Tuesday, July 5

Can these security tips from IBM ensure safe shopping on the Internet? By CoinTelegraph

© Reuters. Can these security tips from IBM ensure safe shopping on the Internet?

According to the Global Report of IBM (NYSE 🙂 Institute for Business Value of this year, it was known that the common denominator of the interviewed population is with a greater enthusiasm regarding Christmas than they had compared to the previous year, however, this furor is not enough so that consumption intentions have been registered, such as those obtained before the pandemic began. The pollster standardized the opinion of 13,000 adults in nine countries, where they took into account the Latin American perspective with the inclusion of Brazil and Mexico, being able to conclude that the increase in vaccination rates and the increasingly permissive measures of restrictions have not been enough for most to consider traveling and socializing as a plan for the last month of the year. According to Carlos Capps, leader of the Retail, Consumer, Health and Agriculture industries at IBM Consulting for Latin America: “The challenges facing brands and retail businesses are more complex than when the pandemic began. Customers have become more technological, investigating more with each purchase and emphasizing the experience (…) those with better adaptability and greater power of innovation will have a better chance of prevailing ”.

The report states that despite the existence of a notable demand for local products and merchants, online shopping maintains its leadership as the preferred option for consumers, noting that 43% of the surveyed population would make their purchases through these channels. What allows us to anticipate these statistics is that hackers will be attentive to those users who do not take into account the necessary measures for their security, that is why we present the decalogue for online purchases that also takes into account the use of the cryptocurrencies in a responsible and safe way.

  • As browser encryption grows stronger, credit card data should not be cached. This means that the browser must be configured to clear the session information, history data, cache and cookies when exiting. This also allows you to have a clean session in each entry, always having to log in to the applications that require it, this prevents the hacking suffered by a user of the official Metamask forum.
  • When opening an e-mail, pay attention if a package begins to be downloaded, this can be used to install some type of Trojan whose function is to identify the key data stored on the computer, this is achieved by extracting autocomplete information of users in the browser, despite the aforementioned regarding the complexity of the encryption system.
  • Credit cards are much safer for online purchases, since they have better security systems and in case of being compromised, suspicious activity will be reported to the bank and there will be no risk to the main bank account. Platforms such as Binance, allow you to have different wallet addresses that can be adapted according to the payment method to be used with the specific amount to be deposited, in this way there will be no additional consumption charges in case the operation is compromised.
  • If you don’t recall placing an Amazon (NASDAQ 🙂 order, it probably wasn’t. These types of electronic frauds are the most common within emails, since they present links that are responsible for extracting personal information and thus having access to your bank account, cryptocurrencies or cold wallets.
  • Having different email addresses for each account in which you have a stored value reserve can be complex, however, this prevents personal information between accounts from being mixed. In this way, if any account is compromised, the others will not be put at risk.
  • You may have actually won a discount coupon, code or even that a store is rewarding your consumer loyalty. However, you should always check where the address comes from, if it matches the official address of the store that offers the service and finally, do not open it directly from the mail, if necessary, log in to the account linked to the application that sends the coupon and its veracity is confirmed there.
  • If the use of different emails is complex, having to remember each of the passwords for each of the different platforms that you are going to use can be even more complex, especially if we want to apply these tips to our elderly relatives. Having a notebook where passwords are jotted down can be helpful, however, trusting that method to be foolproof is not something that should be created out of habit in a more digitized age. Opting for the password manager is always a good option.
  • When was the last time you verified an address that came from an email or website before entering? You never know how the browser from which we access websites can be compromised, tricks as simple as changing an “L” for an “I” can make you believe that you are entering your trusted page, that way you you would be giving your access password to hackers who now have your personal information. You can use third-party pages that are responsible for verifying that a link is secure before entering.
  • Multi-factor authentication will prevent even someone who has been able to steal your password from having access to withdraw funds, change passwords, or change email address, as they will need access to two out of three authentication factors. This also allows you that in case of loss of any authentication method, you can confirm your identity through the use of other security mechanisms.
  • Creativity is your ally, the better password recovery phrases that are not directly linked to you, the more difficult it will be for hackers who have implemented social engineering to access your information. If you use something like “my mother’s name – pet – street” or some derivative like “school where I studied high school – university”, you are exposed to this type of attack. It is recommended to use things such as “what is the model of the television that is behind the room”, “how many family photos are there in the hallway” or things that are somehow linked to your close environment, without being related to information to which anyone can have access.
  • Read the full article on Cointelegraph

    Legal warning: Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. All CFDs (stocks, indexes, futures) and Forex prices are not provided by exchanges but rather by market makers, and so prices may not be accurate and may differ from the actual market price, meaning prices are indicative and not appropriate for trading purposes. Therefore Fusion Media doesn`t bear any responsibility for any trading losses you might incur as a result of using this data.

    Fusion Media or anyone involved with Fusion Media will not accept any liability for loss or damage as a result of reliance on the information including data, quotes, charts and buy/sell signals contained within this website. Please be fully informed regarding the risks and costs associated with trading the financial markets, it is one of the riskiest investment forms possible.

    Reference-es.investing.com

    Leave a Reply

    Your email address will not be published.