October 21, 2016Years ago, in a data security nightmare not so far away…I found out how quickly a brand could change from being a favorite of mine to becoming an entity I would never trust again.
September 28, 2016The presidential debate, as entertaining as it was for many, was a great place to hear about the focus needed on cybersecurity issues in this country. Both candidates, Hilary Clinton and Donald Trump, were asked the following question on the topic of cybersecurity in the U.S:
September 19, 2016Persistent threats affecting businesses of all sizes and in all verticals are becoming more consistent and hitting more frequently. The 2016 Verizon Data Breach report analyzed 100,000 incidents across industries and verticals, of which 3,141 were confirmed data breaches
September 06, 2016News about a company being breached seems to be a regular occurrence nowadays. And it’s no wonder, with hackers getting more sophisticated and hungry for more.
August 30, 2016PCI compliance: that daunting phrase you always hear in the world of payments…but never truly understand. Well we’re here to sum it up for you—what it is, why it’s important and what you need to meet this standard.
August 10, 2016The event, aimed at connecting the point-of-sale (POS) technology ecosystem, was extremely successful because it gave us the perfect platform to further connect with our existing partners—and to meet and interact with industry leaders.
July 26, 2016When business owners start looking at Point-of-Sale (POS) systems, they may feel overwhelmed at the infinite amount of options they can find online. How does a business owner make a decision? How do they know it’s the right decision?
July 18, 2016So you have a big brand name that millions of consumers trust. You have hundreds to thousands of locations across the U.S…. and perhaps even globally. A big name means big money, so that huge chunk of change dedicated to security is definitely paying off in spades, right? All too often, the answer is a resounding “WRONG.”
July 11, 2016We know how tempting those summer sales are! You can’t help buying another bathing suit or those pair of sunglasses just because they are 30% off this weekend only. I don’t blame you! But are you being careful on where you are swiping your card?
July 05, 2016In this fifth article of the series, we continue to explore some of the basic ways that businesses of all sizes can keep their networks safer. These include tools you can implement on your own and understand why taking action is so important to the safety of your business. Today we will discuss the topic of data and ways to keep track of where sensitive data resides and where it is going.
June 27, 2016PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security standards designed to ensure all companies that process, store or transmit credit card information maintain a secure environment.
June 17, 2016In this fourth article in the series, we continue to explore some of the basic ways that business of all sizes can keep their computer systems safer. We will discuss the topic of programs, ports and services.
June 09, 2016On the last article of the Network Security Basic Training Series, we covered the perils of using remote access software. In this second article we will discuss the topic of anti-virus protection. There are many questions that come up when we talk about this topic. So here are a few answers to your questions.
June 02, 2016While software that can be installed on your PC and used to remotely connect when you are away from your home office can be very handy, it also comes with risks that may not be apparent at first.
May 31, 2016In this series of articles, we will explore some of the basic ways that business of all sizes can keep their computer systems safer. While it is impossible to say that a system can never be breached, if you are not doing some of the basics to help protect your system and your data, then you are more likely to experience a breach. In this first article, we will discuss system and application patching.
May 20, 2016Last week we covered the main tools hackers are using to access businesses’ networks. As you learned, there are 3 items to focus on which caused most data breaches last year: vulnerabilities, phishing and weak credentials. Under these 3 focus points, we covered the 4 patterns of attack used by hackers, expanded on how dangerous these attacks are and how hackers are hurting your business. But did you know, many of these attacks can be prevented with a little help and knowledge?
May 13, 2016On our previous post regarding what puts a business at risk of a data breach, we showed you that regardless of the business’ size, location or industry, many of them are targets to hackers. So how are hackers getting into these businesses’ networks and stealing data?
May 06, 2016The 80 page 2016 Verizon Breach Investigation Report is packed with valuable insights that every business owner should be aware of to be inform about the dangers & effects of a data breach and prevent it too. We know time is valuable so we decided to save you some time and point out to you the 3 main topics you should understand from this report:
May 02, 2016It's National Small Business Week! Let's celebrate the hard work you do and make sure your business continues to grow. Have you ever thought about what would happen if your business is affected by a data breach?
April 26, 2016PCI DSS 3.2 is scheduled for release at the end of April. Have you thought about how this update can affect your business? Will you still be PCI compliant?
April 20, 2016While your business’ data security program should consist of many components, perhaps the most effective defense to ransomware is building a culture of data security amongst your employees.
April 06, 2016The word “ransomware” has been in the headlines quite a bit this year. The Institute for Critical Infrastructure Technology (ICIT) has even called 2016 the year of ransomware. Ransomware is a business’ worst nightmare. This malware infects computers and restricts the users from accessing any of their data until paying the ransom.
February 26, 2016I have fond memories of playing a board game called Hungry Hungry Hippos in my younger days. Children would drop small white marbles onto a game board while furiously slamming their fists on a small, plastic, hippo-shaped lever. The hippos’ mouths would chomp at rapid speeds in attempts to capture as many marbles as humanly possible.
