Featured Blog

/

On September 30, 2011

Watch out for FakeAV!

FakeAV also known as Rogue Anti-Virus or ScareWare is a form of malware that warns users about threats on their system that don't actually exist.  It is engineered to sell an Anti-Virus product (sometimes a product that is completely ineffective) directly or take one to a site where they can buy A ...

Read More
/

On September 27, 2011

PCI and Your Linux Systems

Since Microsoft Windows systems seem to be the main target of breaches these days, it is easy to overlook very basic security settings on Linux systems that may be in use in your organization.  Most Linux system sit on the very same LAN segment as the rest of your Windows and other critical system ...

Read More
/

On September 23, 2011

Data Security and compliance gaps at your retail locations

Determining the compliance gaps at your business is one of the first steps to achieving compliance. Any of the following gaps in your store environment would mean your are NOT PCI compliant:

  • Unnecessary and vulnerable services not removed
  • Inadequate access controls and vulnerable ...

    Read More
/

On September 14, 2011

Can you control who should have your personal data?

When it comes to credit card misuse or breach, we refer to PCI compliance standards. When it comes to personal data breach, we go looking for data security and privacy protection laws. Nowadays our personal data has found its way to libraries, online retailers, airlines and every one in between. Of ...

Read More
/

On September 5, 2011

Differentiating between good, mediocre and bad security vendors

Retailers don't have a clue and it is indeed difficult to differentiate between vendors when everybody claims to be the best. Sometimes, security vendors take advantage of and get retailers precisely on their weak points. Not too many retailers understand what PCI compliance really means. Here is ...

Read More

Stay up to date with the latest from Omega