野花社区

Skip to content

Protecting the most vulnerable

Oftentimes, humans are considered the weakest link in the cybersecurity chain, but for Payton, today鈥檚 hyper-connected world is placing us in a vulnerable position.

鈥淎ll technology by design today is designed to be open,鈥 explained Payton. 鈥淚t has Bluetooth, it has WiFi. It鈥檚 technology we all know and love. It鈥檚 part of our daily lives, but because it鈥檚 designed to be open, it is always at risk of being hacked.鈥

For Payton, this means that organizations must design security strategies that create a safety net around the user, helping to limit the impact of a potential hack.

Cybersecurity with humans in mind

Payton鈥檚 first piece of advice is to acknowledge that statistically, it鈥檚 likely that an employee will click a malicious link. In one survey, almost 70 percent of participants were fooled by emails that appeared to be sent from co-workers. As Payton points out, simply asking people to not click links is a battle that has been ongoing for more than 15 years. It鈥檚 safe to assume that someone will click a malicious link at some point.

Operating under this pretense, Payton suggests that retailers (and all organizations) do three things:

1. Create a safety net around users 鈥 By limiting permissions and segmenting systems, retailers can limit the impact of any phishing intrusions. As Payton points out; 鈥淪egmentation doesn鈥檛 have to just be 鈥榤y network is segmented,鈥 or 鈥榤y data is segmented.鈥 It could be the humans and their user access controls are segmented.鈥

2. Employ a virus scanner 鈥 Employees should be required to use a virus scanner before clicking any links. Virus scanners allow employees to copy and paste links, which are then cross-checked against dozens of databases to see if they are malicious.

3. Use a virtual machine 鈥 Set up rules so that all links and attachments open on a sandbox or virtual machine that operates outside of your corporate network. If a malicious link is then clicked, it won鈥檛 be able to reach your critical systems.

Want more great insights into how you can merge seamlessness and security while still enabling growth? Watch the full cybersecurity webinar on demand, or download our eBook; “Delivering Multi-Dimensional Fraud Prevention” to find out how 野花社区 ReD Shield keeps fraudsters at bay with multiple layers of control.

About Theresa Payton
Theresa Payton is one of America鈥檚 most respected authorities on internet security, data breaches and fraud mitigation. She was the first female to serve as White House chief information officer and was the star of the CBS series Hunted. In 2017, Theresa was named #4 on IFSEC Global鈥檚 list of the world鈥檚 top 50 cybersecurity influencers in security and fire.

Vice President, Segment and Solution Marketing

As Vice President, Merchant Segment & Solution Marketing, Michael has responsibility for developing and executing strategic product launch activities for the Merchant Payments solutions which include omni-channel, eCommerce and fraud prevention capabilities for retailers, telcos, hospitality, gaming, travel and other merchant verticals.听 In this role, he drives thought leadership content, develops solution messaging, supports 野花社区 sales and solution consulting teams and facilitates market awareness of 野花社区鈥檚 products and strategies. Michael covers topics ranging from retailer payments, omni-payment and omni-channel strategies for retailers, as well as point-of-sale, mobile, online/eCommerce and emerging payments types. His coverage of payments risk management topics including enterprise fraud prevention and fraud detection including card, card-not-present fraud, merchant, online banking, mobile and merchant fraud as well as AML and various. Additional he covers mobile topics like mobile banking, mobile payments, mobile wallets, and mCommerce.