Check Point sandboxing technology tops zero-day malware block rates

By admin, 29 marca, 2014, No Comment

Check Point earned a malicious file catch rate of 99.83% in recent testing, compared to its nearest competitor’s 75%

Check Point Software Technologies Ltd. (Nasdaq: CHKP), a worldwide leader in securing the Internet, have announced that Check Point Threat Emulation Service, which protects organisations against new, unknown and targeted attacks before they infect a network, has the highest catch rate of malicious files. In recent benchmark testing, 600 malicious files were scanned through Check Point Threat Emulation and other competitive products. The results found that Check Point outperformed all of the others in this test, with a malicious file catch rate of 99.83%. The other competitive products detected an average of 53% of the files as malicious, with the highest competitor’s catch rate at 75%.

As the modern threat landscape evolves with more aggressive and destructive generations of cybercrime, hacktivism, cyber espionage and targeted attacks, Check Point Threat Emulation has accelerated detection and increased awareness of these threats. For example, it typically takes anti-virus and IPS detections nearly three days to detect unknown malware, while some malware can be left undetected for months or even years. Check Point’s global research found that a typical organisation downloads an unknown malware every 27 minutes. An integral part of Check Point’s multi-layered Threat Prevention solution, Threat Emulation discovers and prevents infections from undiscovered exploits, new variants of malware and targeted attacks by dynamically emulating files within a virtual sandbox.

Once identified, Check Point researchers immediately evaluate the behaviours and properties of these unknown threats and quickly develop protections. These protections are automatically distributed across all Check Point gateways globally utilising ThreatCloud. ThreatCloud is Check Point’s collaborative threat intelligence network that provides for automatic, real-time protection to the company’s worldwide customers.

“In the past 30 days alone, Check Point Threat Emulation detected over 53,000 previously undiscovered malware threats through emulation of over 8.8 million files. This staggering statistic is an example of the ever-increasing rate at which organisations are facing advanced and unknown attacks,” said Doros Hadjizenonos, sales manager for Check Point South Africa. “With a malicious file catch rate of over 99%, Threat Emulation provides our customers with the quickest protections against undiscovered malware in the industry’s most comprehensive, multi-layered security solution available.”

Among the 53,000 previously undiscovered malware threats, Check Point researchers recently published the discovery and analysis of a new malware variant designed to deliver the DarkComet remote access Trojan onto targeted systems. An EXE file hidden within a RAR archive file, this malware employed a sophisticated combination of obfuscation techniques to avoid detection by anti-malware solutions. At the time it was detected by Check Point’s Threat Emulation, this malware was not detected by any of the major anti-virus engines.

For more information on Check Point Threat Emulation Service or Private Cloud Emulation Appliance, visit: For additional information on threats detected by Threat Emulation, visit:

T-Systems promotes role of ICT in nation building

By admin, 29 marca, 2014, No Comment

“ICT has the potential to be far more than just a business enabler. In fact, technology in South Africa can be instrumental in nation-building. ”This is the view of Gert Schoonbee, Managing Director at T-Systems, speaking at The Human Capital Engine’s recent ‘Nation Building in SA’ Conference in Johannesburg. The event connected C-level executives from various local companies, and explored the evolving role of private enterprise in developing our country – 20 years after the birth of a democratic South Africa.

“You cannot talk about nation-building in the third person and remain authentic,” noted Schoonbee, explaining the details of T-Systems’ ‘nation-building’ programme within its 2000-employee South African division.

“We wanted to move past the fallacy that nation-building is something we as individuals cannot accomplish – that it can only be done only by heroic figures and icons. We wanted to illustrate that it affects us all, that it is not ‘something that needs to be done for someone else’.”

“T-Systems’ programmes have emphasised the nation-building efforts that can be done on an individual level, on a day-to-day basis. The vision is that T-Systems becomes a microcosm of the country we want to become”, he explained.

“Through its key accounts, the ICT company plays a critical role in areas such as ensuring well-functioning trade ports across South Africa’s coastline, providing high levels of electricity availability despite a tough operational climate, ensuring SA can transact with the world via sophisticated financial trading desks, and keeping production lines up and running for us to export goods.”

“All of these are, in essence, nation-building activities”, he said.

“Our cultural programme looks at these achievements and emphasises that staff are making a meaningful contribution to themselves, colleagues, customers, and then outside of the organisation: their families, communities, and the broader society at large”, noted Schoonbee.

However, change does not come easily. At T-Systems it began with breaking down some of the barriers between people. “We spend so much time at work, knowing each other, but at the same time, not knowing each other,” said Schoonbee.

