Featured Blog

/

On January 18, 2016

Three cybercrime victims — you, your business, and your government. Simple steps to avoid being that victim.

Against individuals: The reason for this cybercrime attack is to get the person's bank information, personal physical health information, or hack the victim's computer for disseminating spam or ...

Read More
/

On January 13, 2016

A funny Whoops story at a networking designer/manufacturer company and also a huge security hole

Cisco password

Cisco Systems, Inc. announced they configured their servers wrongly by using a password that would prevent a ...

Read More
/

On December 30, 2015

Perform internal vulnerability scanning at multiple locations anytime without impacting your store activities

Omega Appliance Are data security measures like internal vulnerability scanning, network monitoring, and log collection from the cardholder data environment (CDE) becoming a challenge in your retail enviro ...

Read More
/

On December 30, 2015

Data breach: What happens to the stolen data? When will they be used?

breach Stolen data via a data breach can be used in a number of ways.  However, it is hard to predict when they will be used.  Here's a quick look at both. What is the data used for?

/

On December 4, 2015

Data security requirements for new small merchants

According to recent forensic investigations, small merchants remain targets of hackers who are attempting to compromise payment data. As part of an effort to secure the payment system and mitigate the risk of small merchant compromises, Visa is establishing requirements for U.S. and Canada acquirers ...

Read More

Stay up to date with the latest from Omega