FDUS - Associates, FDUS - Managers

How PCI DSS helps with information security policies

Defining, documenting and publishing clear guidelines on how data is managed is one of the most important steps in addressing risk of any business. Though the Payment Card Industry Data Security Standard (PCI DSS) can seem confusing, one of the main benefits is that it will protect payment card data, which is not only essential […]

0 Shares
FDUS - Associates, FDUS - Managers

Protecting card reading devices

Businesses that accept payment cards for goods or services are often targeted by criminals who will attempt to tamper or substitute their card reading device. Regular inspection of payment card terminals and PIN entry devices is one of the most effective ways that businesses can ensure that their devices are secure from tampering and substitution. […]

0 Shares
Creating a successful Merchant PCI DSS Compliance Management Program
FDUS - Associates, FDUS - Managers

Good security practices for the retail industry

When a data breach is reported in the media, more often than not it’s the well-known large companies that make the headlines. In reality cybercriminals are more successful in attacking smaller businesses. The reason for this is that smaller businesses often have fewer resources and as a result are less likely to have the latest […]

0 Shares
Ransomware – Steps that organisations and businesses need to take
FDUS - Associates, FDUS - Managers

What is information security?

Information security, otherwise known as infosec, is a series of strategies to manage and prevent the unauthorised access as well as the use, of physical and digital information. This also includes any modification, destruction or disruption to information.   Common threats to information security are identity theft, theft of intellectual property, theft or sabotage of […]

0 Shares
Data breach: Prepare your Business
FDUS - Associates, FDUS - Managers, Uncategorized

What is sensitive information?

Sensitive information is data that is required to be protected from being accessed by unauthorised parties. This is done as to safeguard the security and the privacy of an individual or organisation. The three main types of sensitive information that exist are: personal information, business information and classified information.   Personal Information Personal information is […]

0 Shares
FDUS - Managers

Securing your ecommerce website against attacks

With regular reports of cybercriminals stealing credit card data and other sensitive information it’s essential to protect your ecommerce website. A breach will not only cost a business in major fines but it will also affect customer trust. Therefore it’s imperative to know how to protect your ebusiness and your customer data. The following are a few […]

0 Shares
Keep your business safe from social engineering
Blog, FDUS - Managers, Uncategorized

Keep your business safe from social engineering

Social engineering, the act of psychologically manipulating a person to divulge confidential information or to carry out actions is becoming more common place.   Recently Indian police raided call centres and made arrests in which a large scale scam took place where the employees impersonated US Internal Revenue Service and other federal officials, demanding payments […]

0 Shares
Cyber crime - Protecting your business
Blog, FDUS - Associates, FDUS - Managers, Videos

Cyber crime – Protecting your business

Online commerce has created incredible new opportunities for businesses to market and sell services globally. Many businesses, in particular small to medium ones, often do not consider that they could be targeted by cyber crime. The reality, unfortunately is that small to medium businesses are now very much being targeted by cyber criminals as many are […]

0 Shares
Cybercrime is increasing – Preventative steps for businesses
Blog, FDUS - Managers

Cybercrime is increasing – Preventative steps for businesses

By Jason McWhirr, Information Security Consultant Globally, criminals are increasingly abandoning the more traditional approaches to crime. They are looking to the internet for their targets and using it as their preferred route to perpetrate criminal activity. The UK National Crime Agency’s Cyber Crime Assessment 2016 reports that cybercrime has now over taken traditional crime […]

0 Shares
Protecting cardholder data
Blog, FDUS - Associates, FDUS - Managers, Videos

Protecting cardholder data

If your organisation stores card data, you have an obligation under the Payment Card Industry Data Security Standard to protect it. Cardholder data is any information contained on a customers’ payment card. The primary account number or PAN, card security code, cardholder name and expiration date are printed on the front of the card and […]

0 Shares
10 common myths about the Payment Card Industry Data Security Standard
Blog, FDUS - Associates, FDUS - Managers, Risk & Assurance, Videos

10 common myths about the Payment Card Industry Data Security Standard

The Payment Card Industry Data Security Standard and its requirements can sometimes be misinterpreted and can seem complex, especially for smaller businesses. In the following video ’10 common myths about the Payment Card Industry Data Security Standard’ we dispel some of the common myths concerning PCI DSS.    

0 Shares
What's the real cost of a data breach?
Blog, FDUS - Associates, FDUS - Managers, Risk & Assurance, Videos

What’s the real cost of a data breach?

Research shows that the cost of non-compliance with the PCI DSS can be two and a half times more expensive than protecting your customer’s data.   Small merchants are often not safer than larger ones, in fact they are more likely to be targeted by data thieves due to not investing in the necessary resources. […]

0 Shares
Passwords and Passphrases
Blog, FDUS - Managers, Sysnet.air, Videos

Passwords and Passphrases

Passwords can unlock a wealth of information including your finances and your personal history. In business they can give unlimited access to company information and resources that can easily lead to a range of crimes and scams being perpetrated. Don’t be the weakest link – choose your password wisely.   Treat your password like your […]

0 Shares
PCI DSS compliance - Achieving and maintaining it
Blog, FDUS - Associates, FDUS - Managers, Videos

PCI DSS compliance – Achieving and maintaining it

Businesses that accept payment cards are required to be Payment Card Industry Data Security Standard (PCI DSS) compliant. Compliance is mandatory for any business that accepts payment cards. Even if a business only takes payment over the phone, uses a third party for all payment processing services and doesn’t retain any cardholder data, PCI DSS […]

0 Shares
Getting started with PCI DSS
Client Resources, FDUS - Associates, FDUS - Managers, Videos

Getting started with PCI DSS

Though the road to PCI compliance can at times feel daunting, getting started with the process and taking it step by step is often the best way to proceed. Achieving and maintaining compliance with the PCI Data Security Standard is an ongoing cycle with three distinct steps: Assess, Remediate and Report.   Remember that businesses […]

0 Shares
What is PCI DSS and why is it important?
Client Resources, FDUS - Associates, FDUS - Managers, Videos

What is PCI DSS and why is it important?

The Payment Card Industry Data Security Standard or PCI DSS for short is a compliance standard that defines data security requirements relating to the processing, storage or transmission of cardholder data.   The PCI DSS was founded in December 2004 by 5 major card brands – Visa, Mastercard, American Express, Discover and JCB. In 2006, the […]

0 Shares
Making customer data safe as houses
Blog, Client Resources, FDUS - Associates, FDUS - Managers, Videos

Making customer data safe as houses

All businesses that accept payment cards for goods or services, regardless of size, have important obligations that they must be aware of. Credit and debit card information is extremely valuable and businesses must therefore be aware that they are responsible for the security of this data, from the moment they take a card for payment […]

0 Shares