“Our values, beliefs and identity are a result of our entire lives: where we have come from and everything we’ve experienced. In order to truly trust someone and work together as one, we need to truly understand that person.”

In October this year, when the new Broad Based Black Economic Empowerment Codes come into effect, the spotlight will once again be directed at issues of transformation. But Schoonbee believes that if we define transformation as simply ‘adhering to these codes’, we are not grasping the issue fully.

Transformation is about being instrumental in building a nation for those around us, transforming people’s lives through our actions, he continued.

With this in mind, the new culture of T-Systems actively seeks ways to do this. From its learnership programme that’s trained over 1500 people in recent years (many of which went on to formal internships and ultimately permanent positions within the organisation), to its Digital Learning Centre in the small rural town of Hazyview in Mpumalanga, nation-building remains at the heart of activities.

“This is a continual journey,” Schoonbee concludes, “We need to keep working on it, and find strength and energy from each other – but so far, the change has been incredible.”

T-Systems is a finalist in the the 13th Annual Oliver Empowerment Awards in the category Skills Development for organisations with a turnover of over R1 billion as well as Enterprise & Supplier Development category.

Instantly share live video between multiple broadcast facilities with the TVU Grid from GIT

By admin, 29 marca, 2014, No Comment

As the world becomes increasingly globalised, the broadcast environment has become more complex. The need to distribute live footage across widely geographically spread environments and across both national and international borders, requires cost effective switching and distribution technology to route footage to multiple locations across countries and even the world. The TVU Grid, now available from Graphic Image Technologies (GIT), is the ideal solution to this challenge, simplifying workflows and processes and offering an easy to use, scalable technology ideal for network affiliates and station groups.

This scalable IP-video distribution and switching solution enables users to seamlessly share live video between multiple locations using existing network infrastructure, delivering low-latency and efficient bandwidth utilisation.

“Live video distribution can be a costly and complex exercise, and is heavily reliant on the ability to deliver footage in a timely fashion. IP networks have in the past been considered too unstable for this process, as latency has always been an issue. However, with the TVU Grid technology IP networks can effectively be used for broadcast quality video distribution. With just the click of a mouse, users can share their live footage as it happens, using IP networks, to one or more locations anywhere in the world,” says Mark Chertkow, Managing Director at GIT.

The TVU Grid is based on the same technology as the award-winning TVUPack portable cellular uplink transmitter and the TVU Transceiver and uses existing TVUPack and network infrastructure for maximum cost effectiveness. With Point-to-Point and Point-to-Multiple-Point functionality, TVU Grid gives stations the ability to take in video from the field via TVUPack or local live studio feeds, and simultaneously distribute the feed to other transceivers on the grid. The TVU Grid decodes video streams and then encodes the signal for distribution to one or more TVU Transceivers with no latency.

A user-friendly interface simplifies this distribution within the grid, with no additional network configuration required. A web-based Graphic User Interface (GUI) and thumbnail previews enable users to distribute video to the location of their choice on the fly, and a web-based administrator console allows for adjustments to access rights and preferences to be easily updated. Frame Accurate Switching functionality provides additional value, allowing users to instantly switch from one live transmission to another with no disruption or delay, providing seamless transition between multiple scenes originating from any location.

“The TVU Grid works within the broadcast organisation’s existing network infrastructure, using a combination of proprietary software and custom TVU Transceiver hardware to optimise video transmission for the highest quality on available bandwidth. The solution also offers low-cost scalability, enabling broadcast organisations to rapidly expand video distribution capabilities to multiple geographical locations. It is a powerful tool for sharing live video on the fly while maintaining low operational costs,” Chertkow concludes.

The TVU Grid solution is available immediately from GIT.

RS Components brings wireless connectivity to Raspberry Pi

By admin, 27 marca, 2014, No Comment

RS Components (RS), the trading brand of Electrocomponents plc (LSE:ECM), the world’s leading high service distributor of electronics and maintenance products, has added two wireless connectivity options to its growing portfolio of products based on the Raspberry Pi computer. The new modules are built using Wi-Fi and low power radio technology respectively and deliver wireless interface capability for applications requiring low cost, low power, small form factor solutions, such as mobile devices.

