The Morto Worm very recently became the first worm to use a list of common ids and passwords to gain remote desktop access to Windows systems via the Windows remote desktop protocol (RDP) in order to spread itself. As soon as it gains access to a single system on your network, it replaces system co ...
Read MoreWhere would security fall when our data is in a shared space, when privacy is of great concern and breaches are occurring every day even in a secure network? Private clouds seem to be the answer. Private clouds sit in a public facility on a dedicated system with very specific service-level agre ...
Read MoreRecent articles on compliance from the 2011 Verizon Payment Card Industry Compliance Report and Read More
Many merchants have physical imprint devices to allow for transactions through the event of a power outage. While imprint receipts contain sensitive data, merchants using this form of a point-of-sale backup can still remain compliant. To comply with PCI DSS requirements, the merchant must maintain t ...
Read MoreIt sounds funny on a Dilbert comic for sure, but an element of compliance which is PCI DSS requirement 5, is to use and regularly update anti-virus software or programs ...
Read More