Etikett: Blog

  • Notes and thoughts around the gentle art of assessing ATMs

    Notes and thoughts around the gentle art of assessing ATMs

    As usual, preparation starts with defining how an ATM works in practice and what the critical components and interfaces are

  • PCI-DSS vs ISO 27001

    PCI-DSS vs ISO 27001

    The objective for both standards is to secure and manage company information, but they do so in different ways and to different extents.

  • Are you protecting your client data securely enough?

    Are you protecting your client data securely enough?

    If you’re a small to medium sized business do you have to meet as many requirements and jump through as many hoops as a large enterprise?

  • PCI DSS Cloud Hosting

    PCI DSS Cloud Hosting

    Outsourcing operations to a third party means that you share responsibility for reaching the requirements in PCI DSS. Read the our blog now.

  • Should you outsource?

    Should you outsource?

    You collect payment from your customers online and you know it’s your company’s responsibility to keep that information secure

  • Pedo mellon a minno, speak friend and enter

    Pedo mellon a minno, speak friend and enter

    How to create strong passwords and why that is so important! Much more on the blog, including if Moria’s door was well protected

  • Checklist: 7 Questions to ask potential hosting providers

    Checklist: 7 Questions to ask potential hosting providers

    When selecting a reliable, trusted PCI DSS cloud-hosting provider it is critical to understand and investigate the seven main areas outlined below so you can partner with confidence.

  • Which companies can benefit from using a WAF?

    Which companies can benefit from using a WAF?

    In the world of IT, there is a continuous game of cat and mouse between cyber criminals and companies. This is where a WAF comes in…

  • 5 tips for writing an Information Security Policy

    5 tips for writing an Information Security Policy

    5 tips for writing an Information Security Policy: It can be time consuming to create a policy. And there are a few things to keep in mind

  • How to implement a Log management system

    How to implement a Log management system

    Implementation of a log management system is not easy due to lack of project objectives & the preparatory activities that are its foundation