Many organizations segment their networks at their places of business today with one or more firewalls to reduce the number of devices in PCI scope. Often, they will move all their payment terminal devices onto one VLAN segment behind their existing store main firewall and leave all non-payment proc ...
Read MoreThe consumer marketplace has been rapidly changing with the entry of new wireless devices, and so are the needs to protect consumer information from leaking through these devices. PCI requirements and other security standards mandated by the government for wireless devices focus on vulnerability m ...
Read MoreSince Microsoft Windows systems seem to be the main target of breaches these days, it is easy to overlook very basic security settings on Linux systems that may be in use in your organization. Most Linux system sit on the very same LAN segment as the rest of your Windows and other critical system ...
Read MoreSecurely removing sensitive cardholder data can be performed in only a few steps. Many merchants believe that this process is difficult. The normal process consists of identifying card numbers, determining false positives, and eliminating or moving that sensitive information. However, the possibil ...
Read MoreAccording to various online sources, the 25 most common passwords divulged from the Read More