Blog

Reducing PCI Scope, What Makes Good Network Segmentation?

To reduce PCI Scope, all systems in your environment must be in scope and PCI and all PCI requirements should be applied to them.

Blog

Five Steps for Maintaining PCI Compliance in the Cloud

If your organization plans to store, process or transmit payment card information via the cloud, compliance with the PCI DSS is of particular concern. This article covers five key points provided by the PCI Security Standards Council.

Blog

Phishing: How to recognize an email scam and protect yourself

In this technological age, phishing — a form of hacking… Read more »

Blog

How to Find AWS and Azure Open Cloud Storage Areas

Many of us have periodically seen news stories involving the… Read more »

Blog

Three Tenets of Information Security

The CIA triad of confidentiality, integrity, and availability is at the heart of information security.

Blog

Why You Should Not Use an Admin Account

An account with administrative access has the power to make major changes to a system, good and bad. While an administrator would hopefully not do anything nefarious to his/her company’s systems purposefully, the act of using administrative accounts for daily activities can lead to just that.

Blog

6 Essential Steps for an Effective Cybersecurity Risk Assessment

How do you get a comprehensive evaluation of your company’s vulnerability level? And, where do you start? Let’s look at some answers to these questions using the NIST 800-30, as it outlines six steps for an effective cybersecurity risk assessment.

Blog

How to Choose a HITRUST Assessor

With so many firms now engaging and embracing the methodology,… Read more »

Blog

Shedding Light on Dark Web Monitoring

The dark web is a hive of cybercrime activity used… Read more »

Blog

First Look at PCI 4.0

After years in the making, the PCI Security Standards Council… Read more »