• A Day in the Life of a Consumer

    October 21, 2016
    Years ago, in a data security nightmare not so far away…I found out how quickly a brand could change from being a favorite of mine to becoming an entity I would never trust again.

  • Key takeaways from the presidential debate on cybersecurity.

    September 28, 2016
    ​The presidential debate, as entertaining as it was for many, was a great place to hear about the focus needed on cybersecurity issues in this country. Both candidates, Hilary Clinton and Donald Trump, were asked the following question on the topic of cybersecurity in the U.S:

  • IT Service Providers: Mind the Security Gap

    September 19, 2016
    Persistent threats affecting businesses of all sizes and in all verticals are becoming more consistent and hitting more frequently. The 2016 Verizon Data Breach report analyzed 100,000 incidents across industries and verticals, of which 3,141 were confirmed data breaches

  • Are there any weaknesses in your Point-of-Sale System?

    September 06, 2016
    News about a company being breached seems to be a regular occurrence nowadays. And it’s no wonder, with hackers getting more sophisticated and hungry for more.

  • Demystifying PCI Compliance

    August 30, 2016
    PCI compliance: that daunting phrase you always hear in the world of payments…but never truly understand. Well we’re here to sum it up for you—what it is, why it’s important and what you need to meet this standard.

  • RetailNOW Recap 2016: Security Top of Mind for Attendees

    August 10, 2016
    The event, aimed at connecting the point-of-sale (POS) technology ecosystem, was extremely successful because it gave us the perfect platform to further connect with our existing partners—and to meet and interact with industry leaders.

  • POS VARs -- Don’t be a Target!

    July 26, 2016
    When business owners start looking at Point-of-Sale (POS) systems, they may feel overwhelmed at the infinite amount of options they can find online. How does a business owner make a decision? How do they know it’s the right decision?

  • Is your brand truly secured?

    July 18, 2016
    So you have a big brand name that millions of consumers trust. You have hundreds to thousands of locations across the U.S…. and perhaps even globally. A big name means big money, so that huge chunk of change dedicated to security is definitely paying off in spades, right? All too often, the answer is a resounding “WRONG.”

  • 7 ways you can prevent credit card fraud when shopping!

    July 11, 2016
    We know how tempting those summer sales are! You can’t help buying another bathing suit or those pair of sunglasses just because they are 30% off this weekend only. I don’t blame you! But are you being careful on where you are swiping your card?

  • Do you know where your data is?

    July 05, 2016
    In this fifth article of the series, we continue to explore some of the basic ways that businesses of all sizes can keep their networks safer. These include tools you can implement on your own and understand why taking action is so important to the safety of your business. Today we will discuss the topic of data and ways to keep track of where sensitive data resides and where it is going.

  • Are you guilty of any of these PCI myths?

    June 27, 2016
    PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security standards designed to ensure all companies that process, store or transmit credit card information maintain a secure environment. 

  • What you should know about programs, ports and services

    June 17, 2016
    In this fourth article in the series, we continue to explore some of the basic ways that business of all sizes can keep their computer systems safer. We will discuss the topic of programs, ports and services.

  • 7 things you need to know about Anti-Virus protection.

    June 09, 2016
    On the last article of the Network Security Basic Training Series, we covered the perils of using remote access software. In this second article we will discuss the topic of anti-virus protection. There are many questions that come up when we talk about this topic. So here are a few answers to your questions.

  • The Perils of Using Remote Access Software

    June 02, 2016
    While software that can be installed on your PC and used to remotely connect when you are away from your home office can be very handy, it also comes with risks that may not be apparent at first.

  • Why is patching important to the security of your business?

    May 31, 2016
    In this series of articles, we will explore some of the basic ways that business of all sizes can keep their computer systems safer. While it is impossible to say that a system can never be breached, if you are not doing some of the basics to help protect your system and your data, then you are more likely to experience a breach. In this first article, we will discuss system and application patching.

  • Protecting your business from hacker’s attacks.

    May 20, 2016
    Last week we covered the main tools hackers are using to access businesses’ networks. As you learned, there are 3 items to focus on which caused most data breaches last year: vulnerabilities, phishing and weak credentials. Under these 3 focus points, we covered the 4 patterns of attack used by hackers, expanded on how dangerous these attacks are and how hackers are hurting your business. But did you know, many of these attacks can be prevented with a little help and knowledge? 

  • What tools are hackers using to access businesses’ networks?

    May 13, 2016
    On our previous post regarding what puts a business at risk of a data breach, we showed you that regardless of the business’ size, location or industry, many of them are targets to hackers. So how are hackers getting into these businesses’ networks and stealing data?

  • Is your business at risk of a data breach?

