The last blog on this topic focused on threats of BYOD. Here is a look at ways to avoid those threats.
Let's look at the threats first.
Compliance is not a one-time/one-step process. Continuous compliance is a whole lot more than just implementing the technology. It requires a serious program to be put in place with ongoing systems management and data security. The process is complicated if you allow it to be. The best way to de ...
Read MoreLet's begin with shopping. With the holidays here and online shopping increasing exponentially every year, sites like Amazon or ebay are used heavily for credit card transactions. Security requirements are being followed but criminals are always looking for loopholes to get in and siphon personal ...
Read MorePCI DSS have updated the requirements as of June 30th of 2012. Now, there are 3 types of required scanning.