1.888.749.9800

News & Events

  • Permalink Gallery

    An Expert Guide to Securing Sensitive Data: 34 Experts Reveal the Biggest Mistakes Companies Make with Data Security

An Expert Guide to Securing Sensitive Data: 34 Experts Reveal the Biggest Mistakes Companies Make with Data Security

Digital Guardian, October, 8, 2014

“The #1 biggest mistake companies make when it comes to securing sensitive data”

Keeping sensitive information secure from theft and vulnerability in today’s digital world isn’t as easy as putting a lock on the file cabinet – especially with the widespread adoption of cloud computing. And […]

By |October 9th, 2014|News & Events, Penetration Testing|Comments Off on An Expert Guide to Securing Sensitive Data: 34 Experts Reveal the Biggest Mistakes Companies Make with Data Security

7 more security tips for mobile users (Part II)

Joe Stangarone, writer,  MRCs Cup of Joe Blog, September 9, 2014

Summary: Users have notoriously bad security habits. The problem is, many of these users are now bringing their personal devices–and their poor security habits–into the workplace. Learn how these users can better protect themselves (and your data) with these simple tips.

By |September 9th, 2014|News & Events, Penetration Testing|Comments Off on 7 more security tips for mobile users (Part II)

6 Popular E-Commerce PCI DSS Compliance Myths Explained

by Daniel Humphries, Managing Editor for IT Security research firmSoftware AdviceAugust 27, 2014

PCI DSS compliance applies to any business that accepts credit cards, whether they’re e-commerce or physical merchants. After all, just because your storefront is made of pixels and not brick-and-mortar doesn’t mean the PCI council is any less interested in how […]

By |August 28th, 2014|News & Events, PCI Compliance|Comments Off on 6 Popular E-Commerce PCI DSS Compliance Myths Explained

7 Security Tips for Mobile Users

Joe Stangarone, writer,  MRCs Cup of Joe Blog, August 12, 2014

Summary: As smartphone usage grows in the business, many users still don’t understand proper security practices. If not addressed, this problem could put their (and your company’s) sensitive data at risk. Learn how your users can better protect themselves from mobile security […]

By |August 13th, 2014|News & Events, Penetration Testing|Comments Off on 7 Security Tips for Mobile Users
  • Permalink Gallery

    Expert Recommendations for Protecting Your Company from a Cyber Attack — and a Compromised Reputation

Expert Recommendations for Protecting Your Company from a Cyber Attack — and a Compromised Reputation

Online Reputation Management — Jessica Merritt, August 2014

With such serious security risks threatening every organization’s reputation, it’s clear that companies can benefit from tight security. And we’ve seen that even companies like Target that may think they have security under control still have serious room for improvement. How do security experts recommend that companies protect […]

By |August 13th, 2014|News & Events, Penetration Testing|Comments Off on Expert Recommendations for Protecting Your Company from a Cyber Attack — and a Compromised Reputation

How to know your software vendor is serious about security

by Sue Poremba, Central Desktop, June 2014

According to a recent survey by Bitglass, more than half of large companies and a third of SMBs are avoiding cloud adoption. The reason is simple: companies of all sizes are not convinced the cloud is secure.

“Concerns about security are not only not decreasing; they’re increasing. A previous report from October 2011 indicated […]

By |June 24th, 2014|News & Events, Penetration Testing|Comments Off on How to know your software vendor is serious about security

10 ways to strengthen web application security

Joe Stangarone, writer,  MRCs Cup of Joe Blog, June 17, 2014

Summary: A recent study find that 96% of all web applications contain at least one ‘serious vulnerability.’ As cyber attacks rise, how can your company better protect your web applications and confidential data from a security breach?

Target. . . . Ebay. . . . Monsanto.

What do those companies have […]

By |June 17th, 2014|News & Events, Penetration Testing|Comments Off on 10 ways to strengthen web application security

How to Avoid the Seven Deadly Sins of PCI DSS Failure

by Daniel Humphries, Managing Editor IT Security at Software AdviceMay 30, 2014

If you’re reading this, then you probably already know that PCI DSS stands for the Payment Card Industry Data Security Standard: a set of compliance regulations applying to every business that accepts, processes, stores or transmits credit card data.

