Here’s PCI explained in 4 sections for easy consumption Though the Payment Card Industry Data Security Standards (or PCI DSS) applies to every merchant who accepts payment cards, many merchants lack a comprehensive understanding of what PCI is, or how it’s enforced. Unfortunately, this puts these folks at a serious disadvantage when it comes time..
Not that long ago, VoIP services were a new and revolutionary concept. Nowadays, internet-based voice communication is commonplace among SMBs, which means it’s time to turn our attention toward improving their security. Without a thorough understanding of what is needed to protect your VoIP systems, you could be vulnerable to cyberattacks. Let’s take a closer..
Your pharmacy data is secure, right? Including all your patients’ protected health information (PHI) and credit card information? Did your stomach just tighten and your heart start to beat against your chest because you just realized you can’t remember the last time you updated your antivirus? Let’s face it. We can put up all the..
Choosing a quality web hosting company is one of the toughest decisions. It becomes really difficult to pick a credible, fast, reliable and secured web hosting company especially for those who are new to online industry. It is essential to have a quality web hosting company for your website’s success to avoid any hosting problems..
WordPress update 4.5 “Coleman” named in honor of jazz saxophonist Coleman Hawkins, is available for download or update in your WordPress dashboard. New features in 4.5 help streamline your workflow, whether you’re writing or building your site. WordPress Update 4.5 “Coleman” Editing Improvements Inline Linking Stay focused on your writing with a less distracting interface..
WordPress is great for setting up a website quickly and easily. If you want to ensure that your WordPress services are secure, you are going to have to take some steps. WordPress prioritizes security and ensures that the people using their products do not face issues. There have been a few cases where some big..
Putting measures in place to protect your business is a work in progress. Whether it includes some of the topics I previously covered such as creating an inventory of key files or deciding which risks to retain, you can always learn new lessons and improve your practices. You’ll need a plan for continuous improvement. Technologies..
BRAND-NAME SOFTWARE BUGS with flashy public relations campaigns are commonplace since the Heartbleed vulnerability was announced in 2014 with a media-friendly name, logo, and web site. But another bug is on the horizon that is setting a new bar for brand-name bug disclosures. It’s called Badlock and it’s already receiving a lot of controversial attention,..
It’s still easy to sit back and say, “What’s the problem? I just won’t click any suspicious emails or visit any “not safe for work” websites…how on earth are these supposed hackers going to cause issues with my tiny widget business?” Read on… Six ways YOUR business may be targeted: Your internal and internet facing..
If the Target data breach has taught us anything, it’s that failing to protect customer privacy can result in serious fines and reputation issues. During the 2013 holiday season, Target confirmed publically that credit and debit card information for 40 million of its customers had been compromised (as well as email and mailing addresses for..