For all its psychological manipulation, BEC is not necessarily sophisticated from a technical standpoint. Most BEC attacks originate from spear phishing or spoofing an internal email account. They can be prevented or detected via IT controls such as application-based multi-factor authentication (MFA) and virtual private networks (VPNs). Another effective anti-BEC approach is to use encryption to authenticate emails and allow users to safely exchange data. Encryption software translates the data into the code for transmitting over a network. The transmission is unintelligible without a ‘public key’ to decrypt the data.
5. Optimize accounting systems and controls
We, ITreader, and our publishing partners, Clients, affiliates, or analytics or service providers, use technologies such as cookies, beacons, tags, and scripts, to analyze trends, administer websites, track users’ movements around websites, and to gather demographic information about our user base as a whole. We may receive reports based on the use of these technologies by these companies on an individual and aggregated basis. As to information submitted to, through or on our website, we may likewise use service providers to host content, host or implement blogs and forums, or conduct data and marketing analytics with respect to information captured.
ITreader may use a variety of technologies, including “cookies” that automatically or passively collect information from your computer, mobile device or other technology, when you visit ITreader, partner or Client websites. We may also collect information in this way on a third party’s behalf when we serve advertisements and store your Personal Data in log files. Information collected may include your IP address, browser type, operating system, your responses to advertisements delivered by us, date and time, referring URLs and other information normally transmitted in HTTP requests (“Usage Information”).
Usage Information may also be associated with anonymous business profile information about you, such as your industry, company size, and job title. The purpose of this information is to keep the Platform updated and interesting to our users and to tailor content to each individual’s interests. ITreader does not use this information to discern your identity or to disclose your identity to any third party. ITreader stores Personal Data in a separate database from any Usage Information.
A cookie is a small file stored on a user’s device containing information about the user. We may use cookies to reduce or pre-populate registration fields so that you can receive free content more easily, deliver targeted advertising, or understand your interests and focus areas of research. We believe this enables us to provide users with a more meaningful online experience.
We use Local Storage Objects (“LSOs”) such as Flash to store content information and preferences. Third parties with whom we partner to provide certain features on our site or to display advertising based upon your web browsing activity also use LSOs such as HTML5 and Flash to collect and store information. Various browsers may offer their own management tools for removing HTML5 LSOs. To learn how to manage privacy and storage settings for Flash cookies click here:
https://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager.html#117118