White NRA Horizontal logo

connectingRetail-white

The Digital Business Kit for Retailers


Learning Outcomes

Retailers will gain an understanding of the different online Security and privacy risks and opportunities to address these. [printfriendly]

mod-arrow Security Resources


1. GENERAL SERURITY AND PRIVACY INDUSTRY RESOURCES

Australian Commission and Media Authority (ACMA) l e-commerce Security
http://www.acma.gov.au/Industry/Internet/e-Security

Resources | Security
/security/module-resources/

Security | Search Results | Digital Business
http://www.digitalbusiness.gov.au/?s=security&submit=Go

Your computer’s security | Digital Business
http://www.digitalbusiness.gov.au/security-and-legal/your-computers-security/

Security and legal | Digital Business
http://www.digitalbusiness.gov.au/security-and-legal/

Keeping your website safe | Digital Business
http://www.digitalbusiness.gov.au/security-and-legal/keeping-your-website-safe/

Protecting your customers | Digital Business
http://www.digitalbusiness.gov.au/security-and-legal/protecting-your-customers/

National Cyber Security Alliance | StaySafeOnline.org
http://www.staysafeonline.org/

Resources | StaySafeOnline.org
http://www.staysafeonline.org/stay-safe-online/resources/

Interactive IT Security Training Tools for Your Employees | Sophos *
http://www.sophos.com/en-us/security-news-trends/it-security-dos-and-donts/training-tools.aspx
** this site has a good resource kit for businesses and employees.

http://mashable.com/category/online-security
http://mashable.com/category/online-security/

Internet Law Cybercrime Statistics Australia | IBLSuri
http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=1646

Security
http://mashable.com/category/security/

Norton YouTube – YouTube
http://www.youtube.com/user/norton

TOP


2. INDUSTRY BEST PRACTICE ARTICLES

8 tips for small business to improve online safety | ZDNet
http://www.zdnet.com/8-tips-for-small-business-to-improve-online-safety-7000005890/

Small businesses still underestimate cost of security breaches | ZDNet
http://www.zdnet.com/small-businesses-still-underestimate-cost-of-security-breaches-7000007538/

National Cyber Security Alliance | StaySafeOnline.org
http://www.staysafeonline.org/

5 Most-Ignored IT Security Best Practices – Security – Security
http://www.informationweek.com/security/management/5-most-ignored-it-security-best-practice/231500128?nomobile=1

Best Practices for Enterprise Security
http://technet.microsoft.com/en-us/library/cc750076.aspx

Enterprise Support – Symantec Corp. Security Best Practices for Protecting a Business Environment from Common Threats
http://www.symantec.com/business/support/index?page=content&id=TECH105236

www.cisco.com/web/about/ciscoitatwork/collaboration/docs/Cisco_IT_Best_Practice_Collaboration_Security.pdf
http://www.cisco.com/web/about/ciscoitatwork/collaboration/docs/Cisco_IT_Best_Practice_Collaboration_Security.pdf

5 Best Practices for Enterprise Security | PCWorld
http://www.pcworld.com/article/194061/5_best_practices_for_enterprise_security.html

www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf
http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf

Small Businesses Don’t Take Cybersecurity Seriously | BusinessNewsDaily.com
http://www.businessnewsdaily.com/1603-cyber-security-small-business.html

ABS: Latest statistics on businesses online | Digital Business
http://www.digitalbusiness.gov.au/2011/10/11/abs-latest-statistics-on-businesses-online/

5 ways small businesses can boost cyber-security – Business – CBC News
http://www.cbc.ca/news/business/smallbusiness/story/2011/09/28/f-smallbiz-it-computer-security.html

Computer Security Articles on Network Safety, Data Protection & Virus Removal for Business & Personal Computer Safety
http://www.brighthub.com/computing/smb-security.aspx

https://www.techdata.com/techsolutions/softwareconnections/files/sep10/TREND MICRO_top_10_tips_to_keep_your_small_business_safe.pdf
https://www.techdata.com/techsolutions/softwareconnections/files/sep10/TREND%20MICRO_top_10_tips_to_keep_your_small_business_safe.pdf

www.dhs.gov/sites/default/files/publications/Small Business Presentation_1.pdf
http://www.dhs.gov/sites/default/files/publications/Small%20Business%20Presentation_1.pdf

Data Leakage Worldwide: Common Risks and Mistakes Employees Make [Data Loss Prevention] – Cisco Systems
http://www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-499060.html

TOP


3. ANTI VIRUS AND SECURITY SOFTWARE REVIEWS

Antivirus software – Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Antivirus_software

Security software reviews | Security software deals, ratings, user reviews and prices – PC Advisor
http://www.pcadvisor.co.uk/reviews/security-software/31/

Security – Reviews and Price Comparisons from PC Magazine
http://www.pcmag.com/reviews/security-software

Antivirus reviews on CNET
http://www.cnet.com/topic-reviews/antivirus.html?s=0&l=20

Security reviews on CNET.com.au
http://www.cnet.com.au/software/security/

Free Antivirus You Can Trust | PCWorld
http://www.pcworld.com/article/254121/free_antivirus_you_can_trust.html

