What Are the New PCI 3.0 Requirements?

GUEST BLOG By Sarah Morris, KirkpatrickPrice Are you aware of the changes to PCI 3.0? The Payment Card Industry (PCI) Council has developed new changes to the PCI DSS requirements by asking one question: What will improve payment security? While the core 12 security areas will remain the same, several new sub-requirements have been implemented … Read more

September 23: HIPAA Rules Kick in, Impacting Your Backup and Disaster Recovery Planning

By Jay Atkinson AIS Network CEO If you’re a company in the health care industry, you have just 47 days to get your act together on planning for IT disaster recovery. That’s right. Beginning Sept. 23, the HIPAA/HITECH rules governing protected health information (PHI) secure data backup and recovery will be enforced, and some businesses … Read more

The Pros and Cons of Social Media in the Workplace, Part 2

    GUEST BLOG By Daniel Dimov InfoSec Institute In Part I of this two-part blog exploring the pros and cons of social media in the workplace, I explored the advantages of restricting social media access for employees.  In this second part, we explore the disadvantages. Disadvantages of restricting social media access for employees There … Read more

The Pros and Cons of Social Media in the Workplace, Part 1

  GUEST BLOG By Daniel Dimov InfoSec Institute Employees using social networks such as Facebook and Google+ may not only waste a lot of their working time, but also spread viruses on their work computers. Due to this, some employers have implemented security systems designed to closely monitor or restrict, as needed, an employee’s access … Read more

Top 10 Security Risks Found by Your Auditor

Want to know the top 10 security risks at an organization? We strive to provide the proper assurance and resources to help our clients maintain security within their organization. Recently, we held a client webinar focused on the “Top 10 Security Risks” that your auditor finds during your auditing process. Below is a summary of … Read more

SharePoint 2010 Loopback Checking

By Terry Engelstad MCP, MCSE, CCNA, MCDBA, MCTS, MCITP AIS Network Operations Manager There is a security feature in Windows 2008 called Loopback Checking. It’s a security feature in IIS, which is a way of stopping some denial of service (DoS) attacks. Since SharePoint 2010 runs locally on the server, and accesses its own databases … Read more