<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Credit Card Security Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/credit-card-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/credit-card-security/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Wed, 18 Nov 2020 16:40:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Credit Card Security Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/credit-card-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Beware: Attackers Buy Top Search Engine Results to Trick You</title>
		<link>https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 16:40:14 +0000</pubDate>
				<category><![CDATA[browser security]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Website Security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3351</guid>

					<description><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. Here is how the scam works: Suppose you want to look up a company online [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What seems to be the best way to find a company&#8217;s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site. <span id="more-3351"></span></p>
<p>Here is how the scam works: Suppose you want to look up a company online named Super Duper, so you type the store&#8217;s name into your favorite search engine. An attacker might have purchased the top result to take you to the website superduperco.com. However, if you knew to scroll down past the paid-for-results, you would have seen that the real website is superduper.com. Attackers set up a website and named it superduperco.com.</p>
<p>Their deceptive site might contain malicious advertising, ask you to enter credit card numbers during checkout, or tempt you to download malicious programs and apps. They might ask you to login or reset a password, and they capture the password you type in.</p>
<p>If you look up a retailer in a search engine, skip past the ads and paid results. Scroll down to see real search results. Even then, be skeptical in case attackers used SEO techniques to appear at the top of the actual search results.</p>
<p>Please forward this to your friends to alert their users that top search engine results can be a trap.</p>
<p>The post <a href="https://fosterinstitute.com/beware-attackers-buy-top-search-engine-results-to-trick-you/">Beware: Attackers Buy Top Search Engine Results to Trick You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What to Do About Your Passwords</title>
		<link>https://fosterinstitute.com/what-to-do-about-your-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 06 Aug 2014 18:55:28 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security breaches]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[security awareness training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1946</guid>

					<description><![CDATA[<p>You probably heard that a group of hackers has collected more than a billion passwords – so far. The best password strategies: It is easy to become numb about the news of stolen passwords. In the biggest discovery, so far, more than 420,000 websites have been hacked – and they are just finding out about [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-about-your-passwords/">What to Do About Your Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>You probably heard that a group of hackers has collected more than a billion passwords – so far. The best password strategies:<span id="more-1946"></span></p>
<p>It is easy to become numb about the news of stolen passwords. In the biggest discovery, so far, more than 420,000 websites have been hacked – and they are just finding out about it now. What if yours is one of the 1.2 billion stolen passwords? </p>
<p>Changing passwords frequently helps – but it is an inconvenience. Today is a good time to do it anyway – especially for banking, medical, and the most important sites. </p>
<p>Password managers can help you – they remember your passwords for you so you can have a different password at every site. Therefore, you only need to remember one password, the password to your password manager. Choices abound including LastPass, DashLane, Roboform and many others. There are “enterprise” versions to use in your company, and they are inexpensive.</p>
<p>Yes, there is a tiny risk that an attacker might breach the password manager, so you may decide to keep your banking credentials in your head, but use the password manager for other sites. </p>
<p>Perhaps the best solution is “multi-factor authentication” also known as &#8220;2-step&#8221; verification. Then you may not even care if someone else knows your password. An example of this solution: You enter a username and password into a web site, and then your mobile phone buzzes and tells you to enter the code such as 777888 to complete the login process. </p>
<p>Now an attacker would need to steal your mobile phone too before they could log on with your username and password. Obviously, if the attacker is in another country, then it is more difficult for them to steal your phone.  </p>
<p>DropBox, PayPal, Google Apps, and many other sites already support multi-factor authentication – you just have to “turn it on.” See https://www.google.com/landing/2step/ to set up your Google account&#8217;s 2-step verification.</p>
<p>However, even multi-factor solutions are not perfect. One example, among many others, is how it was possible to bypass PayPal’s multi-factor authentication if you logged into EBay first.</p>
<p>By the way, in case you have eaten there, P.F. Chang’s published a list of restaurant locations that may have been breached: <a href="http://pfchangs.com/security/#locations">http://pfchangs.com/security/#locations</a></p>
<p>Change your passwords, get a password manager if you want to, and inquire about multi-factor authentication at the websites that contain your sensitive data. </p>
<p>Please post your comments below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-about-your-passwords/">What to Do About Your Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Target Breach – Do This Now</title>
		<link>https://fosterinstitute.com/the-target-breach-do-this-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 20 Dec 2013 22:30:19 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Credit Card Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[credit card; target; security breach]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1768</guid>

					<description><![CDATA[<p>5 steps for your company to take NOW: STEP 1: Be sure to watch your company’s credit card charges via your banks’ web sites. If anything is out of the ordinary, contact the bank ASAP. STEP 2: If your business never accepts credit or debit cards, you can stop reading here. If you do accept [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-target-breach-do-this-now/">The Target Breach – Do This Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>5 steps for your company to take NOW:<br />
<span id="more-1768"></span><br />
STEP 1: Be sure to watch your company’s credit card charges via your banks’ web sites. If anything is out of the ordinary, contact the bank ASAP.</p>
<p>STEP 2: If your business never accepts credit or debit cards, you can stop reading here. If you do accept credit or debit cards, then it is time to make your incident response plan now. It is better to decide now – rather than in an emergency – what to do if you suffer a breach. Check with your insurance provider about cyber-insurance and be aware of the “caps” that limit your coverage. Make sure the insurance at least covers your notifying everyone who’s ever done business with you. Additionally, make sure that the insurance also covers the costs you will incur by providing free credit monitoring to your customers. </p>
<p>STEP 3: Make a plan for what to do when your customers switch to “the competition.” Be sure you will weather the lost sales as well as the fines associated with the breach. If the breach happens, you may have to invest a lot of money in marketing and advertising to put a positive spin on your company’s loss of credibility. Target has such “deep pockets,” they will bounce back. Make sure you can too. Will you need to raise prices?  Target might.</p>
<p>STEP 4: Step up your efforts to build loyalty from your customers. That way, you’ll lose fewer of them. Put even more energy into differentiating yourself from the competition. If you have a breach, your customers will know they are at a higher risk of fraud – all because they did business with you. Generate such loyalty that your customers won’t be concerned that you had the breach. Target is about to find out first-hand how well they’ve successfully differentiated themselves and won the loyalty of customers.</p>
<p>STEP 5: Prioritize your becoming PCI-DSS (Payment Card Industry &#8211; Data Security Standard) compliant. PCI is designed to protect you from having to notify all of your customers via preventing the breach in the first place.  Most companies don’t know “where to start” in order to become compliant. Many IT Professionals are understandably unfamiliar with the intricacies of the PCI DSS. Here are some tips to make the PCI process simple and easier than ever: &#8220;<a href="https://fosterinstitute.com/blog/pci-dss/">If You Accept Credit Cards-Simplify PCI-DSS</a>&#8221; </p>
<p>Please post your comments below.</p>
<p>The post <a href="https://fosterinstitute.com/the-target-breach-do-this-now/">The Target Breach – Do This Now</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
