Etikett: Blog
-

Notes and thoughts around the gentle art of assessing ATMs
•
As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are
-

PCI-DSS vs ISO 27001
•
The objective for both standards is to secure and manage company information, but they do so in different ways and to different extents.
-

Are you protecting your client data securely enough?
•
If you’re a small to medium sized business do you have to meet as many requirements and jump through as many hoops as a large enterprise?
-

PCI DSS Cloud Hosting
•
Outsourcing operations to a third party means that you share responsibility for reaching the requirements in PCI DSS. Read the our blog now.
-

Should you outsource?
•
You collect payment from your customers online and you know it’s your company’s responsibility to keep that information secure
-

Pedo mellon a minno, speak friend and enter
•
How to create strong passwords and why that is so important! Much more on the blog, including if Moria’s door was well protected
-

Checklist: 7 Questions to ask potential hosting providers
•
When selecting a reliable, trusted PCI DSS cloud-hosting provider it is critical to understand and investigate the seven main areas outlined below so you can partner with confidence.
-

Which companies can benefit from using a WAF?
•
In the world of IT, there is a continuous game of cat and mouse between cyber criminals and companies. This is where a WAF comes in…
-

5 tips for writing an Information Security Policy
•
5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind
-

How to implement a Log management system
•
Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation