<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Archives - Tech Trends</title>
	<atom:link href="https://techtrends.tech/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://techtrends.tech/tag/cybersecurity/</link>
	<description>Tech Trends</description>
	<lastBuildDate>Fri, 27 Mar 2026 12:00:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Cybercrime Goes Industrial</title>
		<link>https://techtrends.tech/cybersecurity/industrial-scale-cybercrime-networks/</link>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 11:57:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Industry Trends]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Cryptocurrency scams]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Digital fraud]]></category>
		<category><![CDATA[Fake websites]]></category>
		<category><![CDATA[Internet security]]></category>
		<category><![CDATA[Online scams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Threat intelligence]]></category>
		<guid isPermaLink="false">https://techtrends.tech/?p=17203</guid>

					<description><![CDATA[<p>Scams are becoming global industrial scale operations</p>
<p>The post <a href="https://techtrends.tech/cybersecurity/industrial-scale-cybercrime-networks/">Cybercrime Goes Industrial</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Scams are becoming global industrial scale operations</strong></p>
<p>Cybercrime is no longer just hackers sending phishing emails or small groups running online scams. According to new research from <a href="https://nordvpn.com/">NordVPN’</a>s Threat Intelligence team, cybercrime is becoming industrialized — with large-scale operations running fake stores, cryptocurrency scams, and malware campaigns across thousands of websites worldwide.</p>
<p data-start="1771" data-end="2005">The report reveals three major global scam operations that demonstrate how cybercriminals are increasingly operating like technology companies, using automation, infrastructure, and large-scale systems to run fraud campaigns at scale.</p>
<h2 data-start="2007" data-end="2059">Old software vulnerabilities creating new threats</h2>
<p data-start="2061" data-end="2423">One of the most surprising findings in the report is that attackers are still exploiting extremely old software vulnerabilities. In one campaign, cybercriminals exploited a 15-year-old vulnerability in an outdated web editor tool to compromise more than 1,300 websites, including government, corporate, and research domains.</p>
<p data-start="2425" data-end="2669">These trusted websites were then used to redirect visitors to phishing pages, fake online stores, or malware downloads. Because the domains were legitimate, security systems were more likely to trust them, making the attacks far more effective.</p>
<div id="attachment_17206" style="width: 634px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-17206" class="wp-image-17206 size-full" src="https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram-1.jpg" alt="Diagram showing cybercriminal campaign exploiting outdated software vulnerabilities" width="624" height="392" srcset="https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram-1.jpg 624w, https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram-1-150x94.jpg 150w, https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram-1-80x50.jpg 80w" sizes="(max-width: 624px) 100vw, 624px" /><p id="caption-attachment-17206" class="wp-caption-text">Attackers exploit outdated software to compromise trusted websites and redirect users to scams</p></div>
<p data-start="2731" data-end="2877">This strategy shows how cybercriminals are increasingly using legitimate infrastructure to run scams rather than building everything from scratch.</p>
<h2 data-start="2879" data-end="2942">Cryptocurrency scams evolving into identity theft operations</h2>
<p data-start="2944" data-end="3167">The report also uncovered a large-scale cryptocurrency phishing network involving more than 100 fake crypto domains. The scam begins with emails claiming the recipient has received a large cryptocurrency deposit by mistake.</p>
<p data-start="3169" data-end="3434">Victims are directed to fake cryptocurrency platforms where they are asked to log in and later pay so-called “gas fees” to withdraw the funds. In reality, the platforms are fake and the fees are stolen, while attackers also collect personal data for identity theft.</p>
<div id="attachment_17205" style="width: 634px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-17205" class="size-full wp-image-17205" src="https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram.jpg" alt="Diagram showing cryptocurrency phishing scam process" width="624" height="344" srcset="https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram.jpg 624w, https://techtrends.tech/wp-content/uploads/2026/03/vulnerability-exploit-campaign-diagram-150x83.jpg 150w" sizes="(max-width: 624px) 100vw, 624px" /><p id="caption-attachment-17205" class="wp-caption-text">Cryptocurrency phishing scams trick users into paying fake fees and revealing personal data</p></div>
<p data-start="3493" data-end="3648">These scams combine phishing, identity theft, and cryptocurrency fraud into a single operation, making them particularly effective and difficult to detect.</p>
<h2 data-start="3650" data-end="3691">Fake online stores run like businesses</h2>
<p data-start="3693" data-end="3992">Another operation uncovered in the investigation involved more than 800 fake e-commerce stores built using common website tools like WordPress and WooCommerce. These sites advertise products at extremely low prices to attract buyers, but customers either receive counterfeit goods or nothing at all.</p>
<p data-start="3994" data-end="4173">Investigators found that many of these websites were connected to a centralized operation, showing how automation allows a single group to operate hundreds of fake stores at once.</p>
<h2 data-start="4175" data-end="4212">Cybercrime is becoming an industry</h2>
<p data-start="4214" data-end="4461">The most important takeaway from the report is that cybercrime is increasingly being run like a business. Criminal groups are using automation, software platforms, data analytics, and large-scale infrastructure to run fraud operations efficiently.</p>
<p data-start="4463" data-end="4508">Instead of isolated scams, we are now seeing:</p>
<ul data-start="4509" data-end="4641">
<li data-start="4509" data-end="4524">Scam networks</li>
<li data-start="4525" data-end="4542">Fraud platforms</li>
<li data-start="4543" data-end="4571">Automated phishing systems</li>
<li data-start="4572" data-end="4600">Fake e-commerce ecosystems</li>
<li data-start="4601" data-end="4641">Industrial-scale cybercrime operations</li>
</ul>
<p data-start="4643" data-end="4806">This shift means cybersecurity is no longer just about stopping individual hackers — it is about defending against organized digital industries built around fraud.</p>
<h2 data-start="4808" data-end="4838">The future of cybersecurity</h2>
<p data-start="4840" data-end="5032">As cybercrime becomes more organized and automated, cybersecurity will increasingly rely on AI, automation, and threat intelligence to detect patterns and stop attacks before they reach users.</p>
<p data-start="5034" data-end="5225">For individuals and businesses, the biggest risks continue to come from phishing, fake websites, outdated software, and online scams — all of which are becoming more sophisticated every year.</p>
<p>The post <a href="https://techtrends.tech/cybersecurity/industrial-scale-cybercrime-networks/">Cybercrime Goes Industrial</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17203</post-id>	</item>
		<item>
		<title>Cyberwar Reaching Everyday Systems</title>
		<link>https://techtrends.tech/cybersecurity/cyberwar-everyday-systems-cybersecurity/</link>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 17:28:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Industry Trends]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Cyberwar]]></category>
		<category><![CDATA[Geopolitics Cybersecurity]]></category>
		<category><![CDATA[Healthcare Cybersecurity]]></category>
		<category><![CDATA[Infrastructure Security]]></category>
		<category><![CDATA[Iran Cyber Attacks]]></category>
		<category><![CDATA[Payment Systems Security]]></category>
		<category><![CDATA[Phishing Attacks]]></category>
		<guid isPermaLink="false">https://techtrends.tech/?p=17182</guid>

					<description><![CDATA[<p>Iran-linked cyber attacks targeting everyday services</p>
<p>The post <a href="https://techtrends.tech/cybersecurity/cyberwar-everyday-systems-cybersecurity/">Cyberwar Reaching Everyday Systems</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="313" data-end="504"><em><strong>Iran-linked cyber attacks targeting hospitals and payment networks</strong></em></p>
<p data-start="313" data-end="504">Cyber attacks linked to geopolitical conflict are increasingly affecting the companies and systems that ordinary people rely on every day, according to cybersecurity researchers and analysts.</p>
<p data-start="506" data-end="813">A new commentary from cybersecurity publication Cybernews warns that cyberwar is no longer limited to governments, military systems, or intelligence agencies. Instead, attacks are increasingly targeting healthcare systems, payment infrastructure, and critical services used by the public and private sector.</p>
<h2 data-start="815" data-end="864">Cyber attacks moving beyond government targets</h2>
<p data-start="866" data-end="1026">Recent incidents involving major companies highlight how geopolitical cyber retaliation can now have real-world consequences for businesses and public services.</p>
<p data-start="1028" data-end="1425">According to reporting referenced in the commentary, Iran-linked hacktivist group Handala claimed attacks on payment provider Verifone and medical technology company Stryker. The alleged attack on Stryker reportedly disrupted operations and affected healthcare providers attempting to order surgical supplies, demonstrating how cyber incidents can ripple into healthcare systems and supply chains.</p>
<p data-start="1427" data-end="1581">These types of attacks show that modern cyberwarfare is increasingly focused on economic and infrastructure targets rather than purely government systems.</p>
<h2 data-start="1583" data-end="1627">Threat activity already increasing online</h2>
<p data-start="1629" data-end="1726">Security researchers say the threat landscape is already expanding as geopolitical tensions rise.</p>
<p data-start="1728" data-end="1976">Researchers have identified thousands of newly registered domains related to Middle East conflict themes, which may later be used in phishing campaigns, malware distribution, or disinformation campaigns. Attack methods expected to increase include:</p>
<ul data-start="1978" data-end="2176">
<li data-start="1978" data-end="1998">Phishing campaigns</li>
<li data-start="1999" data-end="2045">Distributed denial of service (DDoS) attacks</li>
<li data-start="2046" data-end="2058">Ransomware</li>
<li data-start="2059" data-end="2100">Data leaks and hack-and-leak operations</li>
<li data-start="2101" data-end="2130">Destructive malware attacks</li>
<li data-start="2131" data-end="2176">Credential harvesting and password spraying</li>
</ul>
<p data-start="2178" data-end="2278">These tactics are commonly used by both state-backed groups and affiliated hacktivist organizations.</p>
<h2 data-start="2280" data-end="2328">Human error remains the biggest vulnerability</h2>
<p data-start="2330" data-end="2470">Despite increasingly sophisticated cyber attacks, experts say the most common entry point remains human error and basic security weaknesses.</p>
<p data-start="2472" data-end="2503">Common vulnerabilities include:</p>
<ul data-start="2505" data-end="2682">
<li data-start="2505" data-end="2525">Unpatched software</li>
<li data-start="2526" data-end="2552">Weak or reused passwords</li>
<li data-start="2553" data-end="2604">Default credentials on internet-connected devices</li>
<li data-start="2605" data-end="2642">Lack of multi-factor authentication</li>
<li data-start="2643" data-end="2682">Employees falling for phishing emails</li>
</ul>
<p data-start="2684" data-end="2877">Researchers also warn that artificial intelligence is making cyber attacks easier to scale, allowing attackers to generate convincing phishing messages and automate parts of the attack process.</p>
<p data-start="2879" data-end="3045">This combination of geopolitical conflict, automation, and existing security weaknesses means organizations must improve basic cybersecurity practices to reduce risk.</p>
<h2 data-start="3047" data-end="3088">Cyberwar now affects everyday services</h2>
<p data-start="3090" data-end="3329">The key takeaway from recent incidents is that cyberwar is no longer a distant or abstract threat. Instead, it is increasingly affecting companies that provide essential services such as healthcare, payments, logistics, and infrastructure.</p>
<p data-start="3331" data-end="3577">For businesses, this means improving patching, authentication, and employee cybersecurity training. For individuals, it highlights the importance of strong passwords, multi-factor authentication, and caution when opening emails or clicking links.</p>
<p data-start="3579" data-end="3757">As geopolitical tensions continue to influence cyber activity, experts warn that disruptions may increasingly affect everyday services rather than traditional government targets.</p>
<p>The post <a href="https://techtrends.tech/cybersecurity/cyberwar-everyday-systems-cybersecurity/">Cyberwar Reaching Everyday Systems</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17182</post-id>	</item>
		<item>
		<title>Securing Hotel Booking Systems</title>
		<link>https://techtrends.tech/cybersecurity/hotel-phishing-cybersecurity/</link>
		
		<dc:creator><![CDATA[Tom]]></dc:creator>
		<pubDate>Fri, 20 Mar 2026 03:45:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Industry Trends]]></category>
		<category><![CDATA[IOT Tech]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Hospitality Tech]]></category>
		<category><![CDATA[Hotel Management Systems]]></category>
		<category><![CDATA[Phishing Attacks]]></category>
		<guid isPermaLink="false">https://techtrends.tech/?p=17103</guid>

					<description><![CDATA[<p>Phishing attacks targeting hotel systems are rising sharply, putting guest data, operations, and brand trust at risk across the hospitality &#8230; <a class="kt-excerpt-readmore" href="https://techtrends.tech/cybersecurity/hotel-phishing-cybersecurity/" aria-label="Securing Hotel Booking Systems">Read More</a></p>
<p>The post <a href="https://techtrends.tech/cybersecurity/hotel-phishing-cybersecurity/">Securing Hotel Booking Systems</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 data-start="451" data-end="600"><em data-start="451" data-end="600">Phishing attacks targeting hotel systems are rising sharply, putting guest data, operations, and brand trust at risk across the hospitality sector.</em></h1>
<p data-start="602" data-end="757"><strong data-start="602" data-end="757">Cybercriminals are exploiting booking platforms and property management systems—forcing hotels to rethink how they defend their digital infrastructure.</strong></p>
<hr data-start="759" data-end="762" />
<h2 data-start="764" data-end="798">A Growing Threat to Hospitality</h2>
<p data-start="800" data-end="994">Hospitality businesses are facing a surge in phishing attacks, with cybercriminals increasingly targeting hotel property management systems (PMS), booking platforms, and internal communications.</p>
<p data-start="996" data-end="1214">According to industry experts, attackers are using increasingly sophisticated methods to trick staff into revealing login credentials or installing malicious software—often by impersonating trusted systems or partners.</p>
<p data-start="1216" data-end="1300">Nicola Longfield, General Manager for Accommodation at Access Hospitality, explains:</p>
<blockquote data-start="1302" data-end="1552">
<p data-start="1304" data-end="1552">“Cybercriminals are actively targeting hotel property management systems, email systems, and booking channels… sending emails that appear to be from legitimate sources designed to trick staff into entering login information or downloading malware.”</p>
</blockquote>
<p data-start="1554" data-end="1646">These attacks are not random—they are highly targeted and tailored to hospitality workflows.</p>
<hr data-start="1648" data-end="1651" />
<h2 data-start="1653" data-end="1689">How Phishing Attacks Are Evolving</h2>
<p data-start="1691" data-end="1816">Unlike traditional phishing attempts, today’s attacks are designed to closely mimic real operational scenarios within hotels.</p>
<h3 data-start="1818" data-end="1845">Common tactics include:</h3>
<ul data-start="1847" data-end="2121">
<li data-start="1847" data-end="1896">
<p data-start="1849" data-end="1896">Fake login pages that replicate hotel systems</p>
</li>
<li data-start="1897" data-end="1949">
<p data-start="1899" data-end="1949">Lookalike domain names designed to deceive staff</p>
</li>
<li data-start="1950" data-end="2005">
<p data-start="1952" data-end="2005">Google Ads used to promote fraudulent login portals</p>
</li>
<li data-start="2006" data-end="2068">
<p data-start="2008" data-end="2068">Emails impersonating booking platforms or internal systems</p>
</li>
<li data-start="2069" data-end="2121">
<p data-start="2071" data-end="2121">Urgent messaging around payments or reservations</p>
</li>
</ul>
<p data-start="2123" data-end="2190">Jan Hejny, CEO at HotelTime, highlights the growing sophistication:</p>
<blockquote data-start="2192" data-end="2310">
<p data-start="2194" data-end="2310">“Phishing attacks are becoming far more targeted and contextual… often mimicking real payment or booking scenarios.”</p>
</blockquote>
<p data-start="2312" data-end="2445">Once attackers gain access, the consequences escalate quickly—ranging from fraudulent guest communications to full system compromise.</p>
<hr data-start="2447" data-end="2450" />
<h2 data-start="2452" data-end="2474">The Business Impact</h2>
<p data-start="2476" data-end="2515">The risks extend far beyond IT systems.</p>
<h3 data-start="2517" data-end="2552">Potential consequences include:</h3>
<ul data-start="2554" data-end="2702">
<li data-start="2554" data-end="2580">
<p data-start="2556" data-end="2580">Compromised guest data</p>
</li>
<li data-start="2581" data-end="2618">
<p data-start="2583" data-end="2618">Fraudulent booking communications</p>
</li>
<li data-start="2619" data-end="2639">
<p data-start="2621" data-end="2639">Financial losses</p>
</li>
<li data-start="2640" data-end="2666">
<p data-start="2642" data-end="2666">Operational disruption</p>
</li>
<li data-start="2667" data-end="2702">
<p data-start="2669" data-end="2702">Long-term damage to brand trust</p>
</li>
</ul>
<p data-start="2704" data-end="2754">As Diego Baldini, CISO of <a href="https://www.theaccessgroup.com/en-gb/hotels/?utm_medium=referral&amp;utm_source=pr&amp;utm_campaign=FY26-P08-HOS-CDP-TOF-Resource-Security">The Access Group</a>, notes:</p>
<blockquote data-start="2756" data-end="2901">
<p data-start="2758" data-end="2901">“These attacks can result in compromised hotel accounts, fraudulent communications sent to guests, and serious reputational or financial harm.”</p>
</blockquote>
<hr data-start="2903" data-end="2906" />
<h2 data-start="2908" data-end="2957">Industry Response: Collaboration and Awareness</h2>
<p data-start="2959" data-end="3092">Major hospitality tech providers—including Guestline, Mews, HotelTime, and Planet—are actively working to combat the rise in attacks.</p>
<p data-start="3094" data-end="3206">Richard Johnson, Chief Information Security Officer at Planet, emphasizes the importance of shared intelligence:</p>
<blockquote data-start="3208" data-end="3360">