Raspberry Pi Wireless

Raspberry Pi Wireless

The first module provides high-speed Wi-Fi functionality compliant with the IEEE802.11b/g/n wireless protocol via a tiny adapter that plugs into the USB port on the Raspberry Pi. The adapter supports transmission rates of up to 150Mbps, which is ideal for large data transfer and three times faster than standard 11g connections. The smart adapter adjusts the transmission output according to the distance and CPU offload to achieve a reduction in power consumption of between 20% and 50% when the wireless function is idle. It can be configured using Wi-Fi Protected Setup (WPS) to provide a simple, secure wireless network.

The second module also features a USB wireless device offering ‘plug-and-play’ connection to the Raspberry Pi, but instead uses low power RF transceiver technology to provide a bi-directional link to any device supporting serial communications, for example another Raspberry Pi. Frequency, bandwidth, power output and data rates can be configured to allow multiple devices to communicate free from interference from each other and any other RF devices. The RF technology employed enables significantly greater range (up to 300m depending on the terrain) and lower power consumption than other wireless protocols such as Wi-Fi or Bluetooth. The host device can send and receive up to 180 Bytes of data per packet to other hosts within range, making it particularly useful for ‘sense and control’ applications. An integral SMA antenna is included. A kit variant of this product is also available, which contains dual rather than a single transceiver.

WD introduces first Thunderbolt-powered portable dual-drive

By admin, 27 marca, 2014, No Comment

My Passport Pro, Featuring Bus-Powered, User-Selectable RAID Storage in Capacities

WD, a Western Digital company, and world-leader in storage solutions for the connected life, has introduced My Passport Pro, the first portable, Thunderbolt-powered dual-drive solution, providing creative professionals and enthusiasts high performance and capacity in a truly mobile solution. For Mac systems, My Passport Pro has user-selectable RAID functionality to deliver needed performance for the most demanding applications in the field, without the need for power adapters or extra cables. My Passport Pro is available in 2 TB and 4 TB capacities.

“The only Thunderbolt dual-drive solution that’s bus-powered, WD’s My Passport Pro enhances the workflow of mobile creative professionals by providing fast transfers and data protection for the large amounts of digital content they generate outside the studio,” says Jim Welsh, executive vice president of branded products and worldwide sales, WD. “From photographers, videographers and musicians to graphic designers and architects, people who depend on portable storage for their livelihood will find My Passport Pro defines a new level of performance, reliability and especially portability.”

Says Anamika Budree, WD Branded Sales Manager – South Africa, “We are seeing a similar trend in the South African market. As the move to a more mobile environment gains traction locally, users increasingly require portable devices that can store huge amounts of data. WD is taking mobile storage to a new level with the My Passport Pro with added functionally and optimal speed, allowing users to access and transfer data at high speeds, making it the perfect companion for the creative professional on the go.“

“Thunderbolt technology makes new approaches possible for high-performance workflows,” says Jason Ziller, Intel’s Director of Thunderbolt Marketing. “By combining dual storage drives on a portable, bus-powered device, the My Passport Pro from WD is a uniquely powerful storage solution with high capacity for today’s demanding users.”

Directly powered via the integrated Thunderbolt cable — a design unique to WD — performance of My Passport Pro clocks in at speeds up to 233 MB/s, providing super-fast transfer, edit and backup capabilities. Another key feature of the dual-drive My Passport Pro is its user-selectable RAID function, which lets users choose data striping (RAID 0) for high performance or mirroring (RAID 1) for data redundancy, depending on the user’s needs. Superior to both FireWire 800 and USB 3.0, the integrated Thunderbolt technology of My Passport Pro makes video manipulation quick and easy—with the ability to copy a 22 GB high-definition video file in half the time typically required by a USB 3.0 drive working in RAID 0 format.

Consisting of two 2.5-inch hard drives housed in a sleek aluminium enclosure, My Passport Pro is thoroughly shock-tested for extra durability to perform reliably when working on the go.

Dell Advances Data Center Networking Fabrics and Control for SDN, NFV and Cloud Solutions

By admin, 27 marca, 2014, No Comment
  • New Dell Networking Z9500 Ethernet fabric switch – densest, highest performing fixed-form factor switch for scale-out data center and cloud workload designs
  • New Dell Active Fabric Controller – purpose-built software for zero-touch provisioning and orchestration of virtualized networking functions and services.
  • New Dell NFV efforts – takes leadership role in industry consortium and joins with industry partners to accelerate NFV adoption.

Dell has announced new networking solutions to help customers deliver faster results, maximize efficiency and modernize and transform operations in scale-out and cloud-based environments. New products introduced include the Dell Networking Z9500, the highest density, energy-efficient, and only pay-as-you grow 10/40 GbE data center core switch available today.

