Are you on track with your cyber threat defenses?

  • Team Omega
  • May 27, 2016

Cyber threatRetailers across the board are well-aware of cyber threat defenses needed to protect their stores. The question is if they are continuing to address all basic areas while also investing in preventing newer threats.

Here’s a short cyber threat defense checklist:

  1. Have you reduced open ports and services on internet-facing systems?
  2. Are you using next-generation firewall to control access to networks and cloud-based services?
  3. Have you eliminated unnecessary protocols and services running on endpoints, servers and internal systems?
  4. Are you enforcing access management policies?
  5. Are you monitoring privileged users?
  6. Are you following recommended policies and procedures for overall data security and not just to meet PCI requirements?
  7. Are you following password, remote control access and wireless security policies?
  8. Are you protecting your card holder data environment?
  9. Do you have enough protection from social media channels?
  10. How about firewall, antivirus, anti-malware, anti-spyware?
  11. Are you monitoring and logging every event/activity?
  12. Maintaining the logs for 365 days?
  13. Are you backing up to reclaim data in case of a disaster?

If you have answered these random questions that are crucial to cyber security positively, then it is a good start. However, more work is needed. Even if only some of the answers are ‘No’, start right away.

Contact Omega, we will help you.

For over 25 years, Omega has been helping retail chains in the US implement centrally managed retail systems and data security. OmegaSecure™, the private cloud, hosted data security solution is ideal for convenience stores, petroleum marketers, quick service restaurants, and specialty retailers. As a PCI Certified Managed Security Services Provider, Omega provides a comprehensive set of services including the Omega Appliance™ to monitor in-store data security, and the Omega Compliance Dashboard™ for tracking compliance status.

Source: 2016 cyber threat defense report.