Cybersecurity Strategy and Essentials
Articles

Cybersecurity Strategy and Essentials

Cybersecurity becomes even more complicated in the context of today’s threat landscape, which is not only constantly changing, but is also expanding at an increasingly fast rate. This is the most problematic element of Cybersecurity; its evolution is so fast and unpredictable while the nature of the risks involved are constantly changing.   Managing security […]

0 Shares
Data breach: Prepare your Business
Blog, Fact Sheets, Uncategorized, Whitepapers

Data breach: Prepare your Business

The PCI DSS v3.2 Self-Assessment Questionnaires requires that all merchants have an Incident Response Plan, regardless of their size, volume of transactions or the extent to which they have outsourced the handling of payment card data. This is to make sure they can respond effectively in the event of a breach that could impact payment […]

0 Shares
Criminals aren’t just after payments data, they want a consumer’s identity
Articles, Blog

Criminals aren’t just after payments data, they want a consumer’s identity

By Jason McWhirr, Information Security Consultant It is commonplace for organisations to ask consumers to provide Personally Identifiable Information (PII) to prove identity, strengthen authentication mechanisms, and speed-up payments. Most organisations will have an identity profile of each of their consumers that incorporates PII data.   This includes common fields such as; address, date of […]

0 Shares
How PCI DSS builds layers of protection
Articles, Blog, Cyber Risk

How PCI DSS builds layers of protection

By Natasja Bolton, Acquirer Support Manager The primary objectives (or attributes) of security (whether that be ‘information security’ or more recently ‘cyber security’) are encompassed in the CIA triad: Confidentiality, Integrity and Availability which are defined as: Confidentiality: ensuring that information is accessible only to those authorised to have access Integrity: ensuring the accuracy and […]

0 Shares
It’s all in the details – successful campaign engagement
Articles, Blog, Infographics

It’s all in the details – successful campaign engagement

In our experience we have found that the devil is in the detail when it comes to successfully engaging customers with a multichannel campaign. Changes or alterations that could easily be viewed as minor can often dramatically improve engagement rates.   In the following infographic ‘Boost Your Campaign Engagement’ we examine the details that can […]

0 Shares
The rise of the (Chief) Data Protection Officer
Articles, Blog

The rise of the (Chief) Data Protection Officer

by Dr. Grigorios Fragkos, VP Cybersecurity Back in August 2015, Sysnet discussed the complexity of what the term CyberSecurity represents, especially in the context of today’s threat landscape. This complexity is not only constantly increasing but it is also expanding at an exponential rate. The risks involved demand constant attention and very good understanding of […]

0 Shares
Do your clients know their cardholder data environment?
Articles, Blog, Whitepapers

Do your clients know their cardholder data environment?

by Jason McWhirr, Information Security Consultant One of the most important (and underused) first steps for any business or service provider when undertaking PCI DSS is to understand how cardholder data is used within their organisation, its people, departments, and systems. Without first knowing this, it is impossible to know which parts of their organisation […]

0 Shares
Articles, Blog

Using data to build better relationships with your SMBs

Every engagement with a client provides an opportunity for you to strengthen your relationship with them. By ensuring that each contact makes them feel that they have a strong business partner that they can trust, rely on, and build their business with, you are fueling their loyalty and strengthening your customer relationship.   Conversely, each […]

0 Shares
Safe Harbour agreement ruled invalid – Part 2
Blog, Risk & Assurance

Safe Harbour agreement ruled invalid – Part 2

Last week we posted about the recent ruling by the European Court of Justice that deemed the Safe Harbour framework, in place to protect the security of European citizens’ data held in the US, invalid.   Amid the current environment of mass surveillance, brought to light by the revelations of Edward Snowden, MEPs supported by […]

0 Shares
Safe Harbour agreement ruled invalid - Part 1
Blog, Risk & Assurance

Safe Harbour agreement ruled invalid – Part 1

Safe Harbour agreement ruled invalid – Part 1 On Tuesday 6 October, the European Court of Justice ruled that the safe harbour agreement designed to ensure the security of EU citizens’ data was invalid. This is a judgement with far reaching consequences for businesses on both sides of the Atlantic.   The Safe Harbour agreement […]

0 Shares
Blog, Risk & Assurance

Legacy systems and data could be risking merchant compliance

by Natasja Bolton, Managing Information Security Consultant At Sysnet we often find that merchants are prepared to make changes to reduce the complexity or risk in how they handle and process cardholder data. They’ll consider new solutions to reduce their assessment scope or minimise their exposure to cardholder data, for example; outsourcing card handling to […]

0 Shares
Protecting cardholder data
Blog, FDUS - Associates, FDUS - Managers, Videos

Protecting cardholder data

If your organisation stores card data, you have an obligation under the Payment Card Industry Data Security Standard to protect it. Cardholder data is any information contained on a customers’ payment card. The primary account number or PAN, card security code, cardholder name and expiration date are printed on the front of the card and […]

0 Shares
What's the real cost of a data breach?
Blog, FDUS - Associates, FDUS - Managers, Risk & Assurance, Videos

What’s the real cost of a data breach?

Research shows that the cost of non-compliance with the PCI DSS can be two and a half times more expensive than protecting your customer’s data.   Small merchants are often not safer than larger ones, in fact they are more likely to be targeted by data thieves due to not investing in the necessary resources. […]

0 Shares
Making customer data safe as houses
Blog, Client Resources, FDUS - Associates, FDUS - Managers, Videos

Making customer data safe as houses

All businesses that accept payment cards for goods or services, regardless of size, have important obligations that they must be aware of. Credit and debit card information is extremely valuable and businesses must therefore be aware that they are responsible for the security of this data, from the moment they take a card for payment […]

0 Shares