• Skip to content
logo logo
  • Blog
Login SIGNUP

cyber attacks

8 Tips for your customers to trust in your e-commerce

October 31, 2018 by HushApp Team Leave a Comment

8 Tips for your customers to trust in your e-commerce

The work of selling a product is becoming more difficult every day. We are overwhelmed by information and advertising, especially on the web. Even when your e-commerce manages to correctly apply all the positioning strategies to stand out in search engines, you still sell little or nothing. Why is it? Is it possible that your e commerce does not generate sufficient confidence.

The increase in cyber attacks has caused people to become skeptical about the websites they use and not feel comfortable leaving their private and financial information online to make a purchase. If you feel that your ecommerce is not generating confidence in your potential clients, follow the tips below that will help you identify what the problems are and how to solve them.

How is the image of your e-commerce?

1. The first impression counts: Start by reviewing the design, if it is old or outdated it will not make a good impression, the same way bad spelling or grammar can affect the image of your company. People do not feel confident in an organization that does not know how to express what they want from you.

The ideal is to hire specialists in these areas that can give the right image to your company. Also consider that if poor wording can affect the rankings of a Google search.

It is important that the prospective buyer is clear about the characteristics of what they are going to buy and the benefits that they will bring. Therefore, the entire image of your website must clearly express what your message.

However, the trust is not only in the image, the company also has to convey confidence at the time that your customer is going to make the purchase, at that time, you should consider the following:

2. Clients want to know who you are: There you can show the physical and / or legal information of the company. The more information you offer, the better, company history, mission, vision, business objectives, professional team, managers, etc.

3. Contact you easily: The contact section must have all the necessary information so that the customer can communicate with the company without problems. The information should include telephone numbers, emails and physical address (if available). Using Google Maps is the best way to show a physical address. There are other channels that can facilitate communication such as chats or interaction with users in social networks, will bring more value to the company.

What do they say about your company?

4. If managed correctly social media can be a great help and a fundamental tool for any business, as they allow a channel of communication with customers.

Users today pay a great deal of attention to the reviews a company receives on the web. If there are negative comments it is possible that this generates distrust. Therefore, it is important to manage this type of problems as quickly as possible, and contact
the affected clients, to reduce the impact that these comments may have.

Generate confidence in your e-commerce beyond the image

5. Use SSL certificate for your website: This way you are already guaranteeing the visitor that you are an authentic and reliable site regarding the registration of your personal or banking data, as these will travel from encrypted form. To have it, just ask the company where we have hosted the domain and configure it in your content manager. 

Stay tuned on HushApp's Blog!
SUBSCRIBE

6. Show your stamps and certificates of quality: There are different certifications that will make your online store generate more confidence, for example, “Online trust” that guarantees the protection of your data and your rights as a consumer or, “Ekomi” to demonstrate that your payment is safe. There are also others like ChambertTrust and Fevad.

7. Clarify return policies: Clearly state in which cases they can apply and when they can not.

8. It offers multiple payment options: Offer your clients all the payment options you can, so that you can choose the one you feel most comfortable with. Paypal, bank transfer, credit card, etc. are among the best known. It is also important to make clear if it is necessary to charge some type of commission.

The security of your customers’ data must be paramount for you when making any online transaction, and you must prove it using all possible methods so that you feel comfortable and safe when visiting your e-commerce.

Filed Under: Cybersecurity Business Tagged With: cyber attacks, cybersecurity, e-commerce, online transaction, private information, social media, SSL certificate, website

9 Tips to protect your router from cyber attacks (and your neighbor)

September 5, 2018 by HushApp Team Leave a Comment

9 Tips to protect your router from cyber attacks (and your neighbor)

The Wi-fi signal from our router has become part of the family, how many do not depend on this small device to keep the family happy? We all want it to keep working perfectly, but surely you have not bothered to protect your router until the neighbor manages to connect to it. How he did it?

Imagine that your router is an open door to your home, think of all the devices that are connected to it, if you do not take the necessary security measures, you will not only be leaving the doors open for your neighbors to use your internet connection without paying it, but also you are responsible for the pages that he / she visits, and therefore, you risk being an easy prey to a cyber attack.

