Welcome!

Digital Advertising Authors: John Smith

Related Topics: Cloud Security

Cloud Security: Blog Post

Staying Secure in 2013

Anticipating the risks

The start of a new year is an opportune time to reflect on the achievements of the last twelve months and consider what needs to be accomplished over the next twelve. For consumers and professionals alike, the new year should serve as a timely reminder to think about their approach to online security in 2013. Indeed, caution should be exercised all year round, as the problem of online identity theft is obviously an annual problem rather than merely a seasonal one.

Caution should always be exercised, whether you are making an online bill payment with a bank, doing business online, accessing a site for news, entertainment or related to a hobby interest, or even accessing an online dating site. Of course, online security starts with common sense as much as it does with technology. While many sites provide a convenient and seemingly safe way to find information, news or share interests, you should always be careful about how much information you divulge about yourself to strangers online, as more unscrupulous people could be focused to capturing your identity. It is always wise therefore to be careful about sharing information relating to where you live and demographic behaviour like your age, whether you are a student, working or retired. Equally, you should be careful about what personal images and photos you upload, as they offer another window into your life, possibly giving away clues that are useful to an online criminal.

Even though these risks are known to website owners, alarmingly, even today members' access to many websites remains protected by vulnerable, static passwords, which can be pharmed or phished, making it easy to steal password information from an individual. This enables criminals to pose illegitimately as the member, either online or offline, and often for nefarious purposes. For instance, when shopping online, consumers are exposing themselves to additional risks; by disclosing personal or credit card details, sensitive information can easily be intercepted by fraudsters who will misuse information for their own personal gains.

While this raises interesting questions about who is responsible for consumers' safety online, VASCO is already helping business to address this challenge. Its DIGIPASS® authentication solution helps to mitigate against these attacks and prevent fraudsters from accessing personal details. For years, VASCO has been providing tailored solutions to protect financial transactions online. Today it is using its expertise to help protect businesses and consumers from those with fraudulent intentions who are intent on planning phishing or man-in-the-middle attacks.

VASCO's DIGIPASS for Web is a software-based strong authentication solution and is ideal for replacing static password-based security with a higher security level. It presents a secure solution for users wishing to log on to a social networking site, or for conducting banking transactions via the internet, accessing online newspapers they subscribe to, or simply carrying out purchases or transactions online. The level of security offered by DIGIPASS for Web, far exceeds the security level provided by static password systems and it is extremely easy to use. Although 2013 has only just started, thanks to VASCO, it needn't be remembered for being the year you became the victim of a security breach.

More Stories By Jan Valcke

Jan Valcke is President and Chief Operating Officer, VASCO Data Security International.

Cloud Expo Breaking News
“We just completed the roll out of our first public and private cloud offerings, which are a combination of public, hybrid, and private cloud,” stated Erik Levitt, CEO of Open Data Centers, in this SYS-CON.tv interview at the 14th International Cloud Expo®, held June 10-12, 2014, at the Javits Center in New York City. Cloud Expo® 2014 Silicon Valley, November 4–6, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the...
In today's application economy, enterprise organizations realize that it's their applications that are the heart and soul of their business. If their application users have a bad experience, their revenue and reputation are at stake. In his session at 15th Cloud Expo, Anand Akela, Senior Director of Product Marketing for Application Performance Management at CA Technologies, will discuss how a user-centric Application Performance Management solution can help inspire your users with every appli...
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In their General Session at 15th Cloud Expo, Phil Jackson, Development Community Advocate at SoftLayer, and Harold Hannon, Sr. Software Architect at SoftLayer, to discuss how to take advantage of a multitude of compute option...
With the explosion of the cloud, more businesses are transitioning to a recurring revenue model to generate reliable sales, grow profits, and open new markets. This opportunity requires businesses to get to market quickly with the pricing and packaging options customers want. In addition, you will want to take advantage of the ensuing tidal wave of data to more effectively upsell, cross-sell and manage your customers. All of this is possible, but only with the right approach. At 15th Cloud Exp...
Come learn about what you need to consider when moving your data to the cloud. In her session at 15th Cloud Expo, Skyla Loomis, a Program Director of Cloudant Development at Cloudant, will discuss the security, performance, and operational implications of keeping your data on premise, moving it to the cloud, or taking a hybrid approach. She will use real customer examples to illustrate the tradeoffs, key decision points, and how to be successful with a cloud or hybrid cloud solution.
Planning scalable environments isn't terribly difficult, but it does require a change of perspective. In his session at 15th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will broaden your views to think on an Internet scale by dissecting a video publishing application built with The SoftLayer Platform, Message Queuing, Object Storage, and Drupal. By examining a scalable modular application build that can handle unpredictable traffic, attendees will able to grow your de...
The cloud provides an easy onramp to building and deploying Big Data solutions. Transitioning from initial deployment to large-scale, highly performant operations may not be as easy. In his session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, will discuss the benefits, weaknesses, and performance characteristics of public and bare metal cloud deployments that can help you make the right decisions.
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects – scalability and performance. While applying cloud computing environments to the EHR systems, a special consideration needs to be given to the cloud enablement of Veterans Health Information Systems and Technology Architecture (VistA), i.e....
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization’s assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? I...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using...