<p data-start="3210" data-end="3360">“Fraud is a full-time operation… by sharing intelligence quickly and raising collective awareness, we continually make it harder for them to succeed.”</p>
</blockquote>
<p data-start="3362" data-end="3496">This highlights a broader shift: cybersecurity in hospitality is becoming a <strong data-start="3438" data-end="3467">collective responsibility</strong>, not just an individual one.</p>
<hr data-start="3498" data-end="3501" />
<h2 data-start="3503" data-end="3539">How Hotels Can Protect Themselves</h2>
<p data-start="3541" data-end="3619">Experts point to several immediate actions that can significantly reduce risk.</p>
<h3 data-start="3621" data-end="3667">1. Adopt Phishing-Resistant MFA (Passkeys)</h3>
<p data-start="3669" data-end="3735">Passkey-based authentication is emerging as the <strong data-start="3717" data-end="3734">gold standard</strong>.</p>
<ul data-start="3737" data-end="3961">
<li data-start="3737" data-end="3795">
<p data-start="3739" data-end="3795">Creates a cryptographic link to legitimate login pages</p>
</li>
<li data-start="3796" data-end="3849">
<p data-start="3798" data-end="3849">Prevents credential theft even if phishing occurs</p>
</li>
<li data-start="3850" data-end="3905">
<p data-start="3852" data-end="3905">Eliminates reliance on passwords and one-time codes</p>
</li>
<li data-start="3906" data-end="3961">
<p data-start="3908" data-end="3961">Supports biometric or hardware-based authentication</p>
</li>
</ul>
<hr data-start="3963" data-end="3966" />
<h3 data-start="3968" data-end="4008">2. Train Staff and Reduce Human Risk</h3>
<p data-start="4010" data-end="4056">Human error remains the primary attack vector.</p>
<ul data-start="4058" data-end="4237">
<li data-start="4058" data-end="4091">
<p data-start="4060" data-end="4091">Bookmark official login pages</p>
</li>
<li data-start="4092" data-end="4131">
<p data-start="4094" data-end="4131">Avoid logging in via search engines</p>
</li>
<li data-start="4132" data-end="4182">
<p data-start="4134" data-end="4182">Identify suspicious emails and urgent requests</p>
</li>
<li data-start="4183" data-end="4237">
<p data-start="4185" data-end="4237">Encourage immediate reporting of potential threats</p>
</li>
</ul>
<hr data-start="4239" data-end="4242" />
<h3 data-start="4244" data-end="4277">3. Strengthen Access Controls</h3>
<ul data-start="4279" data-end="4387">
<li data-start="4279" data-end="4311">
<p data-start="4281" data-end="4311">Use strong, unique passwords</p>
</li>
<li data-start="4312" data-end="4343">
<p data-start="4314" data-end="4343">Avoid shared login accounts</p>
</li>
<li data-start="4344" data-end="4387">
<p data-start="4346" data-end="4387">Implement role-based access permissions</p>
</li>
</ul>
<hr data-start="4389" data-end="4392" />
<h3 data-start="4394" data-end="4421">4. Keep Systems Updated</h3>
<ul data-start="4423" data-end="4564">
<li data-start="4423" data-end="4459">
<p data-start="4425" data-end="4459">Apply security patches regularly</p>
</li>
<li data-start="4460" data-end="4507">
<p data-start="4462" data-end="4507">Maintain antivirus and firewall protections</p>
</li>
<li data-start="4508" data-end="4564">
<p data-start="4510" data-end="4564">Back up critical systems and test recovery processes</p>
</li>
</ul>
<hr data-start="4566" data-end="4569" />
<h2 data-start="4571" data-end="4594">Why This Matters Now</h2>
<p data-start="4596" data-end="4730">The rise in phishing attacks reflects a broader reality: hospitality is becoming an increasingly attractive target for cybercriminals.</p>
<p data-start="4732" data-end="4766">Hotels sit at the intersection of:</p>
<ul data-start="4768" data-end="4848">
<li data-start="4768" data-end="4794">
<p data-start="4770" data-end="4794">Financial transactions</p>
</li>
<li data-start="4795" data-end="4812">
<p data-start="4797" data-end="4812">Personal data</p>
</li>
<li data-start="4813" data-end="4848">
<p data-start="4815" data-end="4848">Real-time customer interactions</p>
</li>
</ul>
<p data-start="4850" data-end="4914">This makes them uniquely vulnerable—and highly valuable targets.</p>
<hr data-start="4916" data-end="4919" />
<h2 data-start="4921" data-end="4934">Conclusion</h2>
<p data-start="4936" data-end="5050">As phishing attacks grow more sophisticated, hospitality businesses can no longer rely on basic security measures.</p>
<p data-start="5052" data-end="5191">The shift toward phishing-resistant authentication, staff awareness, and proactive system management is no longer optional—it is essential.</p>
<p data-start="5193" data-end="5316">In an industry built on trust and guest experience, cybersecurity is quickly becoming a core pillar of business resilience.</p>
<p>The post <a href="https://techtrends.tech/cybersecurity/hotel-phishing-cybersecurity/">Securing Hotel Booking Systems</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17103</post-id>	</item>
		<item>
		<title>Improving IoT Security in the Connected Economy</title>
		<link>https://techtrends.tech/tech-trends/improving-iot-security-in-the-connected-economy/</link>
		
		<dc:creator><![CDATA[Alice]]></dc:creator>
		<pubDate>Tue, 20 Oct 2020 15:56:42 +0000</pubDate>
				<category><![CDATA[IOT Tech]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Connected Economy]]></category>
		<category><![CDATA[Connectivity]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[smart]]></category>
		<category><![CDATA[Smart Appliances]]></category>
		<category><![CDATA[Smart City]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://techtrends.tech/?p=15868</guid>

					<description><![CDATA[<p>A Q&#38;A with Philip Attfield, CEO of leading IoT Security Firm Sequitur Labs Please tell us more about yourself? I’m &#8230; <a class="kt-excerpt-readmore" href="https://techtrends.tech/tech-trends/improving-iot-security-in-the-connected-economy/" aria-label="Improving IoT Security in the Connected Economy">Read More</a></p>
<p>The post <a href="https://techtrends.tech/tech-trends/improving-iot-security-in-the-connected-economy/">Improving IoT Security in the Connected Economy</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>A Q&amp;A with Philip Attfield, CEO of leading IoT Security Firm <a href="https://www.sequiturlabs.com/">Sequitur Labs</a><br />
</em></strong></p>
<p><img decoding="async" class="size-full wp-image-15870 alignleft" src="https://techtrends.tech/wp-content/uploads/2020/10/attfield_philip-jpg.jpg" alt="Philip Attfield CEO Sequitur labs" width="140" height="180" srcset="https://techtrends.tech/wp-content/uploads/2020/10/attfield_philip-jpg.jpg 140w, https://techtrends.tech/wp-content/uploads/2020/10/attfield_philip-jpg-117x150.jpg 117w" sizes="(max-width: 140px) 100vw, 140px" /></p>
<p><strong>Please tell us more about yourself?</strong></p>
<p>I’m Philip Attfield, CEO of Sequitur Labs Inc. I have more than 25 years of experience in computing, networking, security and systems modeling at both large and small enterprises. I began my career at Nortel where I was a member of the scientific staff, developing software tools and in-house products for modeling, synthesis and verification of telecom and network equipment hardware. I later founded Signal 9 Solutions, which pioneered PC/desktop firewalls and created the Conseal brand of security products. At Boeing, I led the team responsible for the development of large-scale security policy and management framework. I’ve served in a number of high-profile roles in the field of digital forensics and am a frequent keynote speaker at international security conferences.</p>
<h5><strong>What is Sequitur Labs&#8217; mission and what unique products/solutions do you provide?</strong></h5>
<p>Sequitur Labs is a software company developing and commercializing revolutionary technologies to improve embedded device and system security, manageability, and trustworthiness in the connected economy. Sequitur helps device OEMs reduce the cost and complexity of implementing security correctly by providing packaged software as a product. Sequitur’s software leverages advanced, on-chip hardware security technologies to deliver high-value strong security, economical and accessible security solutions.</p>
<p>Sequitur’s software solutions are critical security enablers for a large, worldwide market of device makers that need strong security but cannot afford the in-house expertise. Sequitur&#8217;s business approach includes demystifying and driving down the cost of security, simplifying deployment, and messaging the business value of security.</p>
<h5><strong>Could you give us a walkthrough of Sequitur&#8217;s products and what sets them apart?</strong></h5>
<p>The EmSPARK Security Suite was designed to address solutions in industries where embedded security is paramount such as industrial control, building automation, the smart home, machine vision, automotive communication, and medical devices. Built on three pillars of product security – design, build and sustain, EmSPARK provides device manufacturers with the firmware, tools and APIs needed to properly execute IoT protection. Our latest version of the EmSPARK Security Suite provides a robust security framework protecting embedded firmware, keys and security-critical assets through the entire device lifecycle. It enables silicon hardware security features, secure device provisioning, and API access to essential trust services such as secure storage, firmware updates and payload verification.</p>
<p>The EmSPARK Security Suite delivers a host of capabilities, including the integration of OpenSSL with functions secured by ARM TrustZone and preconfigured to use cryptographic functions available processors supporting this technology in hardware. The EmSPARK Security Suite also includes key management functions that form the basis of several secure processes such as trusted boot, storage and authentication with IoT clouds.</p>
