p(35 to 39)
Is PCI compliance enough?
Many businesses erroneously believe that if they meet PCI compliance security standards they are sufficiently secure from all online cyberthreats. The simple fact is they are not.
PCI regulations are mostly focused on how you process and handle credit card data – but do not cover all aspects of security in your organization.
While there is overlap, we recommend using regular security audits to take a deeper look into securing your network. Most businesses typically need to conduct a network security audit at the same time they conduct a PCI audit – but be sure the company doing it is not just looking for PCI compliance but at your overall security plan.
Have questions about cyber security or some other IT-related issues?
Visit our website at WWW.IT management solutions.com and book your discovery call today
"Don't forget to like, subscribe, and share your thoughts in the comments – your support keeps our community thriving. Until next time, stay active and stay inspired!"
Don’t just close your browser! One quick step when using your online bank account
When accessing a banking site online or any other application containing sensitive data, make sure you log out of the site and then close your browser. If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background.
It’s super simple to keep this from happening with just one click: log out.
Have questions about cyber security or some other IT-related issues?
Visit our website at WWW.IT management solutions.com and book your discovery call today
"Don't forget to like, subscribe, and share your thoughts in the comments – your support keeps our community thriving. Until next time, stay active and stay inspired!"
Do you need an “incident response” plan?
An incident response plan is an organized approach to addressing the aftermath of a security breach, ransomware event or cyber-attack. Certain industries, like medical or financial institutions, require them.
But even if you’re not a big company, it’s best to have SOME idea of what you would do if a cyber-attack locked all your files or stole confidential information.
Things to consider when you’re planning:
An immediate response plan if you are ransomed or breached.
What to do when a laptop or other device is lost or stolen.
What insurance coverage do you have for such incidents?
An attorney who is prepared with an alert response for clients, employees, vendors and possibly even the media in case something happens.
A data-recovery plan for restoring your network from backups.
That’s where we are here to help! Give us a call and we’ll be glad to help you put together a cyber-response plan so you’re brilliantly prepared instead of caught completely off guard!
Have questions about cyber security or some other IT-related issues?
Visit our website at WWW.IT management solutions.com and book your discovery call today
.
"Don't forget to like, subscribe, and share your thoughts in the comments – your support keeps our community thriving. Until next time, stay active and stay inspired!"
Do you process credit cards?
Use this simple checklist to make sure you’re compliant
If you handle, process or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card Industry Data Security Standards. This is a set of Legal requirements you must abide by to maintain a secure environment. If you violate them, you will incur serious fines and fees.
Even if you don’t process many credit cards, you’re subject to these laws, and thinking you don’t process enough to matter or that “no one would care” is 100% wrong.
All it takes is an employee writing down a credit card number in an e-mail for you to get caught and face penalties and fines.
Getting compliant – or finding out if you ARE compliant – isn’t a simple matter I can outline in a 1-2-3-step checklist. It requires an assessment of your specific environment and how you handle credit card information.
If you’d like our assistance, give us a call to review how you are processing, handling and storing credit cards – the quick assessment is free to you!
Have questions about cyber security or some other IT-related issues?
Visit our website at WWW.IT management solutions.com and book your discovery call today
"Don't forget to like, subscribe, and share your thoughts in the comments – your support keeps our community thriving. Until next time, stay active and stay inspired!"
How to let visitors use your WiFi safely
If you have people who visit your office or home, make sure you have a guest WiFi access for them that is separated from your main WiFi access.
If you give guests your primary WiFi access, you’re practically opening the door for anyone to come in and steal data, infect your network and ransom you. After all, you don’t know if their PC or device is secure!
Your guests’ access needs to be completely isolated and segregated from your private network and each other (something we can do for you). Your guests should not be able to reach your internal computer network, credit card terminals or other network-connected devices.
Don’t know how to enable guest WiFi access? Give us a call and we’ll help you out.
Have questions about cyber security or some other IT-related issues?
Visit our website at WWW.IT management solutions.com and book your discovery call today
"Don't forget to like, subscribe, and share your thoughts in the comments – your support keeps our community thriving. Until next time, stay active and stay inspired!"
Comments
Post a Comment