Don’t Just Check Cybersecurity Compliance Boxes

Have you heard this claim before? Working on just PCI compliance is not enough! What about the 109 pages of compliance checks in V3.1 of the PCI DSS Standards(Payment Card Industry – Data Security Standard)¹ document is lacking in Cybersecurity? There are 12 sections in the document: Firewall installation and configuration, roles of network admins, paperwork and … Read more

What Will It Take for Some to Pay More Attention to Cybersecurity?

We have  had some challenging situations in Cybersecurity in the last 2 years (2014-15), But since we are so focused on the here and now, if it is not happening to you does it really affect you? Let’s review a few of the most egregious offenders and the problems they had:   Target¹ – malware on Point … Read more

Is Your IT System Low Hanging Fruit For Criminal Hackers?

A couple of questions come mind:  How can the Criminal Hacker tell if my system is weak and thus “Low hanging fruit” What will the criminal hacker do with my systems? How much do you REALLY trust your situation? Criminals have ways of finding your weaknesses – if you have one they will find it. … Read more