by Omega | Mar 12, 2017 | PCI, PCI DSS, PCI DSS 3.2
We are now well into the year and spring is almost here. The nagging PCI compliance pain is starting to reappear. So, retailers: Where would you begin? Here’s a list of things that can help you check off some important milestones, but you need to get cracking...
by Omega | Nov 1, 2016 | Cyber Security, Data Breach, Data Security, Level 2, PCI, PCI DSS, PCI DSS 3.0, PCI DSS 3.2
“You don’t have to pay fees for non-compliance.” The above myth is touted by retailers resistant to Payment Card Industry’s compliance standards. This is a risky belief if put into practice. Retailers need to understand that they are...
by Omega | Jul 29, 2016 | Cyber Security, Data Breach, Data Security, Internal Vulnerability Scanning, Malware, Online Cloud Security, PCI, PCI DSS, PCI DSS 3.2, Security Strategist, Two-factor authentication
Data protection can be simple if the basics are covered first. A common error among retailers and business owners, is to overlook small security errors just because they appear insignificant. According to Verizon’s 2016 Data Breach Investigation Report, 17.7% of...
by Omega | Jul 21, 2016 | Cyber Security, Data Breach, Data Security, Disaster Recovery, Internal Vulnerability Scanning, Password Security, PCI DSS, PCI DSS 3.2, QSA, SAQ, Security Strategist, Systems Management
The best time for retailers to start a thorough data security process in their organizations is to jump right in, today. Do not wait for a letter from your acquiring bank or card company to begin. Hackers don’t wait around for the right time to exploit...
by Omega | Jul 15, 2016 | Internal Vulnerability Scanning, New Technology, PCI, PCI DSS, PCI DSS 3.2
Some merchants still believe that their Point-of-Sale (POS) vendor provides all the security they need to be Payment Card Industry (PCI) compliant. That would be an incorrect assumption. A POS vendor is required to be Payment Application (PA-DSS) compliant, but that...
by Omega | Jul 4, 2016 | PCI DSS, PCI DSS 3.2
Incident Response Plans are created with attention to specifics so they can be followed if and when a breach incident takes place. The idea behind a plan is not to have to think while it is being implemented. Omega ATC is thorough in creating these plans for our...