{"id":24579,"date":"2012-09-26T19:34:42","date_gmt":"2012-09-26T09:34:42","guid":{"rendered":"http:\/\/power-up.space\/?p=24579"},"modified":"2012-09-26T19:34:42","modified_gmt":"2012-09-26T09:34:42","slug":"avg-aunz-alerts-retailers-to-threats-of-online-crime","status":"publish","type":"post","link":"https:\/\/www.impulsegamer.com\/wordpress\/?p=24579","title":{"rendered":"AVG (AU\/NZ) alerts retailers to threats of online crime"},"content":{"rendered":"<p><strong>MELBOURNE, 26 September 2012<\/strong> \u2014 Speaking at Retail Expo 2012 in Sydney yesterday, Michael McKinnon, Security Advisor at AVG (AU\/NZ), stressed to his audience of small to medium retailers the importance of taking responsibility for the online security of their businesses. He detailed the dangers for retailers in relying too heavily on their IT suppliers to deliver the necessary levels of security.<\/p>\n<p>In what would appear to be a counter intuitive statement, McKinnon said: \u201cIt is not the 5.3 percent of Australian retailers that provide online shopping services which have the greatest exposure to cybercrime, it is the remaining 95 percent of business owners in the sector whose eyes are still on the shop floor rather than the online world, who are most at risk of falling prey to cybercrime.<\/p>\n<p>\u201cRetailers with a sophisticated Internet presence tend to have more current ICT systems and security regimes in place, while the vast majority are largely unaware of and are unprepared for threats to their security,\u201d he said.<\/p>\n<p>Shop owners are being targeted because their businesses have high EFTPOS and credit card transaction volumes and detailed customer databases. Every piece of personal identification information and financial data can be used or sold by a hacker.<\/p>\n<p>McKinnon said: \u201cNot all cybercrime is coming from borderless networks of organised bad guys opportunistically scanning the Internet to find vulnerabilities. It is very easy to walk in and scope physical stores, see what equipment and systems are running, and exploit known weaknesses.\u201d<\/p>\n<p>By operating with unsecured wireless networks and weak password regimes, outlets are open to online attack. A criminal, sitting in close physical proximity to the shop, can simply hack into its system.<\/p>\n<p>The insidious nature of sophisticated malware is that it is designed to work undetected. The longer it can successfully infiltrate POS and other systems, the greater the value of the online heist \u2013 and in most cases a compromise won\u2019t be discovered for months<sup>2<\/sup>.<\/p>\n<p>McKinnon said: \u201cYour machines won\u2019t slow, nothing unwarranted will appear in your bank statements. You\u2019ll only find out you\u2019ve been a victim when customer fraud issues are traced back to you.\u201d<\/p>\n<p>The ramifications of a breach are in the loss of critical time, money and reputation. The costs involved in having to deal with the Australian Federal Police and banks to comply with investigations, as well as ICT contractors to clean systems and compile evidence, can be too high a price for some retailers to pay. And McKinnon says: \u201cAs the story spreads of you \u2018allowing\u2019 a hacker to fraudulently access customer financial information \u2013 particularly when you look at the immediacy and reach of social networking \u2013 the competitive retail market will often see customers changing to other, \u2018safer\u2019 suppliers.<\/p>\n<p>\u201cWhile a shoplifter can walk out the door with a single item of clothing, a cyber criminal can clean you out,\u201d he said.<\/p>\n<p>Retail operates on tight margins. While it may be tempting to cut corners when purchasing ICT equipment and commissioning external computing services, McKinnon advises: \u201cDon\u2019t scrimp. Get the best and the latest and use every available security measure.