Concerned about meeting the NEW evolving PCI DSS v4.0.1 requirements? LEARN MORE

Featured Blog

/

On February 16, 2012

Anytime something fails in your data security process, stop, learn, correct and never makes those mistakes again

Compliance is a continuous journey.  Even after painful attention to details, things can go wrong.  But, not letting it happen again is key.  There is just no room for mistakes or repeats of the mistakes when it comes to data security.  It is necessary to make corrections and implement the chan ...

Read More
/

On January 20, 2012

Malware attacks and where to spot them in 2012

Focused and targeted attacks are expected to rise in 2012. Large corporations, financial institutions such as banks are likely to be targeted for non-financial information, with repurposed malware applications. Mozilla Firefox users are encourged to keep up with the install updates to prevent attack ...

Read More
/

On November 16, 2011

Protect your wireless network from security breaches before wireless hackers dip into your data and your pocket

According to the 2007 report "Calculating the Cost of a Security Breach," a security breach can cost between $90 and $305 per record. And according to 2011 Verizon Data Breach Investigations Report, there were more cyber security breaches in 2010 than any other year to date, with 92 percent of those ...

Read More
/

On November 4, 2011

Wireless devices and data security. Is your environment at risk?

The advent of new technologies are in pace with the needs of consumers for convenience and comfort.  How easy is it to work out of a hotel room in one of the advanced cities of Asia or Africa and send files for an early morning meeting in the U.S.?  The world is global indeed.  So, are the ri ...

Read More
/

On October 26, 2011

When the insidious ‘Morto Worm’ threats data security…

The Morto Worm very recently became the first worm to use a list of common ids and passwords to gain remote desktop access to Windows systems via the Windows remote desktop protocol (RDP) in order to spread itself. As soon as it gains access to a single system on your network, it replaces system co ...

Read More

Stay up to date with the latest from Omega