Featured Blog

/

On January 22, 2013

Company best practices for bring-your-own-device (BYOD) to work

The last blog on this topic focused on threats of BYOD.  Here is a look at ways to avoid those threats.

  1. Shift ownership to employees and allow them to use the device and applications of their choice. Doing so will  hold them responsible for the authenticity of the applications and thei ...

    Read More
/

On January 15, 2013

A quick look at company best practices with BYOD

Let's look at the threats first.

  1. When mobile devices are attacked, often on the surface they look simple and easy to eliminate, but the proliferation to applications and web-services, is way deep.  
  2. Malware for mobile devices is way more scalable than malware that get into PCs ...

    Read More
/

On January 8, 2013

PCI compliance is not just about implementing the right technology

Compliance is not a one-time/one-step process. Continuous compliance is a whole lot more than just implementing the technology. It requires a serious program to be put in place with ongoing systems management and data security. The process is complicated if you allow it to be. The best way to de ...

Read More
/

On December 26, 2012

Cyber criminals are ubiquitous and managing cyber security is challenging

Let's begin with shopping.  With the holidays here and online shopping increasing exponentially every year, sites like Amazon or ebay are used heavily for credit card transactions. Security requirements are being followed but criminals are always looking for loopholes to get in and siphon personal ...

Read More
/

On November 12, 2012

Scanning for wireless rogue threats….requirements clarified

PCI DSS have updated the requirements as of June 30th of 2012. Now, there are 3 types of required scanning.  

  1. Internal Vulnerability
  2. External IP
  3. Wireless Rogue threat 
Here's are some tips on the wireless scanning you'd want to pay attention ...

Read More

Stay up to date with the latest from Omega