PCI DSS and the Internet of Things IoT | Blog Article
Articles, Blog

PCI DSS and the Internet of Things (IoT)

Lots of Internet-connected devices are available on the market and a popular theme now is devices to create a ‘smart home’, which includes smart door locks, surveillance/security cameras and heating control systems that can be monitored and controlled when you are away from the home.   This ability to remotely connect to and integrate devices […]

0 Shares
Ransomware – Did you update your incident response plan?
Articles

Ransomware – Did you update your incident response plan?

by Dr. Grigorios Fragkos, VP Cybersecurity At the beginning of 2016 we warned our readers about the increasing threat of ransomware and provided advice on having an incident response plan that is ready to face this emerging threat. Our article focused on tips related to prevention, response and evading extortion. If you did not have […]

0 Shares
Blog, Risk & Assurance

Ecommerce Security and PCI DSS compliance – Encouraging security awareness, Part 2

by Natasja Bolton, Acquirer Support Manager, Risk and Assurance Division In part 1 last week, I discussed how businesses may be putting themselves at risk by assuming that ‘PCI DSS compliant’ also meant secure, (for part 1 please click here).    Maybe what we should be doing is encouraging businesses to focus less on compliance as […]

0 Shares
Articles, Blog, Risk & Assurance

Understanding the significance of Operations Security (OPSEC) in a fast evolving threat landscape

by Dr. Grigorios Fragkos, Senior Information Security Consultant, SysnetLabs It is not the first time a military term is being used by the Information Security community in order to describe an Information Assurance process. Operations Security (OPSEC) is a military term referring to the protection of different types of unclassified information which could end up […]

0 Shares
Blog, Risk & Assurance

The LogJam attack vulnerability – what you need to know

Logjam attack, a vulnerability that affects a number of major protocols has been discovered. The bug relates to a weakness within a cryptographic algorithm that is used in most protocols (such as HTTPS, SSH, IPsec, SMTPS, etc.) it is possible for a Man-in-The-Middle (MiTM) attacker to read and modify any data passed over the affected encrypted communication.   […]

0 Shares