    May 06, 2016
    The 80 page 2016 Verizon Breach Investigation Report is packed with valuable insights that every business owner should be aware of to be inform about the dangers & effects of a data breach and prevent it too. We know time is valuable so we decided to save you some time and point out to you the 3 main topics you should understand from this report:

  • No Business is Too Small for Hackers!

    May 02, 2016
    It's National Small Business Week! Let's celebrate the hard work you do and make sure your business continues to grow. Have you ever thought about what would happen if your business is affected by a data breach? 

  • What you should know about PCI DSS 3.2

    April 26, 2016
    PCI DSS 3.2 is scheduled for release at the end of April. Have you thought about how this update can affect your business? Will you still be PCI compliant?

  • Your Best Defense Against Ransomware Might Be Your Employees

    April 20, 2016
    While your business’ data security program should consist of many components, perhaps the most effective defense to ransomware is building a culture of data security amongst your employees.

  • Just how dangerous is ransomware?

    April 06, 2016
    The word “ransomware” has been in the headlines quite a bit this year. The Institute for Critical Infrastructure Technology (ICIT) has even called 2016 the year of ransomware. Ransomware is a business’ worst nightmare. This malware infects computers and restricts the users from accessing any of their data until paying the ransom. 

  • Hungry…Hungry…HIPAA

    February 26, 2016
    I have fond memories of playing a board game called Hungry Hungry Hippos in my younger days.  Children would drop small white marbles onto a game board while furiously slamming their fists on a small, plastic, hippo-shaped lever. The hippos’ mouths would chomp at rapid speeds in attempts to capture as many marbles as humanly possible. 

    Today’s medical practices mirror the chaos of the game.

  • Mobile Tech in Healthcare Can Put Your Practice at Risk

    February 19, 2016

    While you focus on providing the best health service for your patients, it is easy to under-estimate the risks that you may be putting your practice should you implement mobile technology without basic security measures.

  • Pain-Free Data Security for Medical Offices

    January 26, 2016
    It’s understandable that the primary goal of any healthcare practice is to keep their patients healthy and safe. But what about keeping their patients’ data safe too? All too frequently, this responsibility is not given its appropriate attention, but with the data breaches headlines that healthcare made in 2015, we think it’s time they start making data security a priority.

  • 2015: “The Year of the Healthcare Hack"

    January 14, 2016

    2015 was a tough year for the healthcare industry. Some are even calling 2015 “the year of the healthcare hack”. Last year, over 65% of the data breaches occurred in the healthcare industry, it is safe to say that security should be a priority for 2016.

  • Shoppers Care If You've Been Breached!

    December 07, 2015
    It’s the holiday season and for many that means shopping season! But it also means that theft increases, whether it is physical theft or cyber theft.

  • Why Do Hackers Want Your Medical Records

    November 16, 2015
    2015 has been a year of healthcare data breaches. But why are hackers going after healthcare records now?

  • 6 Safe Computing Tips to Help Retailers Fight Off Hackers

    November 02, 2015
    Many small businesses believe only the "big guys" will suffer a data breach. But did you know that 90% of data breaches impact small merchants?

  • Cybersecurity Professionals

    October 26, 2015
    As data breaches occur more and more, it is no secret that the market needs more cybersecurity professionals. We would like to share with you a few statistics on the need to educate the next generation on pursuing cyber professional careers. The demand keeps on growing as more and more hacker threats occur.

  • The Evolution of the Hacker

    October 19, 2015
    Technology keeps improving, as do hackers. Hackers have been around for years and years; from exploiting the vulnerabilities of telephone lines to penetrating big retail stores' networks. As hackers get smarter, so do we at Netsurion.

  • The Ten Steps Post Data Breach

    October 12, 2015
    Have you ever considered what would happen if your business was breached? Do you have a plan of action? Netsurion has numerous PCI and Data Security experts on hand and can guide you in the steps that you should take in the event of a data breach.

  • Six Simple Rules For Safe Credit Card Handling

    October 05, 2015
    It is National Cybersecurity Awareness Month and we want consumers and your business to be protected from today’s security threats. Some of the biggest data breaches come from external threats. However, internal threats are just as dangerous and can be prevented too.

  • The Transition to EMV Isn't Over

    September 28, 2015
    Merchants know by now that after October 1st the liability for card-present fraud will shift to whichever party is the least EMV-compliant in a fraudulent transaction. This means that merchants will be more accountable if EMV is not implemented.

  • How Strong Are Your Passwords? Tips To Keep You Protected

    September 21, 2015
    Passwords keep your accounts and network safe but may also be a gateway for hackers. Below are tips that we recommend you use when creating your passwords.

  • Find Out Who Is Affected By A Data Breach?

    September 14, 2015
    The number of data breaches continues to increase. Cybercrime affects your brand, your customers and your employees in ways that are unrecoverable at times. Don't let your business be affected next.