Antivirus reviews on CNET
http://www.cnet.com/topic-reviews/antivirus.html?s=0&l=20

2014 Password Management Software Review
http://password-management-software-review.toptenreviews.com/

TOP


4. EXTERNAL ELEMENTS

VIRUSES / TROJANS / WORMS

What is a Computer Virus | Computer Virus Definiton
http://www.microsoft.com/security/pc-security/virus-whatis.aspx

What do computer viruses do? | Security News
http://www.pctools.com/security-news/what-do-computer-viruses-do/

The History of Computer Viruses [INFOGRAPHIC] http://mashable.com/2011/03/16/history-of-computer-viruses/

AISI malware statistics | ACMA
http://www.acma.gov.au/Industry/Internet/e-Security/Australian-Internet-Security-Initiative/aisi-malware-statistics-1

FREE ANTIVIRUS

Free Antivirus You Can Trust | PCWorld
http://www.pcworld.com/article/254121/free_antivirus_you_can_trust.html

Best Free Antivirus Software
http://www.techsupportalert.com/best-free-anti-virus-software.htm

The Top 10 Best Free Antivirus Programs 2012
http://www.security-faqs.com/the-top-10-free-antivirus-programs-2012-my-reviews

HACKER PROOFING ARTICLES

www.sophos.com/en-us/medialibrary/Gated
Assets/white papers/sophostop5threatprotectionbestpracticessmallbusinesswpna.pdf
http://www.sophos.com/en-us/medialibrary/Gated%20Assets/white%20papers/sophostop5threatprotectionbestpracticessmallbusinesswpna.pdf

Simple Tips to protect computer against Hackers
http://anasshad.hubpages.com/hub/save-computer-from-Hackers

HARDWARE servers – intranet

What is firewall? – A Word Definition From the Webopedia Computer Dictionary
http://www.webopedia.com/TERM/F/firewall.html

What’s the Difference Between the Internet, Intranet, and Extranet?
http://www.brighthub.com/computing/enterprise-security/articles/63387.aspx

TOP


5. INTERNAL ELEMENTS

COMMUNICATION

IT Security Tips and Tools – email series | Sophos
http://www.sophos.com/en-us/security-news-trends/it-security-dos-and-donts/email-series.aspx

5 Email Security Tips to Protect Your Small Business
http://www.smallbusinesscomputing.com/webmaster/article.php/3928231/5-Email-Security-Tips-to-Protect-Your-Small-Business.htm

ICT Security Guide – Use E-mail Safely
http://www.usask.ca/its/services/itsecurity/8_steps/email.php

Using E-mail Safely
http://ittraining.iu.edu/workshops/win_security/protect_email.html

SOCIAL MEDIA

Tips for Updating Your Company’s Social Media Policy
http://mashable.com/2012/10/06/social-media-policy-update/

Social Networking Security | Social Media Security Toolkit | Sophos
http://www.sophos.com/en-us/security-news-trends/security-trends/social-media-security-toolkit.aspx

Facebook Security – Best Practices For Protecting Yourself On Facebook – Sophos
http://www.sophos.com/en-us/security-news-trends/best-practices/facebook.aspx

Lock down your social media with essential security add-ons | PCWorld
http://www.pcworld.com/article/2010916/lock-down-your-social-media-with-essential-security-add-ons.html

Social Networking Security in the Workplace CIO.com
http://www.cio.com/article/706674/Social_Networking_Security_in_the_Workplace?page=2&taxonomyId=3119

Unintended Consequences: How to Keep Social Media from Becoming a Security Risk | Inc.com
http://www.inc.com/internet/articles/201101/unintended-consequences-how-to-keep-social-media-from-becoming-a-security-risk.html

WEB BROWSING AND DOWNLOADS AND POLICIES

Guidelines on Workplace E-mail, Web Browsing and Privacy
http://www.privacy.gov.au/materials/types/guidelines/view/6056

Sample Internet and Email Policy
http://humanresources.about.com/od/policiesandsamples1/a/email_policy.htm

Sample Internet Usage Policy
http://www.gfi.com/internet-monitoring-software/sample-internet-usage-policy

Putting a Fair Internet Use Policy in Place – Businessweek
http://www.businessweek.com/smallbiz/content/dec2009/sb2009121_245449.htm

BYOD – bring your own device

Bring your own device – Wikipedia, the free encyclopedia
http://en.wikipedia.org/wiki/Bring_your_own_device

Could Employees’ Smartphones Harm Your Business?
http://mashable.com/2012/12/20/byod/

Why IT Departments Should Let Employees Use Their Own Devices
http://mashable.com/2012/05/15/prepare-byod-it/

4 Ways Startups Can Leverage Employee-Owned Tech
http://mashable.com/2012/09/24/byod-tech-business/

 

TOP


6. ENVIRONMENTAL ELEMENTS

Media Kit: Safeguard Your Business
https://www.att.com/gen/press-room?pid=22820
Top Providers of Data Recovery Software in Australia
www.mastbusiness.com/bizarticles/ba254/

AT&T Safeguard Your Business – YouTube
https://www.youtube.com/watch?feature=player_embedded&v=lv8LVkGd1Rg#!

