Featured Blog

/

On July 14, 2014

Cryptolocker: Learn how to avoid this intelligent malware.

Cryptolocker is an intelligent malware that encrypts user's files. A hacker charges a service fee for sending a code to the person who wants the fil ...

Read More
/

On April 4, 2014

How to ensure continuous compliance? Here are some suggestions.

Here are some points  from an article related to establishing an IT control framework. However, this is perfectly applicable for ensuring continuous compliance in retail security as well.  Some sensible high-lev ...

Read More
/

On March 24, 2014

“Data Vulnerability Can Undo Years of Brand Equity”, this sums it all up.

I read this story today on Adweek and the article sums it all up in the paragraph below. When it comes to data security, most companies are doing nothing, meaning absolutely nothing.  Omega ATC has been urging retailers to take some steps, at least the initial steps recommended to secure their dat ...

Read More
/

On March 12, 2014

PCI DSS 3.0 New requirements – Maintaining an inventory of system components in scope

This is a requirement for sub-control 2.4.  Inventory of systems refer to all hardware and software, virtual or physical within the cardholder data environment (CDE). This essentially means a list of all the hardware and software used, their purpose in being in the CDE, what they are and why they ...

Read More
/

On February 26, 2014

Verizon 2014 PCI Compliance Report – Major revelations and suggestions

The 2014 Verizon report indicates that 9 out of 10 failed their PCI DSS baseline assessment. Here are some excerpts from the report:

  • Organizations that are breached tend to be less compliant with PCI DSS than the average of organizations in our resear ...

    Read More

Stay up to date with the latest from Omega