  • Healthcare Practices are at Particularly High Risk of Data Breach

    September 10, 2015
    In 2015, the healthcare sector has been breached more than any other but one.

  • The Impact Of A Data Breach

    August 31, 2015
    What is the true cost of a data breach?

  • 4 Common Data Threats Every Business Needs to Be Aware Of

    August 24, 2015
    Four Common Data Threats

  • Netsurion Defense Against Backoff

    July 14, 2015
    Even with the rise in data breaches, Netsurion has remained successful in preventing data export, even before the Backoff threat was known and understood.

  • Wireless Security for Business

    June 08, 2015
    In today’s business world, a major draw for many customers is the ability to stay connected to the outside world while outside the office. Having access to the Internet is a must to accomplish this. In order to provide this connectivity, this typically means having a wireless network set up for your customers to use. However, it also means placing your business at a potential risk.

  • Six Simple Rules For Safe Credit Card Handling

    May 05, 2015
    It is becoming more and more frequent to read about credit card data breaches in the news these days. Unfortunately, what is not touched on as frequently as the numerous electronic threats are the physical security issues present in restaurant and retail establishments.

  • Make Your Wireless Work For You

    March 12, 2015
    You’re in the middle of a particularly busy day…barely able to keep up with your customers, and employees are unable to speak to a single guest long enough to tell them about the fantastic new items, products, or special offers.

  • Every Merchant Needs Electronic Data Protection in 2015

    February 19, 2015
    How many days go by between news stories involving computer breaches? In the last month alone, with the Sony breach fresh on everyones mind, Anthem Inc. announced that they lost 80 million records, Chick-fil-A announced that they were investigating a potential credit card security breach, and several Marriott locations managed by White Lodging (which already had a different incident in 2013), are looking into a newly reported credit card breach. If these were the only incidents, it would still be considered a huge amount.

  • State Sponsored Hacking – More Than an Issue for Sony

    January 14, 2015
    We live in a brave new world where the spies of yesteryear, like James Bond and Jason Bourne, are truly falling away into the realm of fantasy. These smooth operators have been replaced by the slightly awkward, pasty-faced, computer hacker, who can gather more data or do more damage with a keyboard than a field agent could ever hope to accomplish with a gun and some daring.

  • Five Steps to Protect Retailers from Credit Card Theft

    January 07, 2015
    The Georgia based fast food company, Chick-fil-A, has confirmed that it is investigating a potential credit card breach. The investigation is focused on the company’s point-of-sale (POS) network at some of its restaurants and the breach is thought to have occurred between December of 2013 and September of 2014.

  • Backoff Has Been Upgraded Harder to Detect

    November 07, 2014
    So when you are a hacker and you write the most successful financial transaction hacking software in history, what do you do next? Well, if your are the makers of Backoff, you upgrade it.

  • IT Community Shaken By Shellshock Vulnerabilities

    October 29, 2014
    In the wake of Heartbleed, comes a new form of exposure that could potentially do much more damage than any other vulnerability of its kind. It is known as Shellshock. Shellshock affects Linux and UNIX implementations that use the BASHcommand interpreter.

  • PCI 3.0 – A Wake Up Call for SAQ C Merchants

    September 29, 2014
    Most merchants who have been validating their PCI compliance for a few years now probably know which SAQ type applies to them. In PCI 2.0, it has been fairly simple. And now we are facing PCI 3.0.

  • Backoff Is the New Standard by Which Other Malware Will Be Judged

    August 25, 2014
    Every now and then hackers develop a piece of malware that is so insidious that it changes the landscape of computer security and acceptable practices. While there are many contenders for this dubious list, CodeRed, Zeus, and now Backoff are certainly worthy of inclusion.

  • Netsurion services and OpenSSL the Heartbleed issue

    April 11, 2014
    Many of our customers and resellers have asked how Heartbleed affected Netsurion services. In a nutshell, the managed services that make up our product offerings were not directly affected by Heartbleed.

  • Will CIO’s Be the Final Victim After a Breach

    March 12, 2014
    In the wake of their breach, Target announced on March 5, 2014 that their CIO, Beth Jacob was announcing her resignation. In December of 2013, Target announced to the public that it had been the victim of a cyber crime resulting in the loss of 40 Million credit cards and possibly as many as 70 million personal records of its customers.

  • There Is No Honor Among Thieves – Target Could Take Advantage of This

    February 17, 2014
    For the past several months, there have been numerous stories about major retailers that have been breached by hackers. The result is that millions of credit cards have been stolen. In the case of Target, so far it is reported that 40 Million customer credit cards have been exposed, and 70 Million total records with personal information have been stolen.