PCI compliance regulations (mandated by the Payment Card Security Standards Council) are so detailed […]

By |June 2nd, 2014|News & Events, PCI Compliance|Comments Off on How to Avoid the Seven Deadly Sins of PCI DSS Failure
  • Permalink Gallery

    Hybrid strategies common as organizations strive for cloud GRC

Hybrid strategies common as organizations strive for cloud GRC

By Christine Parizo, contributing writer, SearchCompliance – TechTarget         May 14, 2014

Businesses large and small have moved significant chunks of their operations into the cloud, enticed by its flexibility and easy access. But the cloud also opens up businesses to data security and compliance vulnerabilities.

Letting governance, risk management and compliance (GRC) fall by the wayside isn’t an option […]

By |May 18th, 2014|News & Events|Comments Off on Hybrid strategies common as organizations strive for cloud GRC
  • Permalink Gallery

    The ‘Heartbleed’ bug has e-retailers’ hearts racing with anxiety

The ‘Heartbleed’ bug has e-retailers’ hearts racing with anxiety

By Thad Rueter,  Senior Editor,  InternetRETAILER,  April 9, 2014

The flaw could help hackers steal information, including credit card numbers and personal consumer data, from inside servers that operate e-commerce sites. But patches and other steps could help web merchants reduce any risk of fraud, experts say.

Big, huge, deeply worrying—but certainly not catastrophic if the right […]

By |April 28th, 2014|News & Events|Comments Off on The ‘Heartbleed’ bug has e-retailers’ hearts racing with anxiety

The Heartbleed Bug — Commentary by Paul Hill

by Cooper Smith – Business Insider

A major flaw in the popular OpenSSL software library, which many Internet companies use to encrypt sensitive data, could leave online shoppers vulnerable to credit card theft. “Potentially everything is at risk,” said Paul Hill, a senior consultant at SystemExperts, IT compliance and security consultancy. After learning about the bug, Amazon, eBay, Etsy, and other […]

By |April 23rd, 2014|News & Events|Comments Off on The Heartbleed Bug — Commentary by Paul Hill
  • Permalink Gallery

    Privilege creep: Do your employees have more IT access than they need?

Privilege creep: Do your employees have more IT access than they need?

By James Ritchie

As employees move up and around in your organization, they likely end up with more responsibility, more influence — and more access to your IT infrastructure.

The phenomenon is known as privilege creep. As people switch roles in a company, they get login or admin privileges for new systems while retaining access to old ones. It leaves your […]

By |April 8th, 2014|News & Events|Comments Off on Privilege creep: Do your employees have more IT access than they need?

BYOD Security: Getting Employees to Buy In

By Sue Marquette Poremba

Do you have a Bring Your Own Device (BYOD) security policy in place for your company? If you do, your employees may not be too happy about it: A recent report by technology research firm Gartner found that one-fifth of BYOD policies fail because employees find the rules too restrictive and don’t bother to follow them.

BYOD gives […]

By |April 7th, 2014|BYOD, News & Events|Comments Off on BYOD Security: Getting Employees to Buy In
  • Permalink Gallery

    Accepting Credit Cards? PCI Compliance a Concern for Small Businesses

Accepting Credit Cards? PCI Compliance a Concern for Small Businesses

Recent breaches against major retailers have put payment card industry (PCI) regulations in the spotlight. However, it isn’t only big companies that need to worry about adhering to these regulations. The rules apply to every business that relies on credit and debit cards for transactions. Even if your business employs four people and it […]

By |March 25th, 2014|News & Events, PCI Compliance|Comments Off on Accepting Credit Cards? PCI Compliance a Concern for Small Businesses
  • Permalink Gallery

    Accepting Credit Cards? PCI Compliance a Concern For Small Businesses

Accepting Credit Cards? PCI Compliance a Concern For Small Businesses

Sue Marquette Poremba, Business News Daily Contributor   |   March 20, 2014 12:59pm ET

Recent breaches against major retailers have put payment card industry (PCI) regulations in the spotlight. However, it isn’t only big companies that need to worry about adhering to these regulations. The rules apply to every business that relies on credit and debit cards for transactions. Even if your […]

By |March 21st, 2014|News & Events, PCI Compliance|Comments Off on Accepting Credit Cards? PCI Compliance a Concern For Small Businesses