Results for the tag,

 

Information Security

Information Security: Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing.(Source: www.wisegeek.com)

An Introduction to becoming PCI Compliant


Section: Research
This white paper discusses the background of the Payment Card Industry Data Security Standard (PCI DSS), its commercial and technological implications. It includes a case study of implementing the PCI DSS Standard and how this experience could help you to reduce lead times, lower audit costs and reduce infrastructure expenditure for your own business’s PCI compliance programme. Every merchant that processes card payments and retains card payment d ...   read more

Join the Phishing Evolution - Online Fraud Report


Section: Research
Today, most Internet users have heard about phishing or have already been affected by phishing to some extent. And while the term phishing has been discussed since as early as 1996, the world has not been able to rid itself from this phenomenon. Phishing is still easily one of the top threats on the Internet; it's direct and indirect costs tax the global economy with billions of dollars in fraud losses every year. ...   read more

12 Steps to becoming PCI Compliant


Section: Articles
The Payment Card Industry Data Security Standard (abbreviated to PCI DSS or commonly, just PCI) is a set of 12 requirements designed to secure and protect customer payment data. These 12 requirements of PCI DSS compliance can be quite daunting for any merchant. These are listed below:   Build and Maintain a Secure Network  read more

The commercial implications of PCI


Section: Articles
Ultimately there is no escape from PCI. Whether you are a sophisticated multinational retailer or a small business that accepts card payments – online or offline, it is widely expected that much more rigorous enforcement will be commonplace from 2012.   Technologies and strategies for dealing with PCI are still catching up, although technolog ...   read more

What is PCI?


Section: Articles
Every merchant that processes card payments and retains card payment details must adopt the Payment Card Industry Data Security Standard (PCI DSS).  Failure to do so can result in merchants being subject to substantial fines, higher transaction costs or ultimately the suspension of banking facilities.   A single retailer, or merchant, can process millions payment card transactions each year. If an unauthorised route is found into that merchant’s ...   read more

ACTA May Never See Light of Day


Section: News
Neelie Kroes, Vice-President of the European Commission, has all but confirmed that the controversial anti-piracy bill ACTA may never see the light of day, and is unlikely to be passed as law. Kroes was speaking at Friday's Digital Agenda Internet Freedom Re:publica conference "The European public on the Net” in Berlin. In her speech, she outlined the benefits of a free and open web to innovation and said that we must "recognise rights and responsibilities online – for an online ...   read more

BYOD Security Incidents are Proving Costly to Business


Section: News
As BYOD becomes more widely accepted throughout corporations, information security has taken a huge hit. Check Point Software Technologies Ltd. published its second mobile security report last week  read more

Cisco Study finds Data Protection Biggest Cloud Worry


Section: News
Cisco have published the results of its 2012 Global Cloud Networking survey and has found data protection security is the toughest challenge IT Pros face during the cloud migration process. 72% of those asked said that data protection was their main concern, followed by reliability and availability of cloud applications (67%). The study, titled "Root Canal or Cloud Migration”, also found that more than a quarter of those asked offered the view that it would take longer to migrat ...   read more

Data encryption software to become ubiquitous


Section: News
Data encryption software is likely to become ubiquitous as information - including intellectual property and financial data - becomes a more valuable commodity, according to IT security expert Jeff Hudson. The chief executive officer of Venafi, which specialises in enterprise encryption and software certificate management, told Channel Pro that the read more

Disaster Recovery not just for Enterprises as Survey finds 58% SMB’s Lack Formal Recovery Plan


Section: News
A recent research by analysts Freeform Dynamics, on preparedness of SMBs for Disaster Management in Germany and UK find a formal plan for disaster recovery absent. This  highlights a compelling need for SMB’s to adopt quality Disaster Recovery Plans. Freeform Dynamics’ an analyst/research group, in association with Quest Software, surveyed IT decision-makers from160 small business on their preparedness to handle disasters at their organisation.  The survey found so ...   read more

EU gives seal of approval to new data encryption system


Section: News
The EU has approved new data encryption equipment designed by a Swedish firm, which bosses believe will put the country on the map as a hub for advanced security systems. Business Security has revealed that its SecuriVPN Arana - which has been developed alongside the Swedish Armed Forces and the Swedish Defense Materiel Administration - meets EU standards.In order to gain the accreditation, the system had to be tested by security authorities in two countries - Sweden and Holland. Chief e ...   read more

Facebook Team up with Security Vendors


Section: News
Facebook have teamed up with five leading anti-virus vendors to create Facebook Antivirus Marketplace in an attempt to slow the spread of malware around the site. Microsoft, McAfee, TrendMicro, Sophos and Symantec are the security firms involved and the new page offers cut price and free antivirus solutions to interested surfers. read more

F-Secure Mobile Threat Report Overview


Section: News
Security experts F-Secure Labs has released its Mobile Threat Report for the first quarter of 2012, which shows that the Android platform continues to be the most attacked in terms of malware, spyware and other threats. The popularity of Android has meant that, historically, we have seen a significant rise in the number of malicious apps developed for the platform. This shows no sign of slowing down as in Q1 of 2011 just 10 new threats were discovered and this number has almost ...   read more

LinkedIn to Increase Security


Section: News
Following the theft of over 6.5 million passwords last week, LinkedIn has confirmed that it has added an additional layer of security to its password database. The professional social network said that it has not as yet had any reports of any compromised accounts in the wake of the password theft and once more apologised for the breach. Yesterday, it was reported that the company are working with the FBI in order to investigate the matter further and find those responsible for t ...   read more

New Malware Ransoms PCs


Section: News
A new strain of malware has emerged which locks users out of their computers unless they pay a fine for accessing copyright protected material. The malicious software uses the Blackhole exploit kit, a popular tool for cybercriminals, which is often used in banking trojans. The malware targets security holes in browsers or third-party plugins such as Java and Adobe reader, which should be kept up-to-date at all times for this very reason. Infections often occur from visiting infe ...   read more

Security as a service to trend in 2012


Section: News
More small and medium-sized businesses (SMBs) will adopt security as a service (SaaS) solutions in the coming year as businesses demand more adaptability. According to IT research specialist Canalys, SaaS - not to be confused with software as a service - will begin to attract more customers because of its inherent flexibility.In its latest report, Canalys said: "From the SMB side, perceived cost savings will be the primary driver to switch to outsourced security."The firm added t ...   read more

Single set of cloud security guidelines unlikely


Section: News
A single set of cloud security guidelines for businesses in the UK is unlikely to be created and instead an accreditation process is likely to be put in place for firms offering the IT infrastructure solution. According to the National Technical Authority for Information Assurance - also known as the CESG - while a number of read more

Threat Report Shows Surge in Malicious Attacks


Section: News
The annual threat report from Symantec shows that whilst email spam dropped last year when compared to 2010, malicious attacks and malware have surged. The take down of the Rustock botnet has had a direct impact on spam and this saw the incidence of pharmaceutical spam fall from 74% in 2010 to 40% in 2011. The take down also showed an impact on the number of bot zombies, which fell from 4,500,000 to 3,065,030. However, this appeared to have absolutely no bearing on malware as un ...   read more

VMware Source Code Stolen and Published


Section: News
VMware have confirmed that source code posted online on 23rd April by hacker ‘Hardcore Charlie’ is VMware ESX source code from the 2003 to 2004 timeline. Whilst so far the hacker has only made one confirmed posting of the code, VMware has warned that there may be more to come and say they will keep customers updated. In a ...   read more

Website Survey Shows Many are Insecure


Section: News
A recent survey into the SSL security of the most popular websites has found that almost 52% of them are running compromised security protocols. The survey is the first in what will be an on-going project for the recently formed Trustworthy Internet Movement (TIM). The group are expected to eventually "name and shame” websites that do nothing to address the issue, forcing sites to ensure that their security is tight and up-to-date. The results of the survey will be ...   read more

1