Today’s medical practices mirror the chaos of the game.
February 19, 2016
While you focus on providing the best health service for your patients, it is easy to under-estimate the risks that you may be putting your practice should you implement mobile technology without basic security measures.
January 26, 2016It’s understandable that the primary goal of any healthcare practice is to keep their patients healthy and safe. But what about keeping their patients’ data safe too? All too frequently, this responsibility is not given its appropriate attention, but with the data breaches headlines that healthcare made in 2015, we think it’s time they start making data security a priority.
January 14, 2016
2015 was a tough year for the healthcare industry. Some are even calling 2015 “the year of the healthcare hack”. Last year, over 65% of the data breaches occurred in the healthcare industry, it is safe to say that security should be a priority for 2016.
December 07, 2015It’s the holiday season and for many that means shopping season! But it also means that theft increases, whether it is physical theft or cyber theft.
November 16, 20152015 has been a year of healthcare data breaches. But why are hackers going after healthcare records now?
November 02, 2015Many small businesses believe only the "big guys" will suffer a data breach. But did you know that 90% of data breaches impact small merchants?
October 26, 2015As data breaches occur more and more, it is no secret that the market needs more cybersecurity professionals. We would like to share with you a few statistics on the need to educate the next generation on pursuing cyber professional careers. The demand keeps on growing as more and more hacker threats occur.
October 19, 2015Technology keeps improving, as do hackers. Hackers have been around for years and years; from exploiting the vulnerabilities of telephone lines to penetrating big retail stores' networks. As hackers get smarter, so do we at Netsurion.
October 12, 2015Have you ever considered what would happen if your business was breached? Do you have a plan of action? Netsurion has numerous PCI and Data Security experts on hand and can guide you in the steps that you should take in the event of a data breach.
October 05, 2015It is National Cybersecurity Awareness Month and we want consumers and your business to be protected from today’s security threats. Some of the biggest data breaches come from external threats. However, internal threats are just as dangerous and can be prevented too.
September 28, 2015Merchants know by now that after October 1st the liability for card-present fraud will shift to whichever party is the least EMV-compliant in a fraudulent transaction. This means that merchants will be more accountable if EMV is not implemented.
September 21, 2015Passwords keep your accounts and network safe but may also be a gateway for hackers. Below are tips that we recommend you use when creating your passwords.
September 14, 2015The number of data breaches continues to increase. Cybercrime affects your brand, your customers and your employees in ways that are unrecoverable at times. Don't let your business be affected next.
September 10, 2015In 2015, the healthcare sector has been breached more than any other but one.
August 31, 2015What is the true cost of a data breach?
August 24, 2015Four Common Data Threats
July 14, 2015Even with the rise in data breaches, Netsurion has remained successful in preventing data export, even before the Backoff threat was known and understood.
June 08, 2015In today’s business world, a major draw for many customers is the ability to stay connected to the outside world while outside the office. Having access to the Internet is a must to accomplish this. In order to provide this connectivity, this typically means having a wireless network set up for your customers to use. However, it also means placing your business at a potential risk.
May 05, 2015It is becoming more and more frequent to read about credit card data breaches in the news these days. Unfortunately, what is not touched on as frequently as the numerous electronic threats are the physical security issues present in restaurant and retail establishments.
March 12, 2015You’re in the middle of a particularly busy day…barely able to keep up with your customers, and employees are unable to speak to a single guest long enough to tell them about the fantastic new items, products, or special offers.
February 19, 2015How many days go by between news stories involving computer breaches? In the last month alone, with the Sony breach fresh on everyones mind, Anthem Inc. announced that they lost 80 million records, Chick-fil-A announced that they were investigating a potential credit card security breach, and several Marriott locations managed by White Lodging (which already had a different incident in 2013), are looking into a newly reported credit card breach. If these were the only incidents, it would still be considered a huge amount.
January 14, 2015We live in a brave new world where the spies of yesteryear, like James Bond and Jason Bourne, are truly falling away into the realm of fantasy. These smooth operators have been replaced by the slightly awkward, pasty-faced, computer hacker, who can gather more data or do more damage with a keyboard than a field agent could ever hope to accomplish with a gun and some daring.
January 07, 2015The Georgia based fast food company, Chick-fil-A, has confirmed that it is investigating a potential credit card breach. The investigation is focused on the company’s point-of-sale (POS) network at some of its restaurants and the breach is thought to have occurred between December of 2013 and September of 2014.
November 07, 2014So when you are a hacker and you write the most successful financial transaction hacking software in history, what do you do next? Well, if your are the makers of Backoff, you upgrade it.
October 29, 2014In the wake of Heartbleed, comes a new form of exposure that could potentially do much more damage than any other vulnerability of its kind. It is known as Shellshock. Shellshock affects Linux and UNIX implementations that use the BASHcommand interpreter.
September 29, 2014Most merchants who have been validating their PCI compliance for a few years now probably know which SAQ type applies to them. In PCI 2.0, it has been fairly simple. And now we are facing PCI 3.0.