The new Active Fabric Controller and efforts to accelerate Network Functions Virtualization (NFV) solutions into the sector through industry consortiums and collaboration with industry partners such as Red Hat also can help customers transform and modernize data center infrastructures.

Dell is helping customers upgrade data center network architectures to meet new demands imposed by virtualization, changing traffic patterns, and the nature of today’s workload needs including cloud-based and “as-a-service” offerings. By using standards-based technologies, Dell delivers architectures that help advance legacy systems, prevent vendor lock-in penalties, and future proof infrastructure for an easier transition to software-defined networking (SDN), cloud-based services and emerging technology approaches such as NFV.

Dell Networking Z9500 – Addressing the Challenge of Cost-Effective Scaling
The Dell Networking Z9500 Fabric Switch is the highest-density fixed-form factor data center switch with a full suite of L2/L3 routing and switching protocols. The Dell Networking Z9500 switch is designed to address data center 10/40 GbE aggregation requirements through centralized core or distributed core architectures for high performance enterprise data centers, cloud computing, provider hosted data centers, and enterprise LAN cores. The Dell Networking Z9500 is ideal for workloads such as Web 2.0, high performance computing and virtualization.

  • Unmatched density/performance: The Z9500 switch delivers five times the density per RU and throughput of more than 10 Tbps with one half the latency compared to Dell’s previous generation switches
  • Ultimate flexibility: 3RU core switch with 132 40GbE ports and expandable to 528 10GbE ports
  • Scalability for today and tomorrow: Future ready scalability with ‘pay-as-you-go’ licensing for 36, 84, or 132 port SKUs in a fixed form factor switch to build fabrics for small scale data centers and increase fabric capacity as compute demand grows
  • Ideal for workloads including Web2.0, high-performance computing, and virtualization demanding flatter fabrics
  • Highly efficient: consumes half the power per port of leading competitors and tool-less Enterprise ReadyRails mounting kits reduce time and resource for efficient rack installation

Dell Active Fabric Controller – Making the OpenStack Connection
OpenStack and OpenFlow hold significant promise to advance the infrastructure economics, operational and technical capabilities of modern businesses. However, each can be highly complex and difficult for enterprise IT to adopt. What cloud administrators need is a way to simplify networking configurations while enhancing network functions for cloud-based services.

Dell Active Fabric Controller is a purpose-built SDN platform designed to simply and securely configure and deploy networking functionality in cloud and XaaS environments. Dell Active Fabric Controller is targeted for enterprise OpenStack deployments and as an optional component of Dell OpenStack-Powered cloud solutions. The update offers a single, integrated solution to provide on-demand virtualized network services to OpenStack with fully automated, unified lifecycle management of the physical infrastructure.

  • Simple operation and intelligent approach: Plug-n-Play networking solution optimized for cloud and application administrators; and works with OpenStack applications to deliver workload and policy awareness. Allows for insertion of service appliances including firewall, load balancing and wide area network optimization
  • Deliver customized policy: On-demand customized virtual fabrics that adapts whenever workloads are started, stopped or modified, enhancing the security, performance and efficiency for each application
  • Experience ultimate efficiency: Elastic, auto-adapting fabric services offer the ultimate efficiency in design, operations and application provisioning with automated lifecycle operations and self-service for centralized, fabric-wide visibility

From simple plug-and-play device discovery and provisioning, automated topology and forwarding optimization, fabric wide programmability and a simple operational lifecycle, Dell Active Fabric Controller offers a new vision for networking. Active Fabric Controller serves a fundamental building block on both enterprise control software as well as a key element of accelerating NFV deployments with its integration into OpenStack.

Dell NFV Efforts – Delivering Solutions and Accelerating Adoption
Dell is helping bring innovative NFV solutions to market by spearheading industry consortiums such as CloudNFV and collaborating with industry partners including Red Hat. Just as SDN is increasing network flexibility, reducing costs and driving efficiency within enterprise networks, NFV can equally transform the telecommunications industry by utilizing an open, disaggregated, cloud-based approach.

  • Dell, specifically Dell Research, recently took the leadership reins of CloudNFV, an industry consortium to develop, test and implement a cloud-based NFV model. To drive real, customer-tested-customer-validated solutions into the market, Dell and CloudNFV are working closely with telecommunications companies and standards groups like the European Telecommunications Standards Institute (ETSI) to demonstrate and perfect commercially viable, cloud-based NFV solutions. With the leadership of CloudNFV, Dell is continuing the company’s long history of championing open and standard solutions to provide customers with choice and consistency across multiple technologies.
  • Dell also recently extended its co-engineering agreement with Red Hat announced in December 2013 to include NFV and SDN solutions built specifically for the telecom segment.

