Technology has made our lives better. Technology has made adjusting the thermostat and turning the hot-water heater back to normal temperature as you board the plane to come back home from vacation very convenient and efficient.
WELCOME TO OUR BLOG
Passwords and management of those passwords are a big pain – no two ways around it. One website requires a symbol, another requires 14 characters and your bank requires 10 characters, four PIN numbers and the answer to a secret question. It becomes easy to just use the same three or four passwords for everything – after all, that’s more secure than one password for everything, right?
"Is my PCI compliance good enough to serve as a network cybersecurity audit?"
We often get asked if an organization has passed their PCI compliance requirements for accepting credit cards; is there really a need for more security and compliance? It's very possible you do. Keep in mind that PCI is focused on protecting credit card data specifically, and most organizations touch sensitive data that goes beyond credit cards. Was that considered when you did your PCI review?
The time to start planning for a security threat is BEFORE a cyber-attack occurs…not during! Cyber-security planning should be done continuously, especially as your organization changes.
By proactively planning and adjusting, you can reduce the risk of significant consequences from technology incidents.