Cybersecurity Tips For Enterprises

With the recent rise in malvertising, high-impact data breaches and other malicious security threats, the practices and secure infrastructure of legitimate marketers increasingly have been called into question.

As a result, the overall trust of marketers as custodians of outbound messages communications is becoming more fragile every day. In order to help stem the erosion of this trust, marketers need to take immediate steps including adoption of voluntary best practices and self-regulation to minimize security risks and educate their customers about what they can do to safeguard their communications.

Dave Lewis, CMO of Message Systems, provider of fast, flexible and holistic message management solutions, and a board member of the Online Trust Alliance (OTA) offers these cybersecurity tips for enterprises.

Amend data collection practices. This is the most important step companies can take to reduce security risks and ensure customers that they are not collecting and distributing any personal identifying information such as names, phone numbers or physical and IP addresses.

Maximize e-mail authentication protection. E-mail authentication standards are a line of defense for spam, spoofing, fraud and malicious threats. Using one solution is not enough -- two complementary efforts should be used, such as SPF/Sender ID and DKIM. Enterprises can leverage these standards to apply reputation scoring and protect users from going to deceptive sites.

Apply extra barriers to entry. In support of the OTA’s call to action for all ecommerce and consumer financial services sites to add more certification protocols, deploy Extended Validation Secure Sockets Layer (EV SSL) to help combat deceptive and illicit web sites. EV SSL Certificates are supported by all leading browsers and provide recognition for companies through an additional e-mail verification and audit process. They assure visitors to your company’s site that if they are a customer of yours they can validate that it is indeed your web site they are accessing.

Upgrade your messaging infrastructure. Today’s messaging infrastructure is outdated and ill prepared to combat the volume of threats that exist. Third-party security and encryption systems require high performance, flexible and scalable messaging platforms in order to be effective. A next generation threat protection system is essential.

Be respectful and transparent. Adhere to customer preferences for when, how and where they want to receive communications. When contacting customers, be sure the message is relevant and obey permission and privacy guidelines.

Educate the customer. Protecting end users doesn’t just have to be the responsibility of the company. Educating customers about what they can do to protect their communications online by keeping their anti-virus systems up-to-using a secure wireless network and being cautious about who they share their data with can go a long way in helping your company to preserve its reputation.

“Online trust is a fragile thing. It’s hard to earn, delicate to maintain, and requires constant renewal,” Lewis said. “Enterprises today need to not just be vigilant with their messaging security practices to prevent phishing and other data breaches, but should take proactive steps including self-regulation to protect their brand reputation.”

Featured

  • 12 Commercial Crime Sites to Do Your Research

    12 Commercial Crime Sites to Do Your Research

    Understanding crime statistics in your industry and area is crucial for making important decisions about your security budget. With so much information out there, how can you know which statistics to trust? Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3