CEOs accountable for enterprise architecture

By admin, 27 marca, 2014, No Comment

The importance of enterprise architecture as a strategic business capability, and even as a source of competitive advantage, is becoming increasingly well understood. It’s also been fuelled by King III and COBIT 5 making the CEO accountable for enterprise architecture.

Stuart Macgregor, CEO of Real IRM and The Open Group South Africa, discusses how a synergistic approach between corporate and IT governance, and enterprise architecture can increase an organisation’s value while reducing cost.
“The enterprise architecture process fuses the business model imperatives and the IT portfolio,” said Macgregor. “This provides vision alignment and a shared understanding of the business drivers behind technology initiatives, and how IT can enable new and possibly even disruptive business models.”

“Governance and organisational change leadership are fundamental in entrenching enterprise architecture into an organisation,” he added. “Without these, enterprise architecture will remain a theoretical concept that will fail to deliver the desired business benefits. This necessitates greater collaboration and cross-discipline understanding between the business process owners, strategic planning, compliance, audit, risk and security functions and the chief architect.”

On King III, Macgregor reiterated that good governance is essentially about effective leadership. “Responsible leaders direct company strategies and operations with a view to achieving sustainable economic, social and environmental performance,” he said. “Sustainability is the primary moral and economic imperative of the 21st century. It is one of the most important sources of both opportunities and risks for businesses.”

Macgregor noted that a recent King III survey indicated that most respondents believed that IT governance had improved the alignment of IT with the performance objectives of the business. “Effective IT governance is the single most important predictor of the value an organisation generates from IT,” he said.

COBIT, A governance and management framework for information and related technology, was designed to enable enterprises to create optimal value from information and technology by maintaining equilibrium between realising benefits, managing risk and balancing resources.

“With King III and COBIT as the drivers of increasing enterprise architecture adoption, top-performing companies are defining how they will do business and designing the processes and infrastructure critical to their current and future operations – the enterprise architecture. They have the ability to exploit their foundation, embedding new initiatives to make that foundation stronger, and using it as a competitive differentiator to grab hold of new business opportunities. What makes this capability a competitive advantage is that only a small percentage of companies do it well.”

Referring to TOGAF, the architecture framework developed by The Open Group to provide the methods and tools for assisting in the acceptance, production, use and maintenance of an enterprise architecture, Macgregor concluded that enterprise architecture enables alignment, integration, change and reduced time to market. “It does so by producing a future-state architecture that supports the requirements of the business strategy and external environmental factors, documentation of the present architecture, a gap analysis that identifies the shortfalls in the current state in terms of its ability to support strategy, and a roadmap to take the organisation from its current state into the future, desired state.”


Canon celebrates production of 250 million digital cameras

By admin, 27 marca, 2014, No Comment

Canon today announces that it has maintained the No. 1 volume share of sales worldwide within the interchangeable-lens digital camera[1] market for the 11th year running[1] – as well as achieving a new manufacturing milestone, with the production of the company’s compact and interchangeable-lens digital cameras surpassing 250 million units[1].

Amongst the products that contributed to these latest achievements is the EOS 70D, which includes Canon’s unique Dual Pixel CMOS AF technology, as well as Canon’s iconic IXUS range, featuring ground-breaking compact, stylish body designs that set the trend for compact digital cameras.

Since production of the company’s first digital camera in the mid-1990s, Canon has leveraged its heritage and expertise in order to stay on the forefront of technological development and become a world leader in imaging solutions. With a powerfulproduct line-up, recently bolstered by the company’s new flagship digital compact camera, the PowerShot G1 X Mark II, Canon continues to deliver the richest and most innovative products and services that support and empower people, from professional photographers to everyday snappers, to express their creative passion and make a visual record of their lives.

Kaspersky Lab security solution for Android outperforms competition in independent testing

By admin, 27 marca, 2014, No Comment

Kaspersky Lab’s mobile device security solution Kaspersky Internet Security for Android achieved the top score in an Android Malware Detection Test conducted in January 2014 by the independent organisation PC Security Labs (PCSL). Kaspersky Lab’s product blocked 99.9% of threats, while the average result for competitor solutions was 86.6%.

