Stina Ehrensvard: How individual Internet users can secure their online identity, including email, social media accounts, and more in an easy and secure way

The majority of users are today aware that a computer connected to the Internet is vulnerable for malware and online hackers, but do not know that a smart phone or tablet suffers from the same security threats. According to Symantec, several millions of mobile users are likely to be affected by malware that can copy sensitive information accessed from a mobile device, including email, personal payment information, etc. To secure access to the mobile device and applications, security experts do not recommend static passwords or mobile authentication apps, but a separate hardware authentication token.My test storyThe majority of users are today aware that a computer connected to the Internet is vulnerable for malware and online hackers, but do not know that a smart phone or tablet suffers from the same security threats. According to Symantec, several millions of mobile users are likely to be affected by malware that can copy sensitive information accessed from a mobile device, including email, personal payment information, etc. To secure access to the mobile device and applications, security experts do not recommend static passwords or mobile authentication apps, but a separate hardware authentication token.

The Evolution of the Payment Processing Industry

Payment processing is very different for large corporations vs. small businesses; the main difference is the type of payment technology utilized. For a small business, a standard POS system or credit card terminal will often suffice. If the merchant accepts payments over the phone or online, a virtual terminal may also be required. For a large corporation, an integrated payment solution is often required.