logo

PCI DSS v3’s Number One Implementation Hurdle

Security for organizations dealing with credit cards often boils down to one thing; successful implementation of The Payment Card Industry Data Security Standard, better known as PCI DSS. From securing transactions to increasing customer confidence, PCI DSS compliance is a must in the modern economy. The PCI DSS standard version 3.0 requirements became effective January … Continued

Data Governance: The Key to Compliance

In a legislation-laden era, more and more organizations are falling under the mandates of governmental or industry regulation. The requirements can be complex and confusing, and it’s hard to know where to start in creating and enforcing policies that will keep your company in compliance, so many IT departments live in fear of the upcoming … Continued

Key Points for Good Disaster Recovery Planning

In some of the previous articles we’ve looked at disaster recovery planning, and I pointed out that there are four distinct areas of planning: mitigation planning response recovery We took a decent look at mitigation, which we said was eliminating or minimizing the impact of a threat. Now we’re one hundred percent into planning. Planning … Continued

How to Disable Inactive User Accounts Using PowerShell

Inactive Active Directory (AD) user accounts can pose a security risk to organizations, in situations such as when former employees still have active accounts months after leaving the company because HR failed to inform IT, or accounts might be created for a particular purpose but never deleted after the event. Whatever the reason for the … Continued

4 Ways to Avoid Malware Like Lenovo Superfish

PCs sold by Lenovo between September 2014 and January 2015 came pre-installed with Superfish VisualDiscovery, a piece of malware claiming to improve users’ Internet experience by adding visual results to Google search and other websites. But in reality, the main purpose of the software was to add third-party advertisements. Superfish installs its own Certification Authority … Continued