Urgent Cisco Vulnerability Identified - What You Need To Know!
by Josh McDonald on January 31, 2018 at 12:21 PM
We know security is important to you and it has come to our attention there is a vulnerability affecting the Cisco ASA operating system, specifically the SSL VPN (CVE-2018-0101). The vulnerability allows an attacker to take remote control of the system and is very high risk. This vuln …
PCI Requirements Explained - PCI Requirement 1 - Defending the Wall
by Derek Morris on January 23, 2018 at 9:30 AM
This will be the first blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through the process of becoming compliance with the PCI Data Security Standard.
PCI Compliance Requirements – January 31st is Quickly Approaching
by Geoff Yeagley on January 16, 2018 at 9:30 AM
Back in April of 2016, the latest version of the PCI Data Security Standards, version 3.2, was released. This release brought many changes to the PCI compliance requirements from the previous version, many of which we outlined in our April 2016 webinar. That release was 21 months ago …
What is My Password? How About a Passphrase Instead?
by Ron Scarborough on January 4, 2018 at 9:15 AM
Recently I met with a doctor who had as much paper with fancy lettering framed on their wall as anyone person could want. With all that impressive education looking down upon me, I watched as the doctor fumbled through password attempt after password attempt until ultimately and predi …
PCI Compliance Checklist - A Tool to Help You Monitor Your Compliance
by Geoff Yeagley on November 16, 2017 at 9:49 AM
Let’s face it, achieving PCI Compliance can be challenging. However, maintaining compliance with the latest version of the PCI Data Security Standards can be even more difficult. As part of the PCI Compliance process, there are many different things that an organization must do throug …
Ransomware Examples - Locky is Back and Worse Than Ever!
by Geoff Yeagley on October 5, 2017 at 9:48 AM
For a period of about 18 months, Ransomware dominated the news related to information security. Companies of all sizes and verticals were under attack by cybercriminals that were looking to make a quick buck, or a lot of bucks in some cases. Then, all of the sudden, Ransomware sort of …