Featured Blog

/

On January 11, 2012

How can I tell if my network has been breached?

Read these seven telling signs. Look for clues like:

  • Your network shows signs of unknown traffic in the payment card environment or from store to headquarters locations
  • Unapproved and unknown software, files and devices installed in your network
  • Data that’s been inexp ...

    Read More
/

On January 7, 2012

Is tokenization same as encryption?

Tokenization is a jumble of unique symbols, alphanumeric characters or values replacing credit card numbers, randomly generated for a particular transaction carrying sensitive data and information within them.  The last 4 digits alone represent the actual credit card number.  Tokenization is ex ...

Read More
/

On January 3, 2012

Tips For Creating Secure Passwords (Part 1)

With the recent explosion of password cracking software in use today it is important to follow a few simple guidelines when creating passwords for accessing your various web sites and applications:

  1. Do not use personal information.  Using personal information provides too many clues for ha ...

    Read More
/

On December 26, 2011

Are error messages when installing antivirus programs causing you to think twice about their benefits?

Anti-virus softwares can be delicate and temperamental especially when there are two or more AV programs installed on one computer. Having two different AV programs installed simultaneously is a dog fight. Both AV programs will detect the other as malicious software and begin quarantining their fil ...

Read More
/

On December 20, 2011

Email Security. How to counter the never ending spam threats?

Spams are as threatening to network security as viruses entering your systems via Internet browsers.  Most users get a spam email or two at least per day.  If the spam filters are set low, it can go up to 50 or more spams a day.  Companies deploy several solutions to address this but there's alwa ...

Read More

Stay up to date with the latest from Omega