers of password autofill

Modern web browsers and password managers come with a feature called password autofill. This helps users store and automatically use their account credentials to access websites and other applications. While password autofill is convenient, it comes with security risks. Why password autofill is so dangerous Modern web browsers and password managers have a feature that […]

Here’s what you should know about distributed spam distraction

Cybercriminals are always devising ways to attack both individuals and businesses inconspicuously. This helps them avoid detection, which buys them time to infiltrate a system and take hold of information they can leverage for a bigger attack. One way crooks do this is through distributed spam distraction (DSD) schemes. What is DSD? DSD is a […]

Why autocomplete passwords are risky

Many people use auto-fill passwords for their convenience. What you might not know is that hackers and advertisers can use them to get access to websites and other applications and gather sensitive information. Learn more about the risks of using autocomplete passwords. Why auto-fill passwords are so dangerous Certain web browsers have integrated features that […]

How You Can Comply with the Red Flag Rule

To comply with the federal government’s Red Flag Rule, you’ll need to have a written policy that specifically addresses how you will prevent and handle identity theft — and more. Regulations designed to minimize identity theft went into effect in June of 2010. Are you complying with them? The federal government’s so-called “Red Flag Rule” requires all businesses that are potential identity-theft targets develop plans to spot red flags and prevent theft. Red flags include suspicious photo IDs, unverifiable addresses and Social Security numbers, and questionable account activity, to name just a few. While many companies think the Red Flag Rule only applies to financial institutions, it actually applies to all creditors — with creditors being defined as “businesses or organizations that regularly provide goods and services first and allow customers to pay later,” according to a Frequently Asked Questions guide prepared by the Federal Trade Commission, which will enforce the Red Flag Rule. In other words, if you invoice customers for your goods or services, you’re a creditor — and the Red Flag Rule applies to you. How can you comply?  You’ll need to have a written policy that specifically addresses how you will prevent and handle identity theft. Other recommendations include data encryption, annual updates of your written policy, and staff training. While this may seem onerous, you don’t want to ignore the legislation. Fines are $3,500 per violation — and the threat of a lawsuit from customers whose identity has been stolen. Related articles Do You Comply with the FTC’s Red Flag Fule?

Set up a productive, efficient, and secure remote team that can help you run your business anywhere. Download our free eBook today to learn how!Download here
+