<p>This allows developers to focus on building their application and/or device rather than spend time reading through data sheets to configure various hardware components. The result is that they can get their products to market faster.</p>
<h5><strong>Having an IoT security solution in place does not guarantee protection against an attack. How does your company offer greater assurance?</strong></h5>
<p>Devices secured by the EmSPARK Security Suite help customers reduce the risk and liability associated with IoT deployments. The Suite covers security requirements relevant at various stages of a product’s lifecycle.</p>
<p>We believe that a product must be secured from the time it is manufactured to the time it is decommissioned. This ensures that a company’s intellectual property (IP) is not stolen, the device operates without compromise at any point in its life, and that customer data is protected at all times. Additionally, it ensures that connections with remote systems, such as IoT cloud servers, are secure and tamper-proof.</p>
<p>For example, the EmSPARK Security Suite enables implementing a root of trust, which supports a variety of secure processes such as trusted boot. It creates a dual operating environment because a TrustZone-enabled processor can switch between secure and non-secure states. This allows isolating and separating critical material and data in a hardware secured area, dramatically improving device security. Developers can easily build applications that use secure resources without having to become experts in cryptography and complex hardware security technologies.</p>
<h5><strong> Analysts predict the global IoT security space will grow to USD $36.6 billion by 2025. Where do you see the future of IoT going?</strong></h5>
<p>With as many as 60 billion smart devices expected to be online in the near future, the likelihood that IoT products, applications and systems are going to be the main points of vulnerability from an organizational security standpoint seems fairly obvious. There are lots of lines of security built into corporate data centers to prevent break-ins and malicious attacks from cybercriminals but not nearly as much effort to secure the devices connecting to those data centers. The greatest obstacle to a future serviced by smart devices is security, including aggressive new variants that attack endpoints at the edge and threaten embedded computing systems.</p>
<p>IoT security is at an inflection point. In-house efforts to address device-level security are difficult and expensive, making it an unattractive option for many manufacturers. But I believe that the success of our industry will be achieved by helping developers build applications that use secure resources without having them having to become experts in cryptography and complex hardware security technologies. IoT will only be successful if device manufacturers and system operators can successfully and economically protect against threats. Working hand-in-hand with a comprehensive IoT security software solution will promote the growth of the industry beyond analysts’ predictions.</p>
<p>The post <a href="https://techtrends.tech/tech-trends/improving-iot-security-in-the-connected-economy/">Improving IoT Security in the Connected Economy</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15868</post-id>	</item>
		<item>
		<title>Expert View: Spam and Phishing Trends</title>
		<link>https://techtrends.tech/tech-trends/expert-view-spam-and-phishing-trends/</link>
		
		<dc:creator><![CDATA[Contributor Network]]></dc:creator>
		<pubDate>Thu, 08 Aug 2019 05:07:32 +0000</pubDate>
				<category><![CDATA[Expert View]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SMS scams]]></category>
		<guid isPermaLink="false">https://techtrends.tech/?p=14315</guid>

					<description><![CDATA[<p>Scammers are getting ever more creative with new spam, SMS and phishing techniques. Here&#8217;s how to avoid getting caught by &#8230; <a class="kt-excerpt-readmore" href="https://techtrends.tech/tech-trends/expert-view-spam-and-phishing-trends/" aria-label="Expert View: Spam and Phishing Trends">Read More</a></p>
<p>The post <a href="https://techtrends.tech/tech-trends/expert-view-spam-and-phishing-trends/">Expert View: Spam and Phishing Trends</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em><strong>Scammers are getting ever more creative with new spam, SMS and phishing techniques. Here&#8217;s how to avoid getting caught by these latest scamming strategies. </strong></em></p>
<blockquote><p>By Daniel Markuson, Digital Privacy Expert at <a href="https://nordvpn.com/">NordVPN</a>.</p></blockquote>
<p><a href="https://www.talosintelligence.com/reputation_center/email_rep">422.49 billion spam emails</a> are sent worldwide every day. This number also includes phishing, sextortion, advertising, and finance-related scams. Most people can already spot the traditional spam messages that claim they have won a new Lamborghini or inherited a million dollars, so spammers are finding new creative ways to trick people into giving them money or information.</p>
<hr /><p><em>There has been an increase in the numbers of SMS spamming attacks known as smishing</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=There%20has%20been%20an%20increase%20in%20the%20numbers%20of%20SMS%20spamming%20attacks%20known%20as%20smishing&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>With so much personal data available out there, it is much easier for criminals to customize all kinds of scamming attempts &#8211; from simple spam, to much more advanced phishing or extortion. These emails, messages, and websites often seem so real, and provide such a high level of detail, as to make even the most cautious person susceptible to falling into a trap.</p>
<hr /><p><em>A few months ago, a massive smishing attack produced tens of millions of fake SMS messages, inviting the recipients to go on fake websites</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=A%20few%20months%20ago%2C%20a%20massive%20smishing%20attack%20produced%20tens%20of%20millions%20of%20fake%20SMS%20messages%2C%20inviting%20the%20recipients%20to%20go%20on%20fake%20websites&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5>A New Era of Smishing</h5>
<p>Recently, there has been an increase in the numbers of SMS spamming attacks, known as “smishing” where scammers try o steal people&#8217;s personal information or credit card details. They do this by initially sending text messages designed to look like they come from a bank, an employer, or an official governmental institution.</p>
<hr /><p><em>422.49 billion spam emails are sent worldwide every day</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=422.49%20billion%20spam%20emails%20are%20sent%20worldwide%20every%20day&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>A few months ago, a massive smishing attack produced tens of millions of fake SMS messages, inviting the recipients to go on fake websites. The texts were generated by a spam-sending database run by a company called ApexSMS. Interestingly, the system was able to detect when people messaged back using keywords such as “report” and &#8220;FCC. These phone numbers were added to a special list of contacts that would not be used by the fraudsters again. However, you should bear in mind that responding to these kinds of texts may leave you vulnerable to identity theft because if you contact the hackers, the hacked phone transmits your sensitive data stored on it.</p>
<hr /><p><em>Responding to a text can leave your phone vulnerable to being hacked</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=Responding%20to%20a%20text%20can%20leave%20your%20phone%20vulnerable%20to%20being%20hacked&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>As <a href="https://techcrunch.com/2019/05/09/sms-spammers-doxxed/">investigators later discovered</a>, the database contained around 80 million records. They included people&#8217;s names, phone numbers, carrier network names, IP addresses, and even locations. Out of the 38 million texts. that were sent during the attack, 2.1 million people clicked on a link in the fraudulent message. Luckily on this occasion, the scammers used an unprotected server, which experts discovered in time to stop the attack.</p>
<hr /><p><em>Scammers are abusing Notifications and Push APIs on Android devices</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=Scammers%20are%20abusing%20Notifications%20and%20Push%20APIs%20on%20Android%20devices&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5>Fake Missed Calls</h5>
<p>Besides SMS frauds, scammers are now <a href="https://www.bleepingcomputer.com/news/security/android-users-being-spammed-using-fake-missed-call-alerts/">abusing the Notifications and Push APIs</a> on Android devices. These two APIs are used to push notifications on mobile phones to re-engage users. An application or server can push them even if the app is not running. The problem is, the API allows scammers to make their notifications look identical to a legitimate app. For example, they can create fake alerts customized to look like a missed phone call.</p>
<hr /><p><em>Scammers aim to take advantage of well-known applications by creating false alerts using the looks of popular apps</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=Scammers%20aim%20to%20take%20advantage%20of%20well-known%20applications%20by%20creating%20false%20alerts%20using%20the%20looks%20of%20popular%20apps&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>One of the ways scammers exploit the feature is using Google Chrome to push messages to mobile phones. To hide their origin, the Google Chrome icon is changed into a “Missed Call” notification. When this happens, one message informs the scammers that they can hack the phone. Another one shows a missed call from a medium called Esmeralda.</p>
