Support Center

InfoSec Tools

Last Updated: Aug 09, 2018 06:06AM EDT

 
2018 Data Breach Investigations Report (Verizon)
2018 Trustwave Global Security Report
2017 Data Breach Investigations Report (Verizon)
2016 Identity Fraud: Fraud Hits an Inflection Point (Javelin)
2016 Trustwave Global Security Report
California Consumer Privacy Act of 2018
Consumer Attitudes Toward Breaches (Merchant Acquirers' Committee)
GDPR Key Changes (EUGDPR.org)
Guidance for Multi-Factor Authentication (PCI Security Standards Council)
Hacked Email (OnGuardOnline.gov)
Identity Theft Threat and Mitigations (National Security Agency)
Net Losses: Estimating the Global Cost of Cybercrime (McAfee)
PCI DSS v3.2.1 (PCI Security Standards Council)
PCI DSS v3.2 (PCI Security Standards Council)
PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users (PCI Security Standards Council)
Place a Security Freeze on Your Credit (TransUnion)
Public WiFi Networks (OnlineOnGuard.gov)
Reform of EU Data Protection Rules (European Commission)
Security Breach Response Plan Toolkit (International Association of Privacy Professionals)
Social Networking and Identity Theft (Identity Theft Resource Center)
US DHS, DOJ Respond to Carper Inquiries on Agencies' Response to Threat of Ransomware


 

   

   
 


 

  Acceptable Use Policy - Details appropriate electronic usage at work
   
 

 

  Baiting - Leaving USB drives in random places; when inserted into a computer, they install a virus
   
 


 

  Document Disposal Policy - Details the process for disposing of sensitive paperwork
   
  Dumpster Diving - Pulling personal information from a trashcan or dumpster
   
 

  Identity Theft - When criminals use stolen PII to create a “new” identity
   
 

 
  Juice Jacking - Stealing personal data from a cell phone while it’s being charged at a public charging station
   
 
 
  Malware - Intrusive software that allows unauthorized access to a computer or network
   
  Mobile Pay - When customers pay with their smartphones through mobile-based readers or terminals, near-field or other close-range communications, or mobile apps
   
  Mousejack Attack - Hacking computers at a distance of 100 yards, using wireless devices
   
 
 
  Password Policy - Identifies recommendations for password creation
   
  Payment Card Industry (PCI) - The Payment Card Industry (PCI) denotes the debit, credit, prepaid, e-purse, ATM, and POS cards and associated businesses
   
  Payment Card Industry Security Standards Council - The Payment Card Industry Security Standards Council was formed by the major card issuers (American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International) to manage the ongoing evolution of the Payment Card Industry Data Security Standard (PCI DSS)
   
  Payment Card Industry Data Security Standard (PCI DSS) - The PCI DSS consists of 12 requirements with multiple sub-requirements that contain directives against which businesses may measure their own payment card security policies, procedures and guidelines. Compliance efforts and acceptance must be completed on a periodic basis.
   
  Phishing - Using legitimate-looking emails to try and steal personal information
   
  Piggybacking - Convincing authorized personnel to let you follow them into a secure area
   
  PII - Personally Identifiable Information
   
  Privacy Policy - Used to notify guests about the type of PII that will be collected and the company’s commitment to protecting the guest’s privacy
   
  POS - Point-of-Sale
   
  Pretexting - Using PII to make a request seem legitimate so more information is divulged
   
 
 
  Ransomware - A virus-laden attachment that scrambles data within your computer when opened, leading to hackers demanding a sum of money for your system to be restored
   
 
 
  Security Freeze - Prevent lenders and others from accessing your credit; requires special steps when applying for new credit
   
  Security Policy - Detail how a company will protect the data it has agreed to keep private and how it will respond if a breach occurs
   
  Social Engineering - Convincing individuals to reveal information that can help criminals access their PII
   
  Social Media - Websites or applications through which users create and share content or participate in social networking
   
  Social Media Policy - Sets parameters for accessing social media sites at work as well as prohibits employee postings of an unprofessional or derogatory nature
   
  Spoofing - Mimicking an IP address and accessing personal information through a bluetooth connection
   
 
 
  Tailgating - Following an authorized person into a secure area without permission
   
 
 
  Vishing - A ruse conducted by phone in which the caller poses as a legitimate institution to extract personal information from the person being called

Contact Us

venzahelpdesk@gmail.com
https://cdn.desk.com/
false
desk
Loading
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
about
false
Invalid characters found
/customer/en/portal/articles/autocomplete