Online Trust Alliance Releases Internet Safety Tips

SEATTLE, March 29, 2012 /PRNewswire/ –  The Online Trust Alliance (OTA) today announced the release of their annual “Top Ten Ways Businesses Can Protect Consumers from Being Fooled,” a list of simple-to-employ recommendations for businesses and government agencies to help protect their customers’ and employees’ personal data, financial assets and devices from being compromised.

OTA, with data from the FBI, Secret Service and forensics experts, developed the list to address the most common and dangerous threats based on a review of thousands of data loss and identity theft incidents.

OTA’s 2012 Top 10 Recommendations address the most frequent exploits including botnets, malicious email, phishing and deceptive websites. An excerpt of the full list follows:

  1. The browser is the first line of defense, yet over 40% of users have outdated and insecure browsers, lacking integrated anti-phishing, malware protection and online tracking privacy controls. “Why Your Browser Matters” is a helpful resource for all businesses to provide “teachable moments” to site visitors to upgrade their browser at no cost.
  2. Upwards of 10% of computers are infected by “botnets”.  Scan your systems weekly with tools and resources to help detect, prevent and remediate the threats.
  3. Deceptive and malicious email continued to grow in the past year, targeting business users, government agencies and consumers.  Implement Email Authentication to reduce the incidence of spoofed and forged email, which may lead to identity theft, and the distribution of malware and tarnish your brand reputation.
  4. Cybercriminals are increasingly snooping and eavesdropping on wireless connections, including airports, coffee shops and the library.  Always-on SSL (AOSSL) encrypts all connections and communication — including users’ names and passwords. This standard is now implemented by leading sites including Twitter, Facebook, PayPal and Microsoft.
  5. Enable automatic patch management for operating systems, applications, including add-ons and plugins. Proactive patch management can harden your system from known vulnerabilities. End-of-life applications that are no longer supported should be removed or used in isolated and secure sessions.

To view the complete and updated list for 2012 on ways businesses can protect consumers from being fooled, please go to:

About The Online Trust Alliance (OTA)

Leave a Reply