How can we prevent intruders from connecting to our Wi-Fi? Although we do not have the magic formula to achieve total security, at least we can help you improve your daily practices and reduce the risk of an attack by following this tips:

First steps to protect your router: Change everything that is by default

  1. The first step is change the user, avoid leaving “admin” and configure something customized.
  2. Second and one of the most important, change the password which comes by default by the manufacturer or operator. Use the strongest passwords you can, with combinations of uppercase, lowercase, numbers and special characters.
  3. Also, change the IP address of the router: it is usually 192.168.1.1, just by changing the last digit and making it difficult for any intruder to enter.
  4. The name of the Wi-Fi: here you can use something simple or easy to remember, but do not put information that refers to you: your name, nickname, physical address or any other unnecessary information.

After making the necessary changes, you can apply other stronger measures to protect your router:

  1. Limit the emission power of the antennas: one of the simplest measures, because if you limit its scope, it will be difficult for others to get connected, only to those who are inside the house. Most routers allow managing the antennas power to limit the radius coverage of the network.
  2. Configure your network with WPA encryption: It is recommended to enable the most current WPA3 WPA configuration with a 192 bits encryption and the ability to individually protect each device that connects to the network. However, most modern versions of WPA like WPA2-PSK can also secure your network, since it offers a high level of protection. Is not recommended to use WEP encryption, since it is not secure enough, modern routers it does not have this option configured, nevertheless, it is worth reviewing it.
  3. Update the firmware: your router has its own operating system like your mobile devices and computers, it should be updated to correct possible bugs and vulnerabilities.
  4. Create different networks: Some new routers can create different networks, this will allow you to have networks for different purposes.
  5. Filter the MAC addresses: the MAC addresses identify every devices, there are not two computers with this identification number. Register the MAC addresses you want on your router, and only they will have access to your home’s internet.

If you want to be aware of other cybersecurity tips, we invite you to visit our Syneidis blog.

Filed Under: HushApp Tips Tagged With: cyber attacks, firmware, IP address, MAC, MAC addresses, password, router, Wi-Fi, WPA, WPA encryption, WPA3

9 Cybersecurity Tips to protect corporate email from possible cyber attacks

August 27, 2018 by HushApp Team Leave a Comment

9 Cybersecurity Tips to protect corporate email from possible cyber attacks

Email is still the best way for companies to communicate today, it is the most convenient way to send and share files. However, it is important to use with caution because many cyber-attacks that occur in companies, originate in email. A prime place where cybercriminals can get information directly from employees. To make sure your email is protected, follow these cybersecurity tips to protect your corporate email.

9 Cybersecurity tips to protect your company’s email

  1. Must ensure your employees understand the risks of a cyberattack and how to be safe so companies can cybersecurity culture in the company.
  2. Do not use corporate email for personal purposes, to avoid getting additional opportunities for unauthorized people to invade a company’s system.
  3. In case you lose your password, link your email to another alternative account, preferably another from the company. Add double factor authentication for added security.
  4. Do not post your corporate email address in forums, social media, etc.
  5. Create email accounts for different tasks, for example, using an additional account to subscribe to new services where your security policy is unknown. Having multiple accounts decreases chances of getting hacked and losing private information.
  6. Watch where you access with your email: Do not open your corporate email from networks outside the company, in case you have to do so, open a incognito window and close all other sessions.
  7. Beware of phishing: an email with malicious content is designed to deceive you, so it is important to be alert to any fraud, and analyze its content: an unknown sender, files with double extension that usually are computer worms or Trojans, even some design change could be an indication of a phishing email. If you decide to open it, check it with an antivirus.
  8. Do not respond to spam emails, you can give clues to possible attackers or scammers.
  9. Send your encrypted files: use an application to protect your files. An option can be HushApp, with which you can send and share files in a easy and secure way, it uses end to end encryption. You can also send files to contacts that do not use the application and the information will remain protected.

There is no guarantee that you will have 100% security, cybercriminals use different techniques every time to violate the company’s confidentiality, taking advantage of informing employees on proper security measures will help reduce the chances of being hacked. Therefore, the best way to defend yourself is by being aware of the risks and taking all available prevention measures. From the most complex systems you can implement to simple practices, such as these cybersecurity tips to protect email.

