cgcompliance - kn

Posts about:

IT Security (2)

CIA Triad and PCI Compliance—Building Great Security

Complying with the Payment Card Industry Data Security Standard (PCI DSS) ensures that you have taken the necessary safeguard to secure payment card data, and it should be a goal for your organization. However, PCI DSS compliance doesn't ensure that all data is secure—so it isn't a stopping point. Incorporating the CIA triad into your security strategy allows you to protect data holistically. 

Read More

When is a PCI Compliance Audit Required?

Unless you’ve been hiding inside a cave or stranded on a remote island somewhere in the middle of the ocean for the past decade, you are likely aware that the prevalence of cybersecurity attacks has increased exponentially. To ward off these attacks and ensure compliance with data privacy regulations, many businesses will conduct a PCI compliance audit. 

Read More

Cybersecurity Vulnerabilities in AWS You Should Know About

There is no denying that Amazon Web Services (AWS) is a popular choice among companies these days. Businesses like to store their data and run their operations through AWS because of the convenience and performance that its cloud-based storage and services provide. But the AWS IoT platform is not without risk. Researchers have identified cybersecurity vulnerabilities that could be compromised, potentially resulting in data breaches.

Read More

Everything You Need to Know About Secure Cloud Computing

So, you think your data is safe because you stored it “in the cloud”? If your company is amongst a majority of businesses who decide to transfer to the cloud, you might be wondering if you should still be concerned about secure cloud computing. On one hand, you would have lower costs, added control, and a higher level of protection against security breaches; on the other hand, you are not impenetrable or immune to cyberattacks. While some things become safer, there is a whole new set of concerns and security challenges presented once you move to the cloud.

Read More

What You Need to Know About PCI Levels and Requirements

Payment card data must be well-protected as damages from data breaches continue to mount. Merchants and service providers must meet the relevant PCI compliance requirements, depending on their PCI levels, to accept payment cards and to process, store, or handle payment card data in any way.

Read More

Types of PII and How to Keep it Safe

Media accounts of the theft of personally identifiable information by hackers seem to keep coming like a two-mile-long train—there just seems to be no end in sight. Understanding the different types of PII and what your business needs to do to protect customer data is critical. 

That’s because cyberthieves stand to make enormous amounts of money selling personal data in bulk on the black market.

Read More

Penetration Testing vs Vulnerability Scanning—Knowing the Differences

Understanding penetration testing versus vulnerability scanning and using them both properly will help your organization identify cybersecurity weaknesses and determine how likely they are to be exploited.

The average organization experienced more than 53,000 security incidents that compromised the integrity, confidentiality, or availability of information assets between November 2016 and October 2017, according to the 2018 Verizon Data Breach Investigations Report. Researchers confirmed 2,216 data breaches in which information was exposed to an unauthorized party during that same period.

Read More