Intelligent CISO Issue 39 | Page 46

Organisations in all sectors should deploy authentication protocols , such as DMARC , to shore up their email fraud defences . can intercept data transferred over unprotected Wi-Fi , including credit card numbers , passwords , account information and more .
industry unlocked

Organisations in all sectors should deploy authentication protocols , such as DMARC , to shore up their email fraud defences . can intercept data transferred over unprotected Wi-Fi , including credit card numbers , passwords , account information and more .

3 . Watch out for ‘ lookalike ’ sites : Attackers create ‘ lookalike ’ sites imitating familiar brands . These fraudulent sites may pose as a credible establishment , be infected with malware , or steal money or credentials .
4 . Dodge potential phishing and smishing attacks : Phishing emails lead to unsafe websites that gather personal data , like credentials and credit card data . Watch out for SMS phishing too – aka ‘ smishing ’ – or messages through social media .
5 . Don ’ t click on links : If receiving a discount rate or other promotion from a hotel over email , go directly to the source of the advertised deal by typing a known website address directly into your browser . For special offer codes , enter them at the checkout to see if they are legitimate .
6 . Verify before you buy : Fraudulent ads , websites and mobile apps can be difficult to spot . When downloading a new app or visiting an unfamiliar site , take time to read online reviews and any customer complaints . u
46 www . intelligentciso . com