August 25, 2014Every now and then hackers develop a piece of malware that is so insidious that it changes the landscape of computer security and acceptable practices. While there are many contenders for this dubious list, CodeRed, Zeus, and now Backoff are certainly worthy of inclusion.
April 11, 2014Many of our customers and resellers have asked how Heartbleed affected Netsurion services. In a nutshell, the managed services that make up our product offerings were not directly affected by Heartbleed.
March 12, 2014In the wake of their breach, Target announced on March 5, 2014 that their CIO, Beth Jacob was announcing her resignation. In December of 2013, Target announced to the public that it had been the victim of a cyber crime resulting in the loss of 40 Million credit cards and possibly as many as 70 million personal records of its customers.
February 17, 2014For the past several months, there have been numerous stories about major retailers that have been breached by hackers. The result is that millions of credit cards have been stolen. In the case of Target, so far it is reported that 40 Million customer credit cards have been exposed, and 70 Million total records with personal information have been stolen.
January 20, 2014The PCI Security Standards Council is an open global forum, launched in 2006, that is responsible for the development, management, education, and awareness of the PCI Security Standards, including the Data Security Standard (PCI DSS), Payment Application Data Security Standard (PA-DSS), and PIN Transaction Security (PTS) requirements.
January 13, 2014When Target announced that it had suffered a major breach of approximately 40 million credit cards and 70 million customer records, the nation as a whole took a collective gasp in shock. In the aftermath of the initial disclosure, the public then heard from Neiman Marcus that it too had suffered an electronic breach of data that may include credit cards.
January 01, 2014Why should you, as a merchant, comply with the PCI Security Standards? At first glance, especially if you are a smaller organization, it may seem like a lot of effort, and confusing to boot. But not only is compliance becoming increasingly important, it may not be the headache you expected.
December 06, 2013When people think of Christmas, most of them imagine family gatherings and good times. We often forget that from the end of Thanksgiving to the beginning of the year, the U.S. spends billions of additional dollars on merchandise that otherwise would have stayed on the shelves. We sometimes forget that hackers love this season as well.
October 18, 2013The department store giant garnered unwanted attention earlier this month when they announced that a Florida store fell victim to a team of thieves who attached extremely small devices called key loggers in line with their keyboards where they plug into the registers.
October 04, 2013It is important to remember the PCI is the minimum security that a merchant should put into place so that their customers’ credit cards are protected. Security should be viewed as any other company policy – you always need to run your business in a certain manner, not just during your validation efforts. If you integrate security into your regular business practices first, then you will find that PCI will naturally follow.
September 13, 2013From a PCI compliance standpoint, merchants using Windows XP will have problems maintaining compliance because they cannot keep their operating systems patched to protect themselves from the latest vulnerabilities. On the flip side, there are many Point of Sale (POS) software packages that have only been validated using Windows XP, and if another operating system is used instead, it will violate the official implementation guide (and thus fall out of compliance). Our customers have been asking us for guidance, so we did a little research.
July 19, 2013There is a new trend facing people who rely on help desks, like ours. Hackers have targeted help desks because they know that the people who provide you support have the access into your systems that they want to exploit.
May 31, 2013In the wake of the most recent terrorist bombing in Boston, it is easy to understand why some people would be willing to sacrifice a few liberties to the government in favor of more security. A common train of thought is that an honest person does not have anything to hide, so the intrusion into our private lives is really a minor thing. In a Utopian society, I would tend to agree with that sentiment, but we live somewhere else.
May 24, 2013Square strives to make financial transactions simple enough so that the average person on the street can participate. Before Square, a regular person without a bank supplied merchant account could not take credit cards. Today, Square allows everyone with a smart phone to accept credit cards, and now the company is focusing on another market – person to person cash payments.
April 26, 2013This type of issue with a browser is so damaging because computer hackers who take advantage of it, can execute malicious code on the affected machines without the user needing to download anything or without any indication that the machine has been compromised. All a user has to do to be infected is to go to a website that has a malicious script embedded on it, and viola you have been hacked!
March 29, 2013When you think about electronic security, what comes to mind? Do you consider how vulnerable your customer credit cards are, or how easily someone can break into your on-line bank account? These are the most profitable avenues of attack that thieves usually focus on, but occasionally, cybercriminals are motivated by something besides greed.
February 22, 2013In the dark ages of personal computers (1980′s and 90′s), you either needed to be a computer geek or have access to one if you wanted any device to work with your computer. You had to go through a complicated driver installation process, and possibly replace system files. My how the world has changed.
January 18, 2013In what should only be considered a victory for the U.S. DOJ, 2 of the 4 alleged Subway hackers have been sentenced, and 1 of the remaining criminal’s trial is set to begin shortly. These men who perpetrated a sophisticated attack against the computers systems of the famous sandwich chain have been responsible for potentially $10 Million dollars in computer fraud, according to a press release from the U.S. Department of Justice.