FEMA, Red Cross and Ad Council Launch New Ready Business PSAs to Urge Small Businesses to Prepare in Advance of an Emergency
http://www.adcouncil.org/News-Events/Press-Releases/FEMA-Red-Cross-and-Ad-Council-Launch-New-Ready-Business-PSAs-to-Urge-Small-Businesses-to-Prepare-in-Advance-of-an-Emergency

Reasons to Prepare
http://www.readyrating.org/HowItWorks/ReasonstoPrepare.aspx

How to securely erase your hard drive when disposing of your computer
http://www.microsoft.com/security/online-privacy/safely-dispose-computers-and-devices.aspx

10 tips for secure computer disposal | TechRepublic
http://www.techrepublic.com/blog/security/10-tips-for-secure-computer-disposal/1216

Disposing of Old Computers | OnGuard Online
http://www.onguardonline.gov/articles/0010-disposing-old-computers

TOP


7. HOW DO YOU TELL IF YOUR SYSTEM HAS BEEN COMPROMISED OR HACKED?

http://www.wikihow.com/Know-if-You’ve-Been-Hacked

6 Signs Your Computer Has Been Infected … and 4 Ways to Fix It | BusinessNewsDaily.com
http://www.businessnewsdaily.com/1368-6-signs-computer-infected.html

Symptoms | Infected Computer
http://www.kaspersky.com/symptoms

TOP


8. WHAT DO YOU DO IF YOUR SYSTEM HAS BEEN COMPROMISED OR HACKED?

http://blog.hotspotshield.com/2013/08/28/what-to-do-if-your-computer-has-been-hacked/

Hacked and Hijacked: What to Do if Your PC Gets Compromised
http://www.switched.com/2011/02/23/what-to-do-if-your-pc-gets-hacked/

What To Do If Your Facebook Account Gets Hacked [VIDEO] http://mashable.com/2012/08/24/facebook-hacked/

TOP


9. TOOLS AND HOW TO’S

Six Great Password Managers | PCMag.com
http://www.pcmag.com/article2/0,2817,2381432,00.asp

Autorun FAQs: How autorun works and how to disable it
http://antivirus.about.com/od/securitytips/a/autorunfaqs.htm

How to Disable Autorun
http://antivirus.about.com/od/securitytips/ht/autorun.htm

How to avoid viruses, Trojans, worms and spyware | Sophos Threatsaurus A-Z
http://www.sophos.com/en-us/threat-center/threat-analyses/threatsaurus/safety-tips/how-to-avoid-viruses-trojans-worms-and-spyware.aspx

How to use removable media securely | Sophos Threatsaurus A-Z
http://www.sophos.com/en-us/threat-center/threat-analyses/threatsaurus/safety-tips/how-to-use-removable-media-securely.aspx

How to choose secure passwords | Sophos Threatsaurus A-Z
http://www.sophos.com/en-us/threat-center/threat-analyses/threatsaurus/safety-tips/how-to-choose-secure-passwords.aspx

How to secure your data | Sophos Threatsaurus A-Z
http://www.sophos.com/en-us/threat-center/threat-analyses/threatsaurus/safety-tips/how-to-secure-your-data.aspx

How to avoid being phished | Sophos Threatsaurus A-Z
http://www.sophos.com/en-us/threat-center/threat-analyses/threatsaurus/safety-tips/how-to-avoid-being-phished.aspx

How to secure your mobile workforce | Sophos Threatsaurus A-Z
http://www.sophos.com/en-us/threat-center/threat-analyses/threatsaurus/safety-tips/how-to-secure-your-mobile-workforce.aspx

How to buy online safely | Sophos Threatsaurus A-Z
http://www.sophos.com/en-us/threat-center/threat-analyses/threatsaurus/safety-tips/how-to-buy-online-safely.aspx

How to stay safe on the move | Sophos Threatsaurus A-Z
http://www.sophos.com/en-us/threat-center/threat-analyses/threatsaurus/safety-tips/how-to-stay-safe-on-the-move.aspx

How to avoid hoaxes | Sophos Threatsaurus A-Z
http://www.sophos.com/en-us/threat-center/threat-analyses/threatsaurus/safety-tips/how-to-avoid-hoaxes.aspx

How to be safe on the Internet | Sophos Threatsaurus A-Z
http://www.sophos.com/en-us/threat-center/threat-analyses/threatsaurus/safety-tips/how-to-be-safe-on-the-internet.aspx

Mobile Security Ponemon Institute Whitepaper | How to Secure Mobile Workers | Sophos – Security News & Trends – Sophos
http://www.sophos.com/en-us/security-news-trends/security-trends/7-tips-for-securing-mobile-workers.aspx

Security Threats in 2013 | Sophos Security Threat Report
http://www.sophos.com/en-us/security-news-trends/reports/security-threat-report.aspx

TOP