Blog

  • Five Cloud Security Concerns of 2019

    Five Cloud Security Concerns of 2019

    Cloud security concerns are headline topics heading into 2019 and beyond. That’s mostly because cloud computing and storage has grown exponentially in the past five years. It is no longer a debate of whether or not cloud computing is the future, but rather, how big and effective it will come become. In 2017, the cloud computing market was $153.5 billion. In 2018, it’s projected to be approximately $186.4 by Gartner Inc. That’s a 21% leap with SaaS, Amazon Web Services and Microsoft Azure being the three largest providers of cloud services.

    (more…)

  • What is PCI P2PE?

    What is PCI P2PE?

    Need for Payment Cardholder Data Protection

    There have been 2,216 confirmed data breaches in 2018. 76% of breaches were financially motivated. Cybercriminals are increasingly becoming more sophisticated. Data breach preparedness among the companies are at an alltime high. 324 data breaches involved stealing credit card data at the Point of Sale (POS) where card-present retail transactions are conducted. 414 credit card data breaches involved targeting payment web applications.

    There’s one common security vulnerability leading to these payment cardholder data breaches at the POS and within web applications: Lack of payment cardholder data encryption.

    PCI Point to Point Data Encryption (P2PE) to the rescue!

    (more…)

  • What Is The Enterprise Information Security Framework?

    What Is The Enterprise Information Security Framework?

    When it comes to cybersecurity for businesses, corporations, and enterprises, one thing is clear: you need a security strategy. With 71 percent of U.S. enterprises recently saying that they’ve suffered at least one data breach in their lifetime, it’s time to start thinking about adopting an information technology (IT) framework that can help prevent hackers from succeeding in the first place.

    Towards that end, 86 percent of U.S. organizations, companies, and enterprises say they plan to increase enterprise network security spending year over year. However, the question is no longer whether or not to dedicate significant resources to proactively addressing cybersecurity. Now, it’s a matter of adopting the right enterprise security architecture and framework that will be most effective in bolstering your cyber defenses across the board.

    Today, the Enterprise Information Security Framework (EISF), is one of the most widely adopted systems architecture and data handling frameworks for protecting large organizations against cyber attacks and security incidents. The EISF also serves to guide companies in terms of what to do during an attack to eliminate the threat, as well as afterward to restore systems and analyze how to prevent similar incidents in the future.

    Here, we’ll break down what the EISF is, and how it provides companies with a strategic way of enterprise security and protection.

    (more…)

  • Key Elements Of An Enterprise Information Security Policy

    Key Elements Of An Enterprise Information Security Policy

    No matter what business or industry you’re in, odds are that you’ll be a target for hackers and cybercriminals at some point in time. According to recent statistics from Accenture, there are over 130 large, enterprise-scale targeted cybersecurity breaches per year. And that number is growing at a rapid rate of 27 percent per year.

    That’s not to mention the cost of cyber incidents and attacks that enterprises incur year after year. The average cost of a malware attack to companies is $2.4 million, and costs an average of 50 days for companies to effectively address. Avoiding cyber attacks, and the damage and costs associated with them are why companies are wise to focus a significant portion of their IT budgets and resources on developing (and implementing) an Enterprise Information Security Policy (EISP).

    With the threats to enterprise cybersecurity growing at such a rapid pace, companies are now designing an enterprise information security program policy that serves to both minimize risk and help achieve key business goals and objectives.

    What is an EISP? And what are the specific elements of an enterprise security policy that’s in alignment with an organization’s overall vision and goals, but also provides concrete strategies and tactics to prevent (and respond to, if necessary) cyber incidents and attacks? Whether you’re deciding to implement an enterprise policy in cybersecurity for the first time, or update one that you already have, read on to find out how to improve your cybersecurity practices with our helpful guide to the elements you need to address.

    (more…)

  • What Is the Incident Management Life Cycle?

    What Is the Incident Management Life Cycle?

