1.888.749.9800

Monthly Archives: August 2014

6 Popular E-Commerce PCI DSS Compliance Myths Explained

by Daniel Humphries, Managing Editor for IT Security research firmSoftware AdviceAugust 27, 2014

PCI DSS compliance applies to any business that accepts credit cards, whether they’re e-commerce or physical merchants. After all, just because your storefront is made of pixels and not brick-and-mortar doesn’t mean the PCI council is any less interested in how […]

By |August 28th, 2014|News & Events, PCI Compliance|Comments Off on 6 Popular E-Commerce PCI DSS Compliance Myths Explained

Surviving a Breach

The Target breach is making many in the IT security field take a closer look at their company’s information security and compliance practices. I’d like to share here some of the questions and answers from a recent media interview looking at “How to Survive a Breach.”

1. Are most companies prepared for a cyber breach?

We find […]

By |August 28th, 2014|Blog, PCI Compliance, Penetration Testing|Comments Off on Surviving a Breach
  • Permalink Gallery

    Don’t Forget the Basics to Protect Against Security Threats and Your Online Reputation

Don’t Forget the Basics to Protect Against Security Threats and Your Online Reputation

Jessica Merritt of Online Reputation Management  recently asked the question —  what are the biggest security threats facing companies today and how do they have the potential to effect reputation? In her article – click here – she identifies 9 tips to protect against security threats and compromised reputations. While one of my tips was included in her […]

By |August 13th, 2014|Blog, Penetration Testing|Comments Off on Don’t Forget the Basics to Protect Against Security Threats and Your Online Reputation

7 Security Tips for Mobile Users

Joe Stangarone, writer,  MRCs Cup of Joe Blog, August 12, 2014

Summary: As smartphone usage grows in the business, many users still don’t understand proper security practices. If not addressed, this problem could put their (and your company’s) sensitive data at risk. Learn how your users can better protect themselves from mobile security […]

By |August 13th, 2014|News & Events, Penetration Testing|Comments Off on 7 Security Tips for Mobile Users
  • Permalink Gallery

    Expert Recommendations for Protecting Your Company from a Cyber Attack — and a Compromised Reputation

Expert Recommendations for Protecting Your Company from a Cyber Attack — and a Compromised Reputation

Online Reputation Management — Jessica Merritt, August 2014

With such serious security risks threatening every organization’s reputation, it’s clear that companies can benefit from tight security. And we’ve seen that even companies like Target that may think they have security under control still have serious room for improvement. How do security experts recommend that companies protect […]

By |August 13th, 2014|News & Events, Penetration Testing|Comments Off on Expert Recommendations for Protecting Your Company from a Cyber Attack — and a Compromised Reputation

Will security problems kill the cloud as we know it?

The cloud is here to stay. The industry continues to strive for understanding of the myriad of security concerns and develop methodologies for evaluating the risks. Existing, mature, security frameworks continue to provide a strong basis for evaluating the risk but there are a small number of additional issues that should be evaluated when performing an assessment.

When making a […]

By |August 6th, 2014|Blog, ISO 27002|Comments Off on Will security problems kill the cloud as we know it?