Featured Blog

/

On November 19, 2013

PCI Compliance audit by a Qualified Security Assessor (QSA): what to expect, how to prepare, and what to keep track of?

The acronym ‘QSA’ and the term ‘audit’ evoke images associated with fear, anxiety, anger, confusion, expense, exhaustion, and the list can go on.  How about ‘hacker’ and the term ‘breach’?  Do they conjure up images related to nightmare, exposure, penalty, loss, downfall…?  < ...

Read More
/

On October 31, 2013

Omega stops at nothing to protect your data. On Halloween day, our Security Strategists go the entire mile.

Today, Brett the Red Ranger cam ...

Read More
/

On October 21, 2013

Another disastrous breach — Adobe suffered hacked source code along with loss of customer data

Adobe's breach was discovered earlier this month with about 3 million customers' data records and ColdFusion security source code stolen.  One of the reports on this breach says, "Adobe also confirmed attackers accessed the source code of an undetermined number of the company's software titles; its ...

Read More
/

On October 17, 2013

Managing the costs related to cybercrime. How do you cut back?

The more advanced the cybercrimes, the more sophisticated and expensive the tools used to prevent them.  Costs are also related to monies invested to discover the source of the attack, disruption of the attack to normal functioning of businesses and the aftermath expenses to remediate them.  Ther ...

Read More
/

On October 9, 2013

NACS 2013 Show, Atlanta: Invitation to meet with Omega’s Shekar Swamy

I will be at the NACS show from October 12-15 in Atlanta. I will be at the PCATS booth area. If you are attending this year’s NACS conference, I would like to meet with you.  There are sessions on ‘Big Data’, ‘BYOD’, and  ‘Avoiding Cybercrimes which are also areas of Omega ATC’s co ...

Read More

Stay up to date with the latest from Omega