https://9p7pzq3jbl.execute-api.us-east-1.amazonaws.com/ProdStage Skip to main content
Publications
Advanced Search

View full metadata record

dc.titleCybersecurity Aspects of Commercial Message Distribution (SMS): Cybersecurity Best Practices
dc.contributor.authorIsrael National Cyber Directorate (INCD)
dc.contributor.orgunitInnovation in Citizen Services Division
dc.contributor.orgunitInstitutions for Development Sector
dc.coverageIsrael
dc.coverageLatin America
dc.date.available2024-11-04T00:11:00
dc.date.issue2024-11-04T00:11:00
dc.description.abstractThis document describes the main cybersecurity threats derived from distribution of commercial messages via text messages (SMS) and based on these offers a series of implementation recommendations and best practices to help organizations improve their internal processes associated with the transmission of informative material via text messages and minimize the risks related to this practice that can ultimately expose both the sending organization and recipients. This publication is part of the "Cybersecurity Best Practices" collection, a compendium of practices, methodologies and recommendations in cybersecurity oriented to organizations, developed by the Israel National Cyber Directorate (INCD), and adapted in this series by the Inter-American Development Bank (IDB), with the objective of facilitating access to this body of knowledge throughout the Latin American and Caribbean region.
dc.format.extent13
dc.identifier.doihttp://dx.doi.org/10.18235/0013234
dc.identifier.urlhttps://publications.iadb.org/publications/english/document/Cybersecurity-Aspects-of-Commercial-Message-Distribution-SMS-Cybersecurity-Best-Practices.pdf
dc.identifier.urlhttps://publications.iadb.org/publications/spanish/document/Aspectos-de-ciberseguridad-de-la-distribucion-de-publicidad-por-mensajes-de-texto-SMS.-Mejores-practicas-en-ciberseguridad.pdf
dc.language.isoen
dc.publisherInter-American Development Bank
dc.subjectFiscal Transparency
dc.subjectCybersecurity
dc.subjectBest Practices
dc.subjectCybercrime
dc.subjectService Provider
dc.subjectLabor Force
dc.subjectCyber Resilience
dc.subjectDigital Technology
dc.subjectDigital Transformation
dc.subjectInternet
dc.subjectCyberthreat
dc.subjectScience and Technology
dc.subjectCyberculture
dc.subjectPandemic
dc.subjectCybersecurity Policy
dc.subjectCybersecurity Capacity
dc.subjectBullying
dc.subject.jelcodeD82 - Asymmetric and Private Information • Mechanism Design
dc.subject.jelcodeK24 - Cyber Law
dc.subject.jelcodeL86 - Information and Internet Services • Computer Software
dc.subject.jelcodeL96 - Telecommunications
dc.subject.jelcodeM12 - Personnel Management • Executives; Executive Compensation
dc.subject.jelcodeM15 - IT Management
dc.subject.jelcodeO20 - Development Planning and Policy: General
dc.subject.jelcodeO21 - Planning Models • Planning Policy
dc.subject.jelcodeO33 - Technological Change: Choices and Consequences • Diffusion Processes
dc.subject.keywordscybersecurity;cyberspace;cyberattacks;cyberthreats;data protection;cybersecurity policies;information security;information systems;information technologies;IT management;text messages;SMS;phishing;smishing;spoofing;consumer protection;privacy protection;data privacy;information distribution;supply chain
idb.identifier.pubnumberIDB-LM-00692
idb.operationRG-T4010
Return to Publication