by Omega | Jun 11, 2014 | Cyber Security, Data Breach, Data Security, Disaster Recovery, Level 2, PCI, Social Media, Wireless Security
Nationwide chain P.F. Chang’s China Bistro said today that it is investigating claims of a data breach involving credit and debit card data reportedly stolen from restaurant locations nationwide. On June 9, thousands of newly-stolen credit and debit cards went up for...
by Omega | Jun 10, 2014 | Cyber Security, Data Breach, Data Security, Level 2, QSA
There are enough horror stories floating around about experiences working with Qualified Security Assessors (QSAs) that retailers are wondering if hiring a Qualified Security Assessor (QSA) is really necessary to help their companies stay secure. Are QSAs there to...
by Omega | Jun 6, 2014 | Cyber Security, Data Breach, Data Security, Level 2, Online Cloud Security, PCI
Researchers Uncover Holes That Open Power Stations to Hacking An article on Wired from this morning reports, “a pair of researchers have uncovered more than two dozen vulnerabilities in products used in critical infrastructure systems that would allow attackers...
by Omega | May 22, 2014 | Cyber Security, Data Breach, Data Security, Disaster Recovery, Level 2, Online Cloud Security, PCI, PCI DSS 3.0, Systems Management, Wireless Security
PCI Compliance can be a hassle. However, the real issue to businesses and retailers centers on perception of expense. What is the cost of compliance and what do retailers truly get in return? To begin with, let’s unmask a few myths around PCI Compliance 1. PCI...
by Omega | May 9, 2014 | Cyber Security, Data Breach, Data Security, Level 2, Mobile Device Management - MDM, Online Cloud Security, PCI, Security Strategist, Systems Management, Wireless Security
APT is one of the most dangerous of threats. If they get into a system or network they establish a foothold and a base from where they latch onto other areas within the network. Once in, the gains are long-term for the hackers. Through this type of exploitation, the...
by Omega | May 8, 2014 | Cyber Security, Data Breach, Data Security, Disaster Recovery, Level 2, Social Media, Wireless Security
Here’s a brief summary of people and parts in a breach incident. The victim and the perpetrator It can be an individual or a business, either a Level 1 merchant or a Level 4 merchant. The threat could be from internal sources or from a group of hackers from...