There are two website prefixes: One shows the site you are on is secure (HTTPS), and the other does not (HTTP).
If businesses are determined to provide mobile solutions, it is their responsibility to educate themselves, ensure the security of the solution, and know the risk they’re taking upon themselves.
An example of insecure credit card number storage comes from one of our PCI assessors, where a company explained how they processed their credit cards.
Can customer service and front desk security co-exist?
Internet browsing on point-of-sale (POS) or property management machines that have the capability to take credit cards is a one-way ticket to data compromise.
The following guidance will help you understand the major steps involved in firewall configuration.
Like a security guard, firewalls control what goes in and what comes out.
Protect sensitive data from social engineering attacks.
This is our third study on stored, unencrypted card data. When compared to last year, the storage has actually decreased.
Front desk clerks are friendly…sometimes to a fault, but friendly doesn’t necessarily equal secure.
The HHS says shredding, burning, pulping, and pulverizing are the only way these records should be destroyed.
HIPAA includes many such acronyms, mostly security-related.
This blog covers the important changes from PCI DSS version 2.0 and 3.0.
Security doesn’t have to be expensive to be effective. Here are 10 tips for effective, reasonable security.
Attackers target organizations that utilize remote access applications.
Hackers bike around the city with their laptops in a discreet backpack (or strapped in a bike trailer) and search for unprotected wireless networks.
Employees who irresponsibly use social media can potentially invite some serious HIPAA violations.
Learn how you can reduce your liability by learning about the hazards of ‘unintended’ credit card storage.
Hackers are getting smarter than our automated detection tools.
These service guarantees exist to address the financial hardships your business might endure in the aftermath of a compromise.
There’s only one way to avoid leaving ten-second holes in security. Encrypt card data at the exact millisecond of collection.
Hopefully, you'll realize some actions you should take to ensure your own business’ security.
The best way to inspire better security practices is to show examples of true security blunders.
What happens when forensic investigators can’t find evidence of a compromise?