That is the natural conclusion one reaches after seeing the results of a new survey on how call centers handle private details of customers. According to the survey conducted by Veritape, more than 95% of call centers kept customers’ credit card information on phone call recordings, practice that overtly breaches current industry security standards.
Of the 133 call center managers surveyed, only 39% were aware of in place industry rules against storing such information and only 3% actually wiped credit card details from recorded conversations.
“The routine practice of storing unedited audio recordings of calls is creating a vast reservoir of sensitive data on the servers of call centers across the UK, in direct breach of global industry standards drawn up by the Payment Card Industry Data Security Council,” said a Veritape statement.
When you need to actually contact a call center, make sure you think twice before giving them the information they ask of you!
When it comes to security, nothing seems better when it comes to marketing your product than having a free version to offer. Especially when you’re not the major market share holder, giving products away works miracles. At least that is the hypothesis of a recent DarkReading article.
But is this a new approach? Not exactly. From home user solutions to enterprise class security software, the smartest of the pack have a free version.
And why does this work? Simple. Why trust a sales pitch and a nicely designed demo when you can just download and install the product, test it, see how it works with your current infrastructure, then decide to buy. From one month demos to free, limited editions, this is the miracle of free: real results, real tests, no post-demo surprises.
Check out the success stories on DarkReading for more expamples of how free works in the security field.
Paymark, New Zealand’s leading electronic payments provider that processes more than 75% of all electronic transactions in the country, chose Endpoint Protector 2009 as a data loss prevention and device control solution after comparing it to applications developeb by McAfee, Symantec and Devicewall. Why Endpoint Protector? For its ease of use, speedy deployment and natural integration in the existing software and hardware platform.
The electronic payments field comes with specific challenges. As ensuring the highest level of security to customers and protecting them against data security breaches is critical in this field, companies need to effectively control the widespread use of portable storage devices and manage the risks they introduce. That, of course, without restricting in any way the mobility or increased productivity such devices entail. In Paymark’s case, as it happens for other similar businesses, Endpoint Protector is not the only security application they use, that is why compatibility with other security software is as important as features and functionality.
“Endpoint Protector’s simplicity has exceeded our expectations. The speed of deployment and changes is impressive and its encryption features are just what we needed.” Conrad Morgan, Manager ICT Security
To find out more about how implementing a device control and DLP solution in the online payments field goes, read the recently published case study of Paymark and Cososys.
Yes, folks it was bound to happen. Device Control, Data Loss Prevention and endpoint security applications were bound to conquer the new over-hyped platforms, Windows 7 and Snow Leopard. And the first one to reach this performance is the latest version of Endpoint Protector 2009, developed by CoSoSys, a leading developer of endpoint security and portable storage device applications. The new version has a clear purpose, one that is a must for all companies interested in security: allowing them to test and implement the most recent operating systems, while protecting them from common threats yielded by extreme data portability and mobility.
“Our goal is to keep companies safe while allowing them to test, implement and turn the latest breakthroughs in software and hardware platforms into a profitable advantage. Releasing a version for the Windows 7 operating system – which is currently one of the most hyped and critically appraised platforms – and for Mac OS X Snow Leopard is a natural step in our ongoing strive to adapt to as many IT environments as possible. It also complements our efforts of maintaining a high level of mobility and productivity for non-technical users by providing them with a continuously increasing range of controlled portable devices, from iPods, cameras and USB sticks to ExpressCard SDD and printers,” explains Roman Foeckl, CoSoSys CEO.
To test the new version of Endpoint Protector 2009, you can download the 30 days trial or check out the online demo at http://www.EndpointProtector.com.
Remember our recent post on Californian commuters being forced by the law to submit their private details to a site that was clearly exposing them and doing nothing about it? While we emphasized the cause of the problem, an SQL injection vulnerability, and the fact that the site failed to fix it after its being reported, another security writer thought of exploring the consequences that could be triggered.
So here’s a fictional take on what could actually happen if anyone would exploit such a vulnerability, along with a few famous data theft cases that have rocked the security world, including the now world famous case of record holder Albert Gonzales.