\u201d<\/p>\n<p>A clear indicator of the benefit of high level internal security can be seen in the statistic from Verizon\u00a0 that 92 percent of data breaches in smaller operators are notified by an external party, whereas in larger organisations only 49 percent find out the hard way, because they tend to control their own IT and security and can detect breaches earlier.<\/p>\n<p>Another issue for retail shop owners is staff turnover and the ability to keep security policies and implementation at a comprehensively high level.<\/p>\n<p>AVG (AU\/NZ) urges retailers to take greater interest in and responsibility for their online security. It is an area of their business that should only be outsourced with care. In a recent example, several retailers were breached when their IT supplier installed remote access technologies to service their systems but gave a hacker an open door by using the same password for every customer.<\/p>\n<p>Confidentiality of customer data is paramount so AVG (AU\/NZ)&#8217;s 5 Top Tips for Retailers are:<\/p>\n<ol start=\"1\">\n<li>Check the credentials and \u00a0\u00a0\u00a0\u00a0 security regimes of any outsourced ICT resources.<\/li>\n<li>Maintain the highest \u00a0\u00a0\u00a0\u00a0 security levels for Virtual Private Networks and your suppliers&#8217; remote \u00a0\u00a0\u00a0\u00a0 access authorisations.<\/li>\n<li>Create strong passwords and \u00a0\u00a0\u00a0\u00a0 strict authentications &#8211; hackers test for systems that use factory default \u00a0\u00a0\u00a0\u00a0 settings.<\/li>\n<li>Secure all end points \u2013 \u00a0\u00a0\u00a0\u00a0 POS, PCs, mobile devices including smartphones, tablets and USB sticks.<\/li>\n<li>Staff training must include \u00a0\u00a0\u00a0\u00a0 online security awareness, and specifically the issue of social \u00a0\u00a0\u00a0\u00a0 engineering where staff can be manipulated into divulging confidential \u00a0\u00a0\u00a0\u00a0 data or personal identification information.<\/li>\n<\/ol>\n<p><strong>Links<\/strong><\/p>\n<p>1. NAB July 2012 Online Sales Index &#8211;<a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8k-2FU91qJZsXXFDbmZntSR74M8-2B70NvsnP8wFukEJ7DIVykZ-2FEiNyoMIp3jBdG6oDeh-2BAiicOI9OZQllUCR8K4aWPUyGzLUo7ZtsughWh4g3y_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWr3VOMS0ulZSDeVJ-2B7wu27tpiouYgS9q-2B1FPVKjGnq-2Fh75HPAZ9oZtDZF913kVPJa-2BDzFODVMjZqgLSfHu3OdbeJBLXQC9SBG81SkKnImL4RRHUHRIsK5dTIoETqUjMeANm8QCht7NnFgy6uxj394OCcGntag4xX8-2B8NL885cAqg8-3D\"> http:\/\/www.nab.com.au\/wps\/wcm\/connect\/nab\/nab\/home\/Business_Solutions\/10\/25\/<\/a><\/p>\n<p>2. Verizon 2012 Data Breach Investigations Report (DBIR) &#8211; <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8muRFcw8U0d346-2FPaOIs7cFD67PzDeFw8AeimPU7laI4C9MPhqXzFP6XD7Ucw-2BzGNQ-3D-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWr3VOMS0ulZSDeVJ-2B7wu27tgaBknY9dXjmbzQ588rIRnDkbm0bvdQMLlGorZjBvIjLjHDWy2kRoaciHwjsSVndxD06f5lb9mj7fDBigks-2F4S7oVwG90cGwUZr-2FJ7hxpqzz6Imj6me9yvkSl8Kdo9lP9zxqQD-2Brzo5XZWBlEx-2BHE-2FM-3D\">www.verizonbusiness.com\/about\/events\/2012dbir\/<\/a> &#8211; page 50 \u2013 Initial Compromise to Discovery<\/p>\n<p>3. Verizon 2012 Data Breach Investigations Report (DBIR) \u2013<\/p>\n<p><a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8muRFcw8U0d346-2FPaOIs7cFD67PzDeFw8AeimPU7laI4C9MPhqXzFP6XD7Ucw-2BzGNQ-3D-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWr3VOMS0ulZSDeVJ-2B7wu27tlz9ycL2xAaRHahkHSnyQuSK0GPVIF7RM5AK2Ob04NeCgauVVimGzEK0wVtqcJOSXHgBEfayv5Iva9owNaCBt5cvCx8zK2d-2BVO5B2Q-2FT31Ddxw2-2FgV46fKW14YSxZXibm-2BR8lFinIM1gIULeZEl4eJU-3D\">www.verizonbusiness.com\/about\/events\/2012dbir\/<\/a> &#8211; page 51 \u2013 Breach Discovery Methods<\/p>\n<p><strong>Keep in touch with AVG (AU\/NZ)<\/strong><\/p>\n<ul>\n<li>For breaking news, follow \u00a0\u00a0\u00a0\u00a0 AVG (AU\/NZ) on Twitter at <a title=\"http:\/\/twitter.com\/avgaunz\" href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=BukfIRbgdZajg8LOo9IGY1F3xfzReWeUtNJxgwMaFo8-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWr3VOMS0ulZSDeVJ-2B7wu27ttUsXLwwywBOqZU61cFC-2FhKwiVis-2BcM-2BpCN3NnN0qzoy4Wp7-2FREOOwhmZ-2FKsvA50XfOFRrnBv1Gp7RQzHXCj8M2L2UJcjoLclhZ3ecycQzqksJrvL-2FlKsWa-2FGytOPF6aApiS0MasNPhxR3PbmXfws-2Bc-3D\">twitter.com\/avgaunz<\/a><\/li>\n<li>Join our Facebook community \u00a0\u00a0\u00a0\u00a0 at <a title=\"http:\/\/www.facebook.com\/avgaunz\" href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8ilcbnIPwC1B3-2FHYNFjYcQqPgJmo4H86AvTTgN-2B0puvW_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWr3VOMS0ulZSDeVJ-2B7wu27tnPuZNtwoVa7ZW6mPWjoJWgi9OlqHQfLvR-2FOPrOV-2FbfhUReICh2Iu0wZ6MdEwOz2NpEC2Batf5-2BZVHhOjmGRfDNoNTNng6MN71LBohQWE-2FzO-2Bp0zFvRVVRj6ikK0T3Q0h2t-2Bpk-2FynVif9Es1q-2BC3w3Y-3D\">www.facebook.com\/avgaunz<\/a><\/li>\n<li>For security trends, \u00a0\u00a0\u00a0\u00a0 analysis, follow the AVG (AU\/NZ) blog at <a title=\"http:\/\/resources.avg.com.au\/\" href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=PrUcFyTZGhQqpu4Sjwq4FS8-2BdZ4gF-2Fzrk5HIui7hsy0lYguc5RG-2B0KczQvGU3ICn_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWr3VOMS0ulZSDeVJ-2B7wu27tr353Pj9vzcQZxYDlvhK5ixsaE4rhicu9xvvA-2F9iqIYq6Kt-2BatOJGs1kYIxyBMBhL5WMRaWa-2F93DiI2qZCAv-2BdzRpoLPbn6PYXLrskXeWysYXJoXjA-2FwWHwpUEQ248saHIUhFRUnYiScwyALD0xH-2BUs-3D\">resources.avg.com.au<\/a><\/li>\n<\/ul>\n<p>AVG (AU\/NZ) has a comprehensive range of security tips on its web site at <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8klQ8YoM7FoRuDbMj-2BC1saqw-2FJ1ImU3x0cFxzn20RVuOEtstHKmRbLpasjmH9tPq0g-3D-3D_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWr3VOMS0ulZSDeVJ-2B7wu27tuU8DDh1BIOIablVeB0E7Etlm81ycK51N8MVEURuBUWkd3sDQLODw4ylzFs7sdzb8xHFyLxlIgB-2B9N96fpkyD4MFMsGx8o0IVmFl3kcuSRcSi-2BWP8ny78rWqpTmXVb-2FhnzV4it1hEs-2B5watbI0I9p1I-3D\">http:\/\/www.avg.com.au\/resources\/security-tips\/<\/a>. For video tips from AVG (AU\/NZ), see <a href=\"http:\/\/email.erelease.com.au\/wf\/click?upn=jsmq4ETA8vWHcPcezuXj8hG5nKp8rFCmn0LAOQ8xyey77GKCZC90RZjUYBqU2Zyf_diS2Z65q3OkoKPsjgGp5n15COmhoq7XsjxZNaFg66QoyPJ7LRpa528y3h17TgQWr3VOMS0ulZSDeVJ-2B7wu27tg1vlpsCF48iOrkgtm50mCbpOX9rBr8y50SXu78CKgi6kF-2BhgkRUWtG5BFyzg2v12CBEjILtIjm24KzCDfSdoBASylj3tGzEKRSYPlT-2FE-2FFO6dtzQQqyynkXuZVQzhucdvYBpVSZzN0rjv5x-2Bfun-2FOo-3D\">http:\/\/www.youtube.com\/user\/avgaunz<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MELBOURNE, 26 September 2012 \u2014 Speaking at Retail Expo 2012 in Sydney yesterday, Michael McKinnon, Security Advisor at AVG (AU\/NZ), stressed to his audience of small to medium retailers the importance of taking responsibility for the online security of their businesses. He detailed the dangers for retailers in relying too heavily on their IT suppliers<\/p>\n<p class=\"more-link\"><a href=\"https:\/\/www.impulsegamer.com\/wordpress\/?p=24579\">Read More\u2026<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-24579","post","type-post","status-publish","format-standard","hentry","category-software-news"],"_links":{"self":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/24579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=24579"}],"version-history":[{"count":1,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/24579\/revisions"}],"predecessor-version":[{"id":24580,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/24579\/revisions\/24580"}],"wp:attachment":[{"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=24579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=24579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.impulsegamer.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=24579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}