Rather than worrying about the new PCI requirements, you can prepare for PCI DSS 4.0 by focusing on your current PCI DSS compliance efforts and choosing to think of 4.0 as a timely addition that will provide more defenses against developing attack methods.
Contrary to popular belief, addressable does NOT mean optional.
The #1 most important piece of a data loss prevention method? An intrusion detection system.
Small businesses often find themselves caught between limited resources and the threat of cybersecurity breaches. To avoid a data breach, here are 7 common Mistakes in small businesses security.
To effectively protect your business, it's crucial to understand the various types of phishing tactics and how to prevent them.
How can you secure your organization without knowing how patient data travels?
Learn why restricting employee access to data helps protect your business.
See why you should comply with PCI DSS Requirement 7 and restrict employee access to sensitive data.
Depending on a few factors, cyber insurance premiums can cost from $650 to easily over $120,000 annually.
This post covers the General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA), as well as fees for data breaches, changes in privacy attitudes, and the future of the standards.
When those defaults aren’t changed, you give hackers Wonka’s Golden Ticket into your system.
If you don’t have a compelling business need to store PAN, don’t store it!
Fight against social engineering by providing proper regular staff training.
The top PCI DSS assessment failures haven’t changed in years.
A HIPAA document is more than a policy: it's proof you care about protecting patient data.
Biometrics more accurately associates a specific individual to a device or system.
On January 1, 2017, SHA-1 was officially no longer accepted by web browsers.
Find out some of the essentials to include in your incident response plan.
PCI Requirement 5 deals primarily with installing and maintaining an anti-malware software.
PCI Requirement 6 is all about regularly updating your systems.
Are you still using SSL encryption or TLS v1.0? If so, you’re putting your business at greater risk.
Find out more about the essentials of HIPAA Business Associate Agreements.
Fully understanding all the PHI you have, where it is stored, what processes touch it, and how it is used in your organization is critical to enabling a business to properly manage PHI.