<hr /><p><em>Once users press the fake push notification, their phones get hacked</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=Once%20users%20press%20the%20fake%20push%20notification%2C%20their%20phones%20get%20hacked&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>Scammers aim to take advantage of well-known applications. They create false alerts using the looks of popular apps. This confuses mobile phone users. Once they press the push notification, their phones get hacked. Thus, before pressing the notification, it is important to pay attention to the message that it contains and think if it is actually related to the nature of the app.</p>
<hr /><p><em>While fraudsters are becoming more creative, it is still possible to save ourselves from their attacks by becoming more aware of the latest scamming techniques</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=While%20fraudsters%20are%20becoming%20more%20creative%2C%20it%20is%20still%20possible%20to%20save%20ourselves%20from%20their%20attacks%20by%20becoming%20more%20aware%20of%20the%20latest%20scamming%20techniques&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5>Phishing with legal threats</h5>
<p>Another new strategy that creative spammers are now using is lawsuit emails. They send fake emails, which claim that the recipient is being sued and request to open and read the attached fraudulent documents and respond within seven days.The scammers use the names of existing law firms and falsify their email addresses. Most of the time, they target the employees of big companies. Around 100,000 businesses have been attacked to date — mostly in Canada.</p>
<hr /><p><em>Around 100,000 businesses have been attacked to date with legal threat phishing scams — mostly in Canada</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D14315&#038;text=Around%20100%2C000%20businesses%20have%20been%20attacked%20to%20date%20with%20legal%20threat%20phishing%20scams%20%E2%80%94%20mostly%20in%20Canada&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5>Steps anyone can take to protect themselves</h5>
<p>While fraudsters are becoming more creative, it is still possible to save ourselves from their attacks by becoming more aware of the latest scamming techniques. Then, it is crucial to check the messages, phone calls, and emails you receive before opening them. These are the basic but important steps in protecting ourselves handing our personal data to scammers.</p>
<p>The post <a href="https://techtrends.tech/tech-trends/expert-view-spam-and-phishing-trends/">Expert View: Spam and Phishing Trends</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14315</post-id>	</item>
		<item>
		<title>Infographic: Cybersecurity Training</title>
		<link>https://techtrends.tech/tech-trends/infographic-cybersecurity-training/</link>
		
		<dc:creator><![CDATA[Alice]]></dc:creator>
		<pubDate>Thu, 18 Oct 2018 03:05:17 +0000</pubDate>
				<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Infographic]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">http://techtrends.tech/?p=10355</guid>

					<description><![CDATA[<p>&#160; It might seem counter-intuitive, but the greatest threat to the cybersecurity of your business is likely to come from &#8230; <a class="kt-excerpt-readmore" href="https://techtrends.tech/tech-trends/infographic-cybersecurity-training/" aria-label="Infographic: Cybersecurity Training">Read More</a></p>
<p>The post <a href="https://techtrends.tech/tech-trends/infographic-cybersecurity-training/">Infographic: Cybersecurity Training</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><em><strong>It might seem counter-intuitive, but the greatest threat to the cybersecurity of your business is likely to come from the inside.</strong> </em></p>
<p class="intro-paragraph">And we&#8217;re not talking infiltrated spies eithe. The ones most likely to compromise your security are actually your trusted employees. Without any malicious intent at all, they are often just a few careless mouse clicks away from costing your business a fortune.</p>
<hr /><p><em>Your trusted employees are just a few careless clicks away from costing your business a fortune in cybersecurity breaches</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D10355&#038;text=Your%20trusted%20employees%20are%20just%20a%20few%20careless%20clicks%20away%20from%20costing%20your%20business%20a%20fortune%20in%20cybersecurity%20breaches&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p class="intro-paragraph">Employees harm your business by visiting infected websites, responding to phishing emails, using business email through public Wi-Fi on an unencrypted connection, or something as simple as having one password for access to all business assets and personal accounts. <span lang="en-GB" xml:lang="en-GB">Neglect</span><span lang="en-GB" xml:lang="en-GB">ing cybersecurity </span><span lang="en-US" xml:lang="en-US">can cost companies </span><span lang="en-US" xml:lang="en-US">tens of</span><span lang="en-US" xml:lang="en-US"> thousands of dollars, hours of downtime and loss of customers. </span><span lang="en-US" xml:lang="en-US">T</span><span lang="en-US" xml:lang="en-US">he </span><span lang="en-US" xml:lang="en-US">most </span><span lang="en-US" xml:lang="en-US">alarming fact is</span><span lang="en-US" xml:lang="en-US">, that</span><span lang="en-US" xml:lang="en-US"> cyber attacks happen more than 4000 times each and every day, and can strike </span><span lang="en-US" xml:lang="en-US">the same</span><span lang="en-US" xml:lang="en-US"> company several times per year!</span></p>
<hr /><p><em>Employees harm your business by visiting infected websites, responding to phishing emails or using business email through public Wi-Fi </em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D10355&#038;text=Employees%20harm%20your%20business%20by%20visiting%20infected%20websites%2C%20responding%20to%20phishing%20emails%20or%20using%20business%20email%20through%20public%20Wi-Fi%20&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p class="intro-paragraph"><span lang="en-US" xml:lang="en-US">Such attacks are often financially motivated &#8211; ransomware, for example &#8211; or sometimes directed at</span><span lang="en-US" xml:lang="en-US"> obtaining </span><span lang="en-US" xml:lang="en-US">specific</span><span lang="en-US" xml:lang="en-US"> data. </span><span lang="en-US" xml:lang="en-US">Confidential business information</span><span lang="en-US" xml:lang="en-US"> at stake would include </span><span lang="en-US" xml:lang="en-US">company finance records, customer and employee personal data, or </span><span lang="en-US" xml:lang="en-US">highly valuable (and vulnerable) </span><span lang="en-US" xml:lang="en-US">intellectual property</span> <span lang="en-US" xml:lang="en-US">assets. </span></p>
<hr /><p><em>Preventing cyber attacks is a sound investment considering the high risk and costs involved in recovery from damages</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D10355&#038;text=Preventing%20cyber%20attacks%20is%20a%20sound%20investment%20considering%20the%20high%20risk%20and%20costs%20involved%20in%20recovery%20from%20damages&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p class="intro-paragraph">Preventing cyber attacks is a sound investment considering the high risk and costs involved in recovery from damages. EveryCloud Spam Filtering has compiled this infographic to provide some insight into how cyber attacks can harm their business and what they can do about it.</p>
<p class="intro-paragraph">The guide explains the main targets of cybercriminals, the role employees play in cybersecurity and the benefits of Cybersecurity Awareness Training. By regularly training your employees, your company will benefit from a security-first awareness that emphasizes prevention, detection, reporting and learning from mistakes.</p>
<hr /><p><em>By regularly training your employees, your company will benefit from a security-first awareness</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D10355&#038;text=By%20regularly%20training%20your%20employees%2C%20your%20company%20will%20benefit%20from%20a%20security-first%20awareness&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5>Types of training include</h5>
<ul>
<li>
<p class="intro-paragraph"><span style="color: #000000;"><span style="font-family: Ubuntu;"><b>Classroom training</b><br />
Instructors will teach your employees in person, which has the advantage of stronger engagement and the ability for them to ask questions of the instructor, raising relevant concerns and addressing them.<br />
</span></span></p>
</li>
<li>
<p class="intro-paragraph"><span style="color: #000000;"><span style="font-family: Ubuntu;"><b>Online training</b><br />
The fastest and most convenient, way, these are effective as long as fully completed by employees.</span></span></p>
</li>
<li>
<p class="intro-paragraph"><span style="color: #000000;"><span style="font-family: Ubuntu;"><b>Visual Aids</b><br />
Interactive assistants installed on your employee&#8217;s computers. These will actively protect your company and make employees aware of key points where threats can be detected and prevented.</span></span></p>
</li>
<li>
<p class="intro-paragraph"><span style="color: #000000;"><span style="font-family: Ubuntu;"><b>Phishing campaigns</b><br />
Best way to see the current state of security awareness in your business?<br />
Test your employees with simulated attacks. These will give you and your employees great insight into how to detect attacks, where to report them and learn from mistakes in a controlled manner.<br />
</span></span></p>
</li>
</ul>
<p><a title="Why cyber security training is crucial for your business" href="https://www.everycloud.com/cybersecurity-training-crucial-for-business "><img loading="lazy" decoding="async" class="alignnone" src="https://www.everycloudtech.com/sites/default/files/why-cyber-security-training.png" alt="Why cyber security training is crucial for your business" width="24" height="24" /></a></p>
<blockquote><p><em>Alice Bonasio is a </em><a href="http://techtrends.tech/vr-consultancy/"><em>VR Consultant</em></a><em> and Tech Trends’ Editor in Chief. She also regularly writes for Fast Company, Ars Technica, Quartz, Wired and others. </em><a href="https://www.linkedin.com/in/alicebonasio/"><em>Connect with her on LinkedIn</em></a><em> and follow </em><a href="https://twitter.com/alicebonasio"><em>@alicebonasio</em></a><em> and </em><a href="https://twitter.com/techtrends_tech">@techtrends_tech</a><em> on Twitter. </em></p></blockquote>
<p>The post <a href="https://techtrends.tech/tech-trends/infographic-cybersecurity-training/">Infographic: Cybersecurity Training</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10355</post-id>	</item>
		<item>
		<title>Infographic: Cybersecurity Tips and Best Practices</title>
		<link>https://techtrends.tech/tech-trends/keeping-your-servers-safe-best-practices-infographic/</link>
		
		<dc:creator><![CDATA[Alice]]></dc:creator>
		<pubDate>Thu, 23 Nov 2017 10:36:39 +0000</pubDate>
				<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Infographic]]></category>
		<category><![CDATA[IT Infrastructure]]></category>
		<category><![CDATA[Outsourcing Digital Solutions]]></category>
		<category><![CDATA[Server infrastructure security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://techtrends.tech/?p=5906</guid>

					<description><![CDATA[<p>&#160; Protecting your IT Infrastructure is very serious business these days, so how can we best safeguard against cyber threats? &#8230; <a class="kt-excerpt-readmore" href="https://techtrends.tech/tech-trends/keeping-your-servers-safe-best-practices-infographic/" aria-label="Infographic: Cybersecurity Tips and Best Practices">Read More</a></p>
<p>The post <a href="https://techtrends.tech/tech-trends/keeping-your-servers-safe-best-practices-infographic/">Infographic: Cybersecurity Tips and Best Practices</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><em><strong>Protecting your IT Infrastructure is very serious business these days, so how can we best safeguard against cyber threats?</strong></em></p>
<p>With this in mind, the helpful folks from <a href="http://transcosmos.co.uk">Transcosmos Information Systems</a> put together a few best practice tips to keep your IT infrastructure secure. These include:</p>
<hr /><p><em>A secure password is that it must be at least 8 characters long</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=A%20secure%20password%20is%20that%20it%20must%20be%20at%20least%208%20characters%20long&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Control log-in information and regularly change your passwords</strong></h5>
<p>The rule of thumb for a secure password is that it must be at least 8 characters long, combine uppercase and lowercase letters, and at least one number or special character. And Although it’s a bit of a hassle, it is recommended that you change your passwords regularly to keep them secure, preferably every quarter or so.</p>
<hr /><p><em>Change your passwords every quarter or so </em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Change%20your%20passwords%20every%20quarter%20or%20so%20&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Implement two-factor authentication </strong></h5>
<p>Whenever possible, put in place a system that requires more than one form of authentication to grant users access. This means that in addition to a password, you can, for example connect your mobile phone to the server and get it to send you a unique code that you must enter to verify who you are.</p>
<hr /><p><em>Adding additional layers of security is recommended to keep data safe</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Adding%20additional%20layers%20of%20security%20is%20recommended%20to%20keep%20data%20safe&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Store credentials in a secure way</strong></h5>
<p>The best way to avoid data breaches is securing your credentials securely through password hashing. To hash a password means to transform it into a unique value before storing it in your database. Since this is a one-way algorithm, it’s impossible to turn the hashed password back to its original form.</p>
<hr /><p><em>Always have an encrypted back-up of your data</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Always%20have%20an%20encrypted%20back-up%20of%20your%20data&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Delete users and groups you don’t use</strong></h5>
<p>Regularly check who has access to your servers. Are they still around? Things change and so should your permissions.</p>
<hr /><p><em>Keep your firewall and virus scanning software up-to-date</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Keep%20your%20firewall%20and%20virus%20scanning%20software%20up-to-date&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Constantly scan for viruses </strong></h5>
<p>To catch viruses early before they have a chance to do any significant damage to your system, you should conduct regular scans and diligently update your antivirus software.</p>
<hr /><p><em>VPNs are your friends where it comes to data security</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=VPNs%20are%20your%20friends%20where%20it%20comes%20to%20data%20security&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Update software and operating systems </strong></h5>
<p>Software is a bit like bread, it’s only great when it’s fresh. You must therefore make sure you keep your infrastructure packages and operating systems updates so they’re in tip-top condition. Regular updates fixes bugs and guarantees there are not gaping holes in your system security.</p>
<hr /><p><em>Security software is a bit like bread, it’s only great when it’s fresh</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Security%20software%20is%20a%20bit%20like%20bread%2C%20it%E2%80%99s%20only%20great%20when%20it%E2%80%99s%20fresh&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Fireproof your firewall </strong></h5>
<p>Having a good firewall is a must for securing your server infrastructure. It provides an extra layer of protection to your system’s inbuilt security features, through which you can control all the different pieces of software or services that you need to expose to the network. Less exposure = less for hackers to get their mitts into.</p>
<hr /><p><em>Firewalls provide an extra layer of protection to your system’s inbuilt security features</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Firewalls%20provide%20an%20extra%20layer%20of%20protection%20to%20your%20system%E2%80%99s%20inbuilt%20security%20features&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>SSH key authentication </strong></h5>
<p>SSH cryptographic keys that contain more bits of data than a typical password, making them more difficult to crack and less vulnerable to attacks. It also saves you having to remember your passwords. Win-win!</p>
<hr /><p><em>SSH cryptographic keys that contain more bits of data than a typical password</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=SSH%20cryptographic%20keys%20that%20contain%20more%20bits%20of%20data%20than%20a%20typical%20password&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Use private networks and VPNs </strong></h5>
<p>Virtual Private Network (VPNs) keeps your browsing secure, and your internal communication private.</p>
<hr /><p><em>Virtual Private Networks keeps your browsing secure and your communication private</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Virtual%20Private%20Networks%20keeps%20your%20browsing%20secure%20and%20your%20communication%20private&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Encrypt, encrypt, encrypt …. </strong></h5>
<p>Encryption &#8211; the process of translating sensitive electronic data into unintelligible code – means that only those with authorized access can access and decipher your data. All the cool kids are doing it.</p>
<hr /><p><em>Encryption is the process of translating sensitive electronic data into unintelligible code</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Encryption%20is%20the%20process%20of%20translating%20sensitive%20electronic%20data%20into%20unintelligible%20code&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Install good security software </strong></h5>
<p>It is worth investing in packages from sources you know and trust rather than trying to cut corners, as these might provide a backdoor through which hackers can access your systems.</p>
<hr /><p><em>Find your vulnerable spots before hackers do</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=Find%20your%20vulnerable%20spots%20before%20hackers%20do&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Test your vulnerabilities </strong></h5>
<p>Regular network vulnerability scanning can help you identify weaknesses in your server and address issues before hackers get to them.</p>
<hr /><p><em>If you can afford it, hire a professional to help keep your commercial IT systems secure</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=If%20you%20can%20afford%20it%2C%20hire%20a%20professional%20to%20help%20keep%20your%20commercial%20IT%20systems%20secure&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Keep secure and encrypted backups</strong></h5>
<p>Your data may well get lost or corrupted at some point, and if that happens, you definitely want to have a plan B to allow you to quickly get back on track.</p>
<hr /><p><em>SSH keys also mean you don&#039;t have to remember loads of passwords</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D5906&#038;text=SSH%20keys%20also%20mean%20you%20don%27t%20have%20to%20remember%20loads%20of%20passwords&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<h5><strong>Get a Pro to have your back </strong></h5>
<p>In this increasingly complex security landscape, it pays for companies to have an IT expert on their side to keep on top of security.</p>
<p>&nbsp;</p>
<p><a href="http://transcosmos.co.uk/blog/best-practices-secure-servers-it-infrastructure-infographic/"><img decoding="async" src="http://transcosmos.co.uk/wp-content/uploads/2017/07/Best-Practices-to-Secure-IT-Servers-and-Infrastructure-infographic.png" alt="Best-Practices-to-Secure-IT-Servers-and-Infrastructure-infographic" width="800" border="0" /></a></p>
