PCI Requirements Explained - PCI Requirement 1 - Defending the Wall
by Derek Morris on January 23, 2018 at 9:30 AM
This will be the first blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through the process of becoming compliance with the PCI Data Security Standard.
PCI Compliance Requirements – January 31st is Quickly Approaching
by Geoff Yeagley on January 16, 2018 at 9:30 AM
Back in April of 2016, the latest version of the PCI Data Security Standards, version 3.2, was released. This release brought many changes to the PCI compliance requirements from the previous version, many of which we outlined in our April 2016 webinar. That release was 21 months ago …
What is My Password? How About a Passphrase Instead?
by Ron Scarborough on January 4, 2018 at 9:15 AM
Recently I met with a doctor who had as much paper with fancy lettering framed on their wall as anyone person could want. With all that impressive education looking down upon me, I watched as the doctor fumbled through password attempt after password attempt until ultimately and predi …
PCI Compliance Checklist - A Tool to Help You Monitor Your Compliance
by Geoff Yeagley on November 16, 2017 at 9:49 AM
Let’s face it, achieving PCI Compliance can be challenging. However, maintaining compliance with the latest version of the PCI Data Security Standards can be even more difficult. As part of the PCI Compliance process, there are many different things that an organization must do throug …
Ransomware Examples - Locky is Back and Worse Than Ever!
by Geoff Yeagley on October 5, 2017 at 9:48 AM
For a period of about 18 months, Ransomware dominated the news related to information security. Companies of all sizes and verticals were under attack by cybercriminals that were looking to make a quick buck, or a lot of bucks in some cases. Then, all of the sudden, Ransomware sort of …
Bluetooth Security - What You Need to Know About the BlueBorne Attack
by Geoff Yeagley on September 20, 2017 at 9:00 AM
Think about how much we use Bluetooth daily. Whether we are connecting our smartphones to a wireless speaker, to our car to make handsfree calls or to our Apple Watch, we use Bluetooth on a very frequent basis. In the world of Information Security, the more you use something and the m …