Story image

Last-minute online Xmas shopping poses security risks

29 Nov 16

Consumers are being warned of security risks in the rush to buy Christmas gifts online, with security firm Centrify releasing some worrying data from their latest survey.

The recent Centrify 2016 Online Shopping Survey reveals that one in eight respondents would accept discounts and special offers from retailers in exchange for their passwords. Centrify says this highlights the risks consumers are willing to take in order to save money online.

“Disturbingly, the Australian Payments Clearing Association has reported that Card Not Present fraud – typically where credit cards are used for online purchases – jumped by 21% last year,” Centrify says in a statement.

Niall King, Centrify senior director APAC Sales, says the recent Centrify Online Shopping survey showed many consumers still make basic security mistakes.

“Nearly 14% admitted they share passwords with friends and family so they can login to their accounts,” he says.

“Other problems with password hygiene include more than 50% reporting they save passwords to the retailer’s websites so as not to forget them. More than half also admitted they sometimes reuse the same password for different retailers’ websites,” King explains.

“A very disturbing finding is that one in eight respondents said they would accept discounts and special offers from retailers in exchange for their passwords, highlighting the risks consumers are willing to take in order to save money online,” he adds.

King says discerning shoppers needed to put their online safety first rather trying to save a few dollars from their Christmas shopping list.

“Ignoring online security risks gives cyber-crooks the best Christmas gift they could ask for – your identity details and money,” he says.

With the Christmas shopping season for 2016 well under way, Centrify has issued 10 tips for online shopping safety to help consumers recognise security risks and ensure they shop online in safety:

1. Resist temptation: Deals that look too good to be true often are, so treat them skeptically
2. Secure your mobile phone with a password and encryption if you plan to use it for shopping
3. Always buy from reputable retailers and enter web addresses carefully. A misspelled domain name or non-‘https’ site could lead you to a false site designed to steal your details
4. Suspect links in unsolicited emails: Always type hyperlinks directly into your browser rather than clicking on them within the email. Hovering your cursor over a hyperlink should identify if it’s dodgy by showing if the embedded link differs from its displayed text
5. Reject requests by online retailers for extra personal information, such as a password for your email or bank account as part of the shopping process
6. Use unique, complex passwords (or passphrases) for each site. Using the same password for multiple sites is a gift to the hacker who steals your password for one account and can get into the rest – with devastating consequences where sites store your personal and credit card details
7. Keep your passwords private: Passwords lose their power if you share them, so never give out your passwords online, on the phone or even to friends or family!
8. Do not store passwords. Many browsers, programs or web applications offer to store your password for convenience. This is a bad idea, especially for passwords associated with personal or financial accounts or if you use public or shared computers
9. Enable multi-factor authentication where possible. This involves combining two or more different ‘factors’ for extra security when logging in: Something you know (e.g. password); something you have (e.g. an ATM card or smart card); or something you are (e.g. a fingerprint or retina scan).
10. Review each site’s privacy policy to learn how and where your personal information is being used. Treat a missing or buried privacy policy as a red flag against using that site.

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.