You've seen it in the news - 40 million credit cards exposed!
With all the news about web sites being hacked and cyber thieves stealing credit card numbers and other personal data, it's no wonder that some shoppers are still hesitant to provide payment information online. You don't have to be.
Is it enough that users trust you?
Common marketing wisdom shows that one of the most valuable assets any Internet Marketer has is trust. People go to extreme measures to build this trust - online pictures, testimonials, audio - some even go as far as to open storefronts to give people that "good feeling".
But all of this may simply not be enough.
A recent Harris Interactive survey found that 75 percent of consumers polled worry that companies will share personal data with other corporations without permissions, while 70 percent doubt the security of online transactions and 69 percent fear that hackers will steal their personal data submitted online.
You see, just because a user trusts you, doesn't necessarily mean that the customer trusts your website or your payment processor.
Once you've established rapport with your customer base, the next step is to build trust in your website.
Whether you collect credit card information yourself, or have a third party processor handle your transactions for you, it's crucial that people understand that you are serious about protecting their privacy and information.
Here's a few things you can do to help out.
*) Install a Secure Server Certificate on your server to close that "lock" on people's browsers. Even if you don't collect credit card information, people feel better about having the information they send to you be secure. Also, consider using a "top tier" Certificate provider, such as Verisign. While other providers may have nearly equally secure solutions, the reason you are buying the certificate is to instill trust in your customers, which other providers do not necessarily have in abundance.
*) Have a clear, clean privacy policy statement in addition to the "legalese" required by the FTC. If you don't sell addresses, tell people so.
*) Secure your server. I know that this seems obvious, but most people pay no attention to their webserver or the software they are running. Knowing what software you have running, and keeping up-to-date on patches will help significantly.
*) Install an Intrusion Detection System (IDS) I estimate 73% or more of all websites have no intrusion detection system in place. What this means is that not only can most websites be hacked easily, it is very likely that the website owner has no clue if they have been compromised.
*) Turn off unneeded services and ports, and uninstall unused software. The premise here is that the less "stuff" on your machine, the less chance for exploit. For example, MySQL listens on the Internet for messages form other servers, yet most small websites access the database system only from the machine it is running on. It is very simple to make MySQL "invisible" to the Internet - making it much more secure if you don't need to access it from other systems. There are many, many more simple techniques like this you can apply to your server to keep hackers out.
In summary, consumers are quickly becoming Internet savvy and they take their privacy seriously. There is nothing, and I mean nothing, that can hurt your credibility more than your customers and potential customers getting SPAM to email addresses that they provided only to you - in the best case, they will think that you sold their address. Responding that no, you didn't sell their address, but someone hacked your server and stole ALL their personal information won't make them feel a whole lot better about doing business with you in the future.
Nick Temple is an e-commerce and security specialist that has been practicing online for over 10 years, since 1994. Some previous clients include Verisign, Sun Microsystems, and Coupons.com. His new website, http://www.DontGetHacked.info reveals that Internet Marketers are prime targets for hackers, and what you can do to stop them cold.
![]() |
|
![]() |
|
![]() |
|
![]() |
Ok, ok, I know you've seen them. All those pop... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
The top five online scams on the Internet hit nearly... Read More
Let us take the example of scrambling an egg. First,... Read More
As you know, this time the virus under the name... Read More
During the release of a new software product specialized to... Read More
Every day millions of people go online to find information,... Read More
First I would like to stress I am condoning the... Read More
You and I are a lot alike. We are both... Read More
If you are wondering how to fight spyware for safe... Read More
We all get the odd virus now and then, but... Read More
If spyware were a person and he set himself up... Read More
Spyware protection software is the easiest way of removing spyware... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Ok, you've got a computer, and you get online. You... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
My first experience with a spyware BHO based infection was... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
As soon as almost all computer users already got used... Read More
In today's times spyware is a very serious issue and... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
In a word, no - an email message has always... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Credit card fraud is a growing problem for online businesses... Read More
No longer are viruses the only threat on the internet.... Read More
Since its birth, the Internet has grown and expanded to... Read More
With the advent of the World Wide Web, a whole... Read More
History and BackgroundThe virus was one of the first ever... Read More
What is computer security? Computer security is the process of... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
You can detect spyware online using free spyware cleaners and... Read More
Have you ever bought a product or service from the... Read More
Security leaks can be a big problem for any site... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
A week or so ago, I received an inquiry from... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
The first thing people think about when defending their computers... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
So called phishers try to catch the information about the... Read More
The Threat10 years ago you could probably have run no... Read More
Spyware protection software is the easiest way of removing spyware... Read More
It's late. You've been scouring the web for that perfect... Read More
So you want to know who your kids are chatting... Read More
The words Corporate Security may conjure up images of a... Read More
If you have used a Windows machine for a while,... Read More
Phishing is the act of some individual sending an email... Read More
Computer infections can be broken up into 4 main categories... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
You and I are a lot alike. We are both... Read More
First the basic definition of Spyware: It is a type... Read More
Sooner or later everyone with an email account will receive... Read More
Computer security for most can be described in 2 words,... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Viruses are, however, not the only malicious software programs out... Read More
No longer are viruses the only threat on the internet.... Read More
Fishing on the Internet has come a long way. However,... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Did you know...? 1 in 5 children who use computer... Read More
In today's times spyware is a very serious issue and... Read More
Internet Security |