Android is the most popular operating system for mobile devices. According to Gartner*, in 2013, 78.4% of smartphones ran Android. The downside to the platform’s popularity is that it attracts cybercriminals; it was the target of 98% of all mobile malware programmes detected by Kaspersky Lab in 2013. Many of these malicious programmes are specifically designed to steal user’s money by sending text messages to premium-rate numbers, hijacking electronic account details, transferring money to cybercriminals, etc.

This situation is further complicated because more than half of mobile device owners neglect to install a security solution. These statistics were collected in a 2013 survey conducted jointly by B2B International and Kaspersky Lab.

To find out which security solutions best protect Android devices, PCSL tested 12 products from different vendors. They were pitted against a selection of 2,200+ malware samples. Kaspersky Internet Security for Android detected 99.909% of threats with no false positives. This was the best test result, matched by only one rival.

“As users keep increasing amounts of confidential information on their mobile devices, protection for smartphones and tablets is now essential. This is especially relevant to owners of Android devices – this platform is so popular that it has become the top target for cybercriminals,” said Oleg Ishanov, Director of Anti-Malware Research at Kaspersky Lab. “As PCSL’s testing has shown, Kaspersky Internet Security for Android provides reliable protection against malicious applications, many of which can inflict tangible damage to the user, including financial losses.”

Kaspersky Lab develops security solutions to protect both Android devices and those running other operating systems. In October 2013, the company released its free Kaspersky Safe Browser for the iOS operating system. This application safeguards users of Apple mobile devices from web pages with malicious and undesired content while browsing the net. In February 2014, Kaspersky Lab released a version of this programme for smartphones running Microsoft Windows Phone.


Taking your business online? Here are six risk assessment questions you need to ask

By admin, 27 marca, 2014, No Comment

By Brendon Williamson, general manager of business development at PayGate

Launching an online business, or taking an existing business online, requires a new set of skills for anyone who is used to a more traditional bricks-and-mortar retail environment. There are new ways to market, new ways to deliver your product – and new ways to ensure you don’t become the victim of thieves or fraudsters.

Whether you are an experienced online retailer or a relative novice, these are the questions you need to ask and answer to protect yourself from online fraud that could result in product loss or chargebacks:

1. Is my product physical or virtual?

Delivering a physical object – a book, a camera or a piece of jewellery – carries different risks from delivering a virtual product like music, software or airtime. Only when you understand the risks properly will you be able to develop effective protection. When there’s a physical product to deliver, you have more time and opportunities to check that your buyers are who they say they are.

2. How easy is my product to resell?

The easier it is to resell, the more tempting a target you will be. Electronic goods are among the most risky: They’re in great demand and their value is high, so they’re quick and lucrative for a fraudster to sell on before you ever discover they were bought with a stolen credit card. Things with lower value or more limited appeal are less vulnerable – it’s harder to sell on a book, a pot or an artwork.

3. How quickly is my product dispersed?

Fraudsters are attracted to products that are delivered quickly. Airtime, for example, is delivered in seconds, can be easily sold and is in high demand. Someone who buys it with stolen money can afford to sell it below market value, which makes it even easier to get rid of. Gift vouchers suffer from similar vulnerabilities.

4. Is the product easily transferable?

Is your product tied to a particular identity such as a name, an address, an ID number or a cellphone number? If not, as with the example of airtime above, it can easily be transferred from one person to another, and is another tempting target.

5. How well can you know your customer?

If you add anonymity of the buyer to a product that is valuable, quickly delivered, transferrable and easy to sell, you have an almost irresistible target. Customers may not like having to register before they can buy on your site, but it’s an essential protection. You may also want to limit the number or value of transaction for a new customer, or create a waiting period. This is also means repeat customers can enjoy extra benefits.

6. How much risk are you willing to accept?

You can’t eliminate risk – you can only manage. Once you have a good understanding of the risks your online business faces, you need to decide how much you are willing to accept. Every protection you create will cost money, inconvenience your customers or possibly both, so you can’t just lock it all down: You will need to choose wisely to suit the needs of your own operation.

Answering these questions is not always easy, so you’ll probably need to talk to experts. Your payment services provider should be your first port of call: They’re the ones with the experience, the knowledge and the contacts to advise you on what will work. And if they can’t deliver the advice you need, it may be time to change providers.


wielkoformatowe wydruki Lublin kolorowe kopiarki Warszawa wielkoformatowe skanowanie kolorowe skanowanie Lublin skanowanie lublin kopiarki warszawa serwis kopiarek convert Warszawa naprawa ksero Warszawa serwis niszczarek lublin niszczarki lublin naprawa niszczarek lublin