    Preparing for cyber incidents involves more than merely being ready to react
    to (and neutralize) a one-off cyber attack. It involves the ability to respond effectively, plan proactively, and to defend your critical systems and data assets. To get ahead of evolving threats, and to recover thoroughly when attacks do occur, you need to be familiar with the Cyber Incident Management Life Cycle.

    Cyber incidents can run the gamut, from a simple email phishing attack to sophisticated malware or ransomware. Organizations now are investing more than ever in cyber-incident and attack preparedness, with 74% of companies saying Best Practices for incident prevention are their number one cybersecurity priority, followed by compliance mandates at a close second. A major part of this investment in readiness is the Incident Management Lifecycle, which lays out a framework of event management and how companies should respond in the event of an attack, hack, or breach.

    But what exactly is the incident response lifecycle? What are the various stages in the life cycle of incident management, and what specific elements, steps, and processes do they entail?  Read on to learn about the incident management lifecycle process, and how it can be used to protect your business.

    (more…)

  • Best Practices for Testing Your Cyber Incident Response Plan

    Best Practices for Testing Your Cyber Incident Response Plan

    Although you might think that your cyber defenses are virtually impenetrable, every organization needs a plan just in case a cyber attack or breach does in fact happen. That’s exactly why you need to formulate, and continually test, a detailed cybersecurity incident response plan.

    (more…)

  • Navigating PCI DSS and the Cloud

    Navigating PCI DSS and the Cloud

    Cloud computing is an important resource for organizations of any size and has seen increasing use in recent years for payment processing. Despite the prevalence of moving cyberinfrastructure to a cloud environment, many organizations fail to properly assess how if and how they will be able to maintain compliance with the Payment Card Industry Data Security Standard (PCI DSS) when their cardholder data environment (CDE) exists entirely in the cloud. Understanding how to maintain PCI DSS compliance when utilizing cloud services is essential for the numerous modern organizations that rely on the scale and convenience that cloud services provide.

    In this article, we’ll break down some important considerations for organizations that are looking to maintain pci compliance storing credit card data in the cloud. In order to provide some context, we’ll outline what is cloud computing, what some of the advantages of cloud computing are, and explore some of the challenges of meeting the requirements of pci dss regulations when your CDE has either partially or fully cloud-based services.

    (more…)

  • What is a Token Service Provider?

    What is a Token Service Provider?

    When it comes to ensuring that only authorized personnel are allowed into systems remotely, one of the best ways is to use a token. When it comes to keeping Credit Card Holder Data protected, one of the best solutions is tokenization. Many options exist for token use as well as for tokenization. We will discuss the basics of tokens, tokenization, and token service providers (TSPs) below.

    (more…)

  • Upcoming PCI Programs And Changes

    Upcoming PCI Programs And Changes

    The Payment Card Industry Security Standards Council (PCI SSC) releases regular updates to existing programs and creates new programs on an ongoing basis as security needs change. Staying abreast of the changes to PCI programs is essential to maintaining PCI compliance over time. Understanding what new programs are being created and how those programs might affect your operations is also important, as the creation of new PCI programs can impact security implementations in a variety of ways.

    (more…)

  • California’s New Cybersecurity Regulations: Internet Of Things Law

    California’s New Cybersecurity Regulations: Internet Of Things Law

    What do smart fridges, helpful robots, and Amazon’s Alexa all have in common? — the Internet of Things (IoT). Even if you aren’t already well acquainted with the IoT, you have most likely heard it in passing. The IoT’s elusive and ever-changing manner makes the concept difficult to define. Likewise, many cyber experts explain it in a different way, a fact that slows legislation regarding IoT security. Yet, with Gartner Inc. estimating society will utilize 20.4 billion connected devices by 2020, it’s imperative that IoT security awareness increases. Did you know that California just passed an Internet of Things legislation to improve cybersecurity? Find out more with this helpful article.

    (more…)