Internet Security

Internet Protection

Browsing Securely

Internet security does not stop at merchants and e-payment solution providers alone. Government and all stake-holders in the use of cyber space are concerned about safety of vital data information for all that use the web. This explain why, PC and laptop comes with either McAfee or Norton protection software.

Hacking and phishing public and private sensitive information have become an organized crime across the world. The dimension assumed by the under world internet criminal is compelling that, governments are coming together to form bilateral relations on security matter to fight the scourge.

While governments are doing their best to put the situation under control, internet users also need to be at alert while they use the internet. Antivirus software are designed to forewarn web users of suspicious web sites. But you’re left with the option to; either heed the warning or access the site if you thrust the source. For security purpose, it is wise to pulse and consider the next move in suspicious situation. Be sure you’re in the right website before sign-in to a website.

Hand-held devices used for internet browsing equally need antivirus applications, install in them. Current trend assume by hand-held devices particularly, the smart phones, iPad, iPod and other sophisticated mobile device have made it imperative to have them protected from internet attack.

All that are discuss so far, relates to protection of PC, laptop or hand-held mobile device from malicious attacks that could damage files.

Password Safe and Form Filler
Personal information and card data equally need optimum protection from hackers and phishing websites if you mistakenly found yourself in one. If you’re a heavy subscriber or affiliate of many websites, which necessitate your
signing-in for access privilege then, you need “Password Protect and Form Filler” software on your browsing system.

Keeping passwords list in your office or at home is old fashion and unsecured. You’re often warned about the danger of leaving personal information exposed. When least expected, you might discover your e-mail address or other
documents have been penetrated and vital information stolen.

Having password protective device installed on your browsers, give you easy and secure log-in protection. You can apply it to multiple websites simultaneously. All you need is a Master Password. You can search google for
the application to download to your system. As usual, some information are required after download. And one of those information is your Master Password.

Your master password is all you need to cram in your brain, to use the software. The installation process is simple enough. The software operate on copy and paste basis. The following steps will help to start saving your User Name and Password into the software: At first visit to say, Yahoo! mail website, you’re requested to log-in.

Fill your Username and Password in the fields, and click, sign-in. As you click to access your e-mail box, a pop-up will ask, if “you want the software to save the sign-in information“? Click the Yes or the affirmative button. Simultaneously, another pop-up will ask you to enter your Master Password. Enter the master password code and click the sign-in button and you are taken to your mail box.

Next, to be sure that you get the setting correctly, log-out from your mail-box and log-in again. If the installation is okay, immediately you enter Yahoo! mail page again, the Master Password automatically pop-up for you to enter it and have access to your e-mail box.

Go through the same steps to save username and password in other websites that you subscribe to. In the same way, you can fill web form at the respective site and save for future use.

Please note! when you enter a familiar website that you’ve save already, but you’re taken through the username and password entry process again, you should PULSE to investigate the site. You may have enter a PHISHING website trap. Open another Tab or Window, enter the website URL i.e. (www.website.com) manually, into a blank browser to access the website again see what happen. If the site open correctly by asking for Master Password, it confirm that the former one is a phishing site that wanted to steal your personal data.

Advertisements
Internet Security

PCI DSS

(PCI DSS)

Security of cardholders personal information and card data from unauthorize
persons, is key to successful operation of “e-commerce payment system”. Serious
emphasis is therefore placed on security of payment gateway infrastructure by
Card Issuing Banks. To archive it’s objectives, Payment Card Industry (PCI), a
body of Card Issuing Banks, met and decided to put in place; standard security
routing process that, payment gateway system must comply with.

It also agreed that the process be updated annually for compliance. A 6-step rule
called: Payment Card Industry Data Security Standard (PCI DSS), was then
outlined, that payment gateway system must satisfied as condition for
operation recognition. The rules it is believe will minimize or eliminate, e-
commerce payment fraud and provide protection for businesses involve in e-
commerce payment system.

PCI DSS rules below, is an adaptation extract from Visa Inc. web site and is
purely for appreciation of efforts of stakeholders in tackling e-payment fraud.

PCI DSS Regulations

  • Build and Maintain a Secure Network

Install and maintain a firewall configuration, with personalized password for
the protection of cardholders data and other security parameters

  • Protect Cardholders Data

Where necessary, cardholder data, stored in payment gateway server must be
protected. The data must also be encrypted in transmission across open
networks.

  • Maintain a Vulnerability Management Program

Install anti-virus software and ensure it’s regular update. Develop and
maintain secure systems and payment gateway applications.

  • Implement Strong Access Control Measures

Access to cardholder data (online or offline) must be on need-to-know basis. And
personnel with access to the data must be assigned unique ID and Password.

  • Regularly Monitor and Test Networks

Track and monitor all access to network resources and cardholder data. Develop
routing test on your security systems and processes.

  • Maintain an Information Security Policy

Put in place policy that will regularly address issues relating to information
security which must be adhere to by your personnel and associates in the
business.

Cardholders and web surfers equally have responsibility to cover their tracks as
they log-in or fill sensitive forms online. Installation of antivirus software is
essential for the protection of web browser to avoid falling victim of fraudsters
that phish the internet. Antivirus protection prevent unwanted internet
intruders from accessing personal data and important information.