Filed Under: Cybersecurity Business Tagged With: computer worms, corporate email, cyber attacks, cybersecurity, email, HushApp, phishing, Trojans

Cybersecurity tools to improve the work of a private detective

July 11, 2018 by HushApp Team Leave a Comment

Cybersecurity tools to improve the work of a private detective

The work of a private detective is no longer as it was before. With the rise of information technology and, in turn, of cyber attacks, research professionals must employ cybersecurity tools that help their clients obtain and protect their information.

Beyond the typical image that the cinema sells about private detectives and their grand adventures, in their day to day they also carry out simple research work for companies, professionals and individuals. For all three, the level of confidentiality and sensitivity of the information they handle is quite high.

Suspicious behavior, false statements in an insurer, and robberies by fellow employees, are just some examples of cases that are handled daily by a company’s private detective. If these situations are not handled correctly, they can be discovered by a third party and have far reaching consequences from reputation to finances.

What a private detective needs today

The main thing a private detective needs is right skill and attitude to help their client make the right decision, even when cases are complex.

Being observant, meticulous, discreet, patient and having a strong ethical background, are undoubtedly fundamental when practicing this profession. The researcher must also be able to treat information as confidential, in addition to having knowledge of the laws and procedures associated with the protection of customer data. This is where it is very important to use the correct cybersecurity tools to manage of data.

Part of a detective’s job is to analyze people and evaluate the information obtained about them. This work should be reinforced with technological skills and the proper use of electronic equipment, taking into account that digital files may be vulnerable to possible cyber attacks.

Accuracy is an additional skill that a private detective must possess. Keeping detailed records of his work and protecting it is essential, especially when considering his work will generate a large number of reports and documents.

Most of the cases of private researchers require field work, that is, moving is part of their day to day. This makes it necessary to use technology to send information to their customers and securely store photographs or videos made with their mobile devices, among other things.

Cybersecurity tools to improve the work of the detective

There are basic tools for a private detective to perform their work effectively, such as: a computer, a mobile phone, a camera, etc. It is important that the technology is up to date, and that the information store within is protected.

Using encryption systems can be a great option when protecting the information of a case, both on the part of the detective and the client.

Applications such as HushApp can help private detectives protect the confidential information of clients in an easy and safe way. It allows the sending of encrypted files in an agile manner without requiring client having to register in the application.

A private detective, like other professionals who handle highly confidential information, must have certain special attitudes and abilities. Adding technology and the best tools will improve the effectiveness of their investigations for their clients.

Filed Under: Cybersecurity Business Tagged With: confidential information, cyber attacks, Cybersecurity tools, encrypted files, private detective

The CISO new figure and its role in corporate cybersecurity

June 5, 2018 by HushApp Team Leave a Comment

The CISO new figure and its role in corporate cybersecurity

Cyberattacks are increasing in business sectors; the more connected to the internet companies are, the more vulnerable they are to attack. With this imminent threat, entrepreneurs are aware of the fact that it is if, but when they will be attacked. It is for this reason that many companies are beginning to hire a new staff figure: the Chief Information Security Officer (CISO).

Although companies recognize the potential damage that a cyberattack can bring, statistics indicate that corporate leaders are not taking the necessary measures to protect themselves.  

One of the reasons why necessary measures are not taken is the lack of knowledge regarding the directive itself. The National Association of Corporate Directors (NACD) published a survey to more than 600 directors and professionals of corporations, they found that only 19% believe that their boards have a high level understanding of cybersecurity risks.

However, they are aware of the biggest risks that a cyberattack could bring. A study was conducted by BAE Systems among 300 managers of companies in the United States. It found that 85% of those surveyed mentioned reputation lost as the most serious consequence of a leak, while 74% considered the legal repercussions as their second largest concern.

Taking the appropriate security measures not only involve resources, qualified staff and technology, it’s also about having the ability to manage them with astuteness. That’s why it is important to determine the role of the Chief Information Security Officer (CISO) as they attempt to keep the interests of the company safe.

What are CISOs facing?

Restrictions on the implementation of security processes in response to app vulnerabilities, mobile device use without security policies, insufficient staff for IT security, and adequate software for confidential files protection are some of the reasons for deficiency in the cybersecurity field.