<p>&nbsp;</p>
<p>Header image attribution: <a href="http://blogtrepreneur.com/tech">blogtrepreneur</a></p>
<p>&nbsp;</p>
<blockquote><p><em>Alice Bonasio is a </em><a href="http://techtrends.tech/vr-consultancy/"><em>VR Consultant</em></a><em> and Tech Trends’ Editor in Chief. She also regularly writes for Fast Company, Ars Technica, Quartz, Wired and others. </em><a href="https://www.linkedin.com/in/alicebonasio/"><em>Connect with her on LinkedIn</em></a><em> and follow </em><a href="https://twitter.com/alicebonasio"><em>@alicebonasio</em></a><em> and </em><a href="https://twitter.com/techtrends_tech">@techtrends_tech</a><em> on Twitter.</em></p></blockquote>
<p>The post <a href="https://techtrends.tech/tech-trends/keeping-your-servers-safe-best-practices-infographic/">Infographic: Cybersecurity Tips and Best Practices</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5906</post-id>	</item>
		<item>
		<title>Can Technology Prevent Online Fraud?</title>
		<link>https://techtrends.tech/tech-trends/fraud-rise-can-technology-save-us/</link>
		
		<dc:creator><![CDATA[Alice]]></dc:creator>
		<pubDate>Tue, 22 Aug 2017 09:01:09 +0000</pubDate>
				<category><![CDATA[FIN Tech]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Chargebacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[FinTech]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Friendly Fraud]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Online Fraud]]></category>
		<category><![CDATA[Verifi]]></category>
		<category><![CDATA[World Commerce Review]]></category>
		<guid isPermaLink="false">http://techtrends.tech/?p=4626</guid>

					<description><![CDATA[<p>&#160; With the global cost of chargebacks mounting for consumers, banks and merchants alike, we need innovation to fight back &#8230; <a class="kt-excerpt-readmore" href="https://techtrends.tech/tech-trends/fraud-rise-can-technology-save-us/" aria-label="Can Technology Prevent Online Fraud?">Read More</a></p>
<p>The post <a href="https://techtrends.tech/tech-trends/fraud-rise-can-technology-save-us/">Can Technology Prevent Online Fraud?</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p><strong><em>With the global cost of chargebacks mounting for consumers, banks and merchants alike, we need innovation to fight back</em></strong></p>
<p>Online fraud is now the most commonly experienced crime in England and Wales, according to a report published by the <a href="https://www.nao.org.uk/report/online-fraud/">UK National Audit Office</a> (NAO). Up to 1.9 million cyber-related fraud incidents were estimated to have taken place last year alone, with the cost likely to run into billions of pounds.</p>
<hr /><p><em>Online fraud is the most commonly experienced crime in England and Wales</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D4626&#038;text=Online%20fraud%20is%20the%20most%20commonly%20experienced%20crime%20in%20England%20and%20Wales&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>The report also outlined that the NAO faces a significant challenge in influencing partners, such as banks and law enforcement bodies, to take on the responsibility of preventing and reducing fraud. As a “low value but high volume crime”, fraud is often overlooked by governments, law enforcement, and industry alike, says Amyas Morse, Head of the NAO. Acknowledging that the landscape for tackling online fraud is extremely complex, the report calls for an urgent response to address it.</p>
<hr /><p><em>Fraud is often overlooked by governments, law enforcement, and industry</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D4626&#038;text=Fraud%20is%20often%20overlooked%20by%20governments%2C%20law%20enforcement%2C%20and%20industry&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>The report further cites that online fraud is under-reported; even where data is available there is a lack in the sharing of information between government, industry, and law enforcement agencies. In fact, there is no formal requirement for banks to report fraud or share reports with government, yet we see consistent evidence of fraud recurring all over the world. This is an enduring and global problem, one that takes a heavy toll on merchants and service providers of all sizes, as well as banks, issuers, and ultimately customers.</p>
<hr /><p><em>There was a 17% rise in consumers being caught out buying phantom goods online</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D4626&#038;text=There%20was%20a%2017%25%20rise%20in%20consumers%20being%20caught%20out%20buying%20phantom%20goods%20online&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>The growing scale of online fraud also suggests that many people are still not aware of the risks, and that there is much to be done to change behaviour. This is also evidenced in separate <a href="https://www.citizensadvice.org.uk/about-us/how-citizens-advice-works/media/press-releases/shoppers-swindled-after-buying-phantom-goods/">figures from Citizens Advice</a> showing a 17% rise in consumers being caught out buying &#8220;phantom&#8221; goods online. This type of cybercrime occurs when fraudsters advertise items at cut prices on social media sites like Facebook and Instagram—as well as online marketplaces such as Gumtree and eBay—and con buyers into spending on average £1,100 on products ranging from cars to flights and even insurance, which simply do not exist. In only a few months, January to March this year, <a href="https://www.citizensadvice.org.uk/about-us/how-citizens-advice-works/media/press-releases/shoppers-swindled-after-buying-phantom-goods/">Citizens Advice logged over 3,600 complaints about such phantom goods</a>.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-4627" src="http://techtrends.tech/wp-content/uploads/2017/08/Tech-Trends-Card-Fraud-on-the-rise.png" alt="Tech Trends Online Card Fraud" width="675" height="421" srcset="https://techtrends.tech/wp-content/uploads/2017/08/Tech-Trends-Card-Fraud-on-the-rise.png 915w, https://techtrends.tech/wp-content/uploads/2017/08/Tech-Trends-Card-Fraud-on-the-rise-150x93.png 150w, https://techtrends.tech/wp-content/uploads/2017/08/Tech-Trends-Card-Fraud-on-the-rise-768x478.png 768w, https://techtrends.tech/wp-content/uploads/2017/08/Tech-Trends-Card-Fraud-on-the-rise-80x50.png 80w" sizes="auto, (max-width: 675px) 100vw, 675px" /></p>
<p>These scams can have a lasting financial and emotional impact on consumer confidence and their relationship to merchants. While educating consumers is both sensible and necessary, the NAO report stresses that government and industry still have a responsibility to protect citizens and businesses. The report also found that the protection banks provide varies, with some investing more than others in educating customers and improving their anti-fraud technology.</p>
<p>Given that <a href="https://blog.riskified.com/global-ecommerce-fraud-trends-2017/">organized attacks of online fraud is likely to increase</a>, this investment is absolutely essential—yet keeping up with the latest techniques employed by fraudsters can put tremendous strain on a company’s logistics. While few would argue that fraud detection and prevention is a priority for businesses, the fact is most businesses lack the necessary resources to build and maintain such solutions. It is the industry’s responsibility, however, to keep up—and ideally get ahead—of these fraudsters in order to protect both themselves and consumers.</p>
<hr /><p><em>Technology adoption can have significant impact on fraud prevention</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D4626&#038;text=Technology%20adoption%20can%20have%20significant%20impact%20on%20fraud%20prevention&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>The adoption of such technologies has indeed been shown to have a significant positive impact on fraud prevention. Take, for example, <a href="http://www.emvco.com/about_emvco.aspx">EMV</a>—the technical standard for smart payment cards and terminals that have allowed the rollout of payment solutions, such as Chip and Pin and Contactless. In the UK, its implementation led to a dramatic <a href="https://www.wired.com/2014/09/emv/">reduction of 32% in the levels of overall card fraud</a> in the seven years following their introduction in 2004, according to <a href="http://www.theukcardsassociation.org.uk/wm_documents/Fraud_The_Facts_2012.pdf">official figures from the UK Card Association.</a></p>
<p>Such measures have undoubtedly made fraud much more difficult to perpetrate in “card present” payment scenarios, yet the shift to online retail has brought with it an entirely new set of challenges relating to fraud prevention and mitigation. There is no getting away from the fact that individual shopping habits have fundamentally changed over the past decade, and that the shift towards online and mobile shopping is not going to be reversed. PricewaterhouseCoopers’ (<a href="https://www.pwc.com/gx/en/industries/retail-consumer/global-total-retail/global-key-findings.html">PwC<u>)</u> Total Retail 2016 Survey</a> found that the popularity of mobile shopping continues to rise, stating that “46% of our global sample buys products via mobile at least a few times a year, compared to 40% last year”.</p>
<hr /><p><em>Chargebacks happen when customers dispute a transaction and request a refund</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D4626&#038;text=Chargebacks%20happen%20when%20customers%20dispute%20a%20transaction%20and%20request%20a%20refund&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>While this might be good news for consumers in terms of better prices, more choice, and added convenience, it leaves the bulk of “card-not-present” transactions—which are the norm in online shopping and vulnerable to problems such as chargebacks. These chargebacks happen when customers dispute a transaction in their statement and request a refund—often going directly to their card issuer or bank and bypassing the merchant altogether.</p>
<hr /><p><em> Gross card fraud losses for 2015 reached $21.84 Billion</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D4626&#038;text=%20Gross%20card%20fraud%20losses%20for%202015%20reached%20%2421.84%20Billion&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>According to <a href="https://www.nilsonreport.com/upload/content_promo/The_Nilson_Report_10-17-2016.pdf">The Nilson Report</a>, gross card fraud losses for 2015 reached $21.84 Billion, not including the costs incurred by issuers, merchants, and acquirers for their operations, call centres, and chargeback management. By 2020, the report concludes, card fraud worldwide is expected to reach $31.67 billion, and that measures such as improving methods of reducing fraud on card-not-present transactions are critical to keeping those losses in check.</p>
<p>This is a complex issue, since there are many factors which can trigger a chargeback in the first place, and a blunt approach can cause a merchant more harm than good. One of these factors is known as “buyer’s remorse”—where a customer finds a product at a cheaper price elsewhere and uses the system as an alternative returns and refund mechanism. This is one of the forms that so-called “<a href="http://www.verifi.com/KBE_PLUGIN_SLUG/what-is-friendly-fraud/">friendly fraud</a>” takes. Another common scenario is where a person requesting the refund is not entirely sure they haven’t made the transaction, but will “try their luck” anyway. Since the cost of investigating such claims is often much higher than the value of the refund itself, banks will mostly opt to issue the refund without dispute, and some customers have learned to take advantage of this to manipulate the system. According to industry research firm <a href="http://aitegroup.com/">Aite Group</a> in their Impact Note of August 2016, 60% to 70% of chargebacks are the result of first-party or friendly fraud.</p>
<hr /><p><em>There are many ways for businesses to make themselves less vulnerable to chargebacks</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D4626&#038;text=There%20are%20many%20ways%20for%20businesses%20to%20make%20themselves%20less%20vulnerable%20to%20chargebacks&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>Business can minimise vulnerability to chargebacks in various ways. These include ensuring that they build a good relationship with their customers, by providing accurate product information and keeping the lines of communication open, so customers are more inclined to approach merchants with queries than to go directly to the issuing banks to initiate a dispute. Having a clear and efficient refunds policy also minimises the chance of experiencing so-called buyer’s remorse, where a customer is tempted to use chargebacks as a backup refund mechanism. However, many customers still get confused when seeing an unfamiliar name appear on their statement, as often merchants will be listed under names which differ significantly from their brand or trade name.</p>
<blockquote><p>“When a customer sees a charge they don’t immediately recognise on their card, they often ask the bank to remove that charge from their statement”, explains Matthew Katz, CEO of <a href="http://www.verifi.com/">Verifi</a>, a provider of end-to-end payment protection and management solutions. “This is done by calling the bank directly to raise a dispute, leaving out the merchant who could potentially provide further information to clarify what the charge relates to. In fact, our research has found that up to 86% of cardholders bypass the merchant and contact their issuing bank directly to dispute or question a charge on their bill”.</p></blockquote>
<p>While banks generally issue a refund to the customers, the process often has a very negative impact on overall customer experience, causing confusion and lingering trust issues which can lead to future sales being lost. This has an added impact on the merchant’s bottom line, on top of the fees, fines, and operational expenses of handling the chargeback in the first place.</p>
<hr /><p><em>Chargeback costs can quickly snowball </em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D4626&#038;text=Chargeback%20costs%20can%20quickly%20snowball%20&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>These costs quickly snowball, ranging from administrative resources needed to investigate claims and process refunds, to fielding customer queries and potential loss of legitimate sales, present and future. Add this to the operational expense of preparing and shipping merchandise, as well as the value of the goods themselves which often must be written off, and the cost for merchants quickly adds up. Ultimately, this is also very bad news for consumers, as these costs will eventually trickle down the supply chain and translate into higher prices. The true price of these chargebacks is not reflected in the refund amounts alone, significant as these may be. In their September 2015 report, <em>The Impact of Fraud and Chargeback Management on Operations</em>, <a href="https://www.javelinstrategy.com/">Javelin Research</a> found that organizations typically spent between 13% and 20% of their operational budget on fraud and chargeback management.</p>
<blockquote><p>“Globally, chargebacks continue to grow and represent a significant challenge”, agrees Katz, “To address this problem, we need solutions that better align the interests of cardholders, merchants, and issuing banks on a global scale, focusing on continual innovation and refinements that are essential to effectively combat this problem”, he believes.</p></blockquote>
<p>This is what Cardholder Dispute Resolution Network (CDRN) does, according to Katz. Verifi’s solution—which covers approximately 50% of the US market and boasts a 90% resolution rate—was named for the <a href="https://globenewswire.com/news-release/2017/06/08/1010456/0/en/Verifi-Named-Best-Chargeback-Management-Program-for-Fifth-Year-in-a-Row-at-CNP-s-Card-Not-Present-Expo.html">fifth year in a row </a>as “Best Chargeback Management Program” by CNP Expo. It is now continuing to expand in international markets such as the United Kingdom, Verifi having opened an office in London in 2016, and now announcing a key <a href="https://globenewswire.com/news-release/2017/06/07/1009192/0/en/Verifi-MegaCharge-Forge-Strategic-Partnership-to-Combat-Global-Chargeback-Challenges.html">strategic partnership with payments processor MegaCharge.</a></p>
<hr /><p><em>Verifi handles over 200,000 individual chargebacks each month</em><br /><a href='https://x.com/intent/tweet?url=https%3A%2F%2Ftechtrends.tech%2F%3Fp%3D4626&#038;text=Verifi%20handles%20over%20200%2C000%20individual%20chargebacks%20each%20month&#038;via=techtrends_tech&#038;related=techtrends_tech' target='_blank' rel="noopener noreferrer" >Share on X</a><br /><hr />
<p>One of the problems that CDRN addresses, according to Katz, is the fact that by the time merchants learn of the issue, it’s often too late to stop the chargeback. “Our patented closed-loop technology integrates directly with the top issuing banks. This pauses the chargeback process for up to 72 hours and redirects cardholder disputes from the bank to the merchant in near real-time. The merchant will have more time to assess and resolve the dispute <a href="http://www.verifi.com/resources/cdrn-merchant-portal-resolves-disputes-before-they-become-chargebacks/">before it ever becomes a chargeback</a>. To date, we are supporting more than 25,000 accounts globally and handling over 200,000 individual chargebacks each month—amounting to an estimated $195 million in chargebacks prevented.</p>
<blockquote><p>“The problem of chargebacks and friendly fraud are not only impacting businesses’ bottom line, but hindering future growth and jeopardizing customer retention, trust, and satisfaction rates. For merchants to strengthen their risk management and counter friendly fraud, the ideal line of defense would permit merchants to provide insights into the cardholder’s order as shopping cart-level data. This would feature merchant details and even the device used to make the purchase through the financial institution’s platform—all at the time the dispute arises. This deeper level of data can help cardholders better understand their purchases and avoid filing false cases of fraud that result in lost sales, higher labour costs and more”, Katz concludes.</p></blockquote>
<p>Since the bulk of consumer purchases will be made online, it stands to reason that to tackle online fraud we must leverage data and technology in increasingly sophisticated ways. As the recent reports on the growing scale of this global problem show, gone are the days when the tools to do so could be considered an optional extra. They have, quite simply, become business essentials for every merchant looking to conduct business in the digital age.</p>
<p>This article initially appeared on <a href="http://www.worldcommercereview.com/html/bonasio-fraud-on-the-rise-can-technology-save-us.html">World Commerce Review</a></p>
<blockquote><p><em>Alice Bonasio is a </em><a href="http://techtrends.tech/vr-consultancy/"><em>VR Consultant</em></a><em> and Tech Trends’ Editor in Chief. She also regularly writes for Fast Company, Ars Technica, Quartz, Wired and others. </em><a href="https://www.linkedin.com/in/alicebonasio/"><em>Connect with her on LinkedIn</em></a><em> and follow </em><a href="https://twitter.com/alicebonasio"><em>@alicebonasio</em></a><em> and </em><a href="https://twitter.com/techtrends_tech">@techtrends_tech</a><em> on Twitter. </em></p></blockquote>
<p>The post <a href="https://techtrends.tech/tech-trends/fraud-rise-can-technology-save-us/">Can Technology Prevent Online Fraud?</a> appeared first on <a href="https://techtrends.tech">Tech Trends</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4626</post-id>	</item>
	</channel>
</rss>