  • About the PCI Security Standards Council

    January 20, 2014
    The PCI Security Standards Council is an open global forum, launched in 2006, that is responsible for the development, management, education, and awareness of the PCI Security Standards, including the Data Security Standard (PCI DSS), Payment Application Data Security Standard (PA-DSS), and PIN Transaction Security (PTS) requirements.

  • Target Has A Bullseye On Its Chest

    January 13, 2014
    When Target announced that it had suffered a major breach of approximately 40 million credit cards and 70 million customer records, the nation as a whole took a collective gasp in shock. In the aftermath of the initial disclosure, the public then heard from Neiman Marcus that it too had suffered an electronic breach of data that may include credit cards.

  • Why Comply with PCI Security Standards

    January 01, 2014
    Why should you, as a merchant, comply with the PCI Security Standards? At first glance, especially if you are a smaller organization, it may seem like a lot of effort, and confusing to boot. But not only is compliance becoming increasingly important, it may not be the headache you expected.

  • Christmas-Kids and Hackers Love This Time of Year

    December 06, 2013
    When people think of Christmas, most of them imagine family gatherings and good times. We often forget that from the end of Thanksgiving to the beginning of the year, the U.S. spends billions of additional dollars on merchandise that otherwise would have stayed on the shelves. We sometimes forget that hackers love this season as well.

  • Thieves Tried to Steal Credit Cards from Nordstrom

    October 18, 2013
    The department store giant garnered unwanted attention earlier this month when they announced that a Florida store fell victim to a team of thieves who attached extremely small devices called key loggers in line with their keyboards where they plug into the registers.

  • PCI 3.0 Is Coming - Are You Ready?

    October 04, 2013
    It is important to remember the PCI is the minimum security that a merchant should put into place so that their customers’ credit cards are protected. Security should be viewed as any other company policy – you always need to run your business in a certain manner, not just during your validation efforts. If you integrate security into your regular business practices first, then you will find that PCI will naturally follow.

  • Can Your Point of Sale Be Compliant after the End of Microsoft XP?

    September 13, 2013
    From a PCI compliance standpoint, merchants using Windows XP will have problems maintaining compliance because they cannot keep their operating systems patched to protect themselves from the latest vulnerabilities. On the flip side, there are many Point of Sale (POS) software packages that have only been validated using Windows XP, and if another operating system is used instead, it will violate the official implementation guide (and thus fall out of compliance). Our customers have been asking us for guidance, so we did a little research.

  • Does Your Call for Help Bring Hackers to Your Door?

    July 19, 2013
    There is a new trend facing people who rely on help desks, like ours. Hackers have targeted help desks because they know that the people who provide you support have the access into your systems that they want to exploit.

  • Balancing Privacy and Security

    May 31, 2013
    In the wake of the most recent terrorist bombing in Boston, it is easy to understand why some people would be willing to sacrifice a few liberties to the government in favor of more security. A common train of thought is that an honest person does not have anything to hide, so the intrusion into our private lives is really a minor thing. In a Utopian society, I would tend to agree with that sentiment, but we live somewhere else.

  • Square Cash - A Money Transfer Game Changer?

    May 24, 2013
    Square strives to make financial transactions simple enough so that the average person on the street can participate. Before Square, a regular person without a bank supplied merchant account could not take credit cards. Today, Square allows everyone with a smart phone to accept credit cards, and now the company is focusing on another market – person to person cash payments.

  • Internet Explorer 8 - People Still Love It, But There’s a Problem

    April 26, 2013
    This type of issue with a browser is so damaging because computer hackers who take advantage of it, can execute malicious code on the affected machines without the user needing to download anything or without any indication that the machine has been compromised. All a user has to do to be infected is to go to a website that has a malicious script embedded on it, and viola you have been hacked!

  • Hackers May Just Look to Embarrass You

    March 29, 2013
    When you think about electronic security, what comes to mind? Do you consider how vulnerable your customer credit cards are, or how easily someone can break into your on-line bank account? These are the most profitable avenues of attack that thieves usually focus on, but occasionally, cybercriminals are motivated by something besides greed.

  • Universal Plug and Play - New Report on an Old Problem

    February 22, 2013
    In the dark ages of personal computers (1980′s and 90′s), you either needed to be a computer geek or have access to one if you wanted any device to work with your computer. You had to go through a complicated driver installation process, and possibly replace system files. My how the world has changed.

  • Do Hackers Fear U.S. Jails?

    January 18, 2013
    In what should only be considered a victory for the U.S. DOJ, 2 of the 4 alleged Subway hackers have been sentenced, and 1 of the remaining criminal’s trial is set to begin shortly. These men who perpetrated a sophisticated attack against the computers systems of the famous sandwich chain have been responsible for potentially $10 Million dollars in computer fraud, according to a press release from the U.S. Department of Justice.

Live support
We are sorry, but support is not available at the moment.