We should add the need of a CISO to convince the directors board of possible consequences of a cyberattack in an environment where administrative sector is generally given priority.  

Considering the legal responsibility for a security crack that affects customers and how it will correspond with the company’s management. It is necessary to know in depth what is done in this department and how to integrate it with the business strategies of the company.

Establish a cybernetic culture throughout the company

This solution goes beyond understanding security protocols, it is also ensuring that the board of directors establishes a strong professional relationship with the CISO. This will help the board understand the cyber threats, implement appropriate security controls and at the same time promote cybersecurity culture.

A Harvard Business Review research found that 9 out of 10 CISOs are directly linked to the highest management team, half of which belongs to the management team.

Another interesting suggestion is encouraging the involvement of the CISO in the business initiatives. This allows their risk assessments to be taken into account before and during the analysis of results.

On the other hand, to promote  an effective safety culture, it is necessary to have appropriate technology that allows the team to keep up with cybersecurity. Currently there are tools designed for managers that allow them to control the flow of sensitive information inside the company.

Cybersecurity challenges are increasingly difficult, therefore it is task of all staff to carry out appropriate safety measures. It is no longer the responsibility of the IT department, it is necessary to involve and create cybersecurity culture throughout the team, and managers should be example to follow.

Filed Under: Cybersecurity Business Tagged With: business sector, CISO, confidential data, cyber attacks, cyber culture, cybersecurity, cybersecurity culture, IT security, security crack

Encryption for dummies: What is it and what is it for?

June 6, 2018 by HushApp Team Leave a Comment

Encryption for dummies: What is it and what is it for?

Surely you have already heard news of cyber attacks and data leaks as it is becoming increasingly common. Any person or company is exposed to an attack of this type if the necessary security measures are not taken, but what are these measures? What can you do to protect your information?. The most used and effective method to protect your data is a system of encryption with which you can feel secure that your information is completely protected. Have you heard about encryption? Do you know how it works?.

If your answer is no, it is time for you to start taking cybersecurity more seriously and begin learning more about it. That is why we have prepared this post, in hopes that it will help you better understand and apply it in the daily management of your files.

What is encryption?

To explain it in a simple way, encryption is a procedure in which any type of file becomes unreadable thanks to an algorithm that scrambles

Encryption is easy with HushApp!
DOWNLOAD
the files components. This makes it impossible for the file to be opened or decoded if you do not have the key to access the information. This  means that if an unauthorized viewer intercepts an encrypted file they will only be able to see a group of illegible characters, even if they manage to open it.

This system is not something new. Encryption has existed for many centuries, however, its modern use dates back to the First World War. During the conflict different blocks sent illegible messages back and forth to prevent the enemy from deciphering them in the case that they were intercepted in transit.

Encryption, Symmetric and Asymmetric what is it for?

The most common types of file encryption are symmetric and asymmetric.

The symmetric encryption system uses a single key to encrypt or decrypt, while asymmetric data uses two keys: one public to encrypt and one private to decrypt. In this way it is impossible to derive the private key from the public key.  

Advantages and disadvantages

It is important to highlight the level of security offered by data encryption. It is a much more powerful tool than a password (such as the start of the mobile or email), since they only protect access. Once the password is discovered, anyone with it has full access to the contents of the files. Encryption protects data directly, making it impossible to see the contents of files.

The only disadvantage to consider is the importance of not losing your password. After it is lost, all access to the data will be lost completely, as there is no way to change it. So all things  considered, the only additional requirement of encryption is greater protection of your passwords.

How is a file encrypted?

There are different levels of security that depend on the complexity of the algorithm used. Different encryption methods contain greater and lesser levels of sophistication and complexity.

At the user level, it is not necessary to use such complex tools. Currently there are applications that can help you encrypt your files both easily and quickly, while also to share them with your contacts in a secure way. This allows them to remain protected from the moment they are sent to the moment they are received.

We are the only ones responsible for ensuring the security of our information, so taking protective measures as a habit will help us avoid future problems.

Encryption is easy, check it with HushApp!

Filed Under: HushApp Tips Tagged With: algorithm, asymmetric encryption, cyber attacks, Cybersecurity Tips, encryption, file encryption, key, password, protect information, symmetric encryption

logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled