PCI Services Blog

5 tips to fortify the Human Firewall for Business IT

Posted by Richard Common on 13-Jan-2017 21:00:00

 

Read More

Topics: Security

What is a Human Firewall? and how it differs from a firewall appliance

Posted by Richard Common on 11-Jan-2017 13:06:38

Cyber attacks and breaches in data security and IT security happen almost every single day. Many presume that software gaps or technology mistakes wholly contribute to these attacks, but in reality, human mistakes contribute about 31% of these cyber breaches.

Read More

Topics: IT Services, Best Practice, Security

Held to Ransom Without a Masked Gunman in Sight

Posted by Richard Common on 23-Dec-2016 10:07:51

The new year is now upon us and even in the space of a 1-2 week holiday period, things have changed. New types of fraud will have been devised when everyone's guard is down.

Read More

Topics: IT Services Provider, Security

4 Ways to Safeguard your Business

Posted by Richard Common on 21-Dec-2016 13:21:19

We have solutions that can benefit your business. Here’s how:

  • Help protect sensitive info on mobile devices with built-in data encryption for data security. Make access easier and more secure with facial and fingerprint recognition. (Windows 10) Get up-to-date anti-malware protection and 247 incident response in the cloud. (Microsoft Office 365, Azure) Detect and alert security breaches early. Protect data sent in email by preventing actions like editing and copy-and-paste. (MS Enterprise Mobility Suite (EMS))
  • Get scalable, cost-effective backup in the cloud, with the ability to restore quickly, and up to 99 years of data retention for legal compliance. (Azure Backup) Keep your files synchronized across devices and access them anywhere, anytime, both online and offline. (OneDrive for Business) Automate Microsoft SQL Server database backups to the cloud. Encrypt backup files and restore to the cloud if needed. (Azure)
  • Get automated disaster recovery in the cloud without major capital expense. (Azure Site Recovery) Access your latest work even if you leave your laptop at home. (OneDrive for Business) Have confidence that a lost laptop is protected with built-in data encryption. (Windows 10 BitLocker) Remotely wipe business data from mobile devices. (Enterprise Mobility Suite)
  • Help ensure compliant behavior by getting an alert when sensitive info is about to be emailed. (Office 365 Data Loss Prevention) Use cloud services that are independently verified for compliance with a range of standards, such as ISO 27001, HIPAA and EU Model Clauses. (Azure, Office 365) Have confidence that Microsoft is continually working to help customers meet the latest industry and regional certifications.
Read More

Topics: Software, Security, Microsoft

What is Spear Phishing?

Posted by Richard Common on 20-Oct-2016 14:41:12

Spear phishing is a targeted email attack in which a hacker uses email to masquerade as someone the target knows and trusts.

Read More

Topics: Security

What is Social Engineering?

Posted by Richard Common on 18-Oct-2016 11:04:22

Social engineering happens when someone uses manipulation, influence or  reception to get another person to release information or to perform some sort of action that benefits a hacker.

Read More

Topics: Security

Leave a reply