The internet is a great resource for information and entertainment,… Read more »
Category: Security and Risk Services
GUIDE: HITRUST Made Simple – An Explanation of HITRUST, Its Benefits, and How to Get Started
Every organization has sensitive data it must protect. Whether you… Read more »
How to Build a Cybersecurity Program from the Ground Up
LBMC Information Security’s Mark Burnette outlines simple steps organizations can take to build a cybersecurity program from the ground up.
6 Myths About PCI Compliance Regulations
Let’s clear up six of the most common misconceptions – and get to the bottom of how PCI compliance regulations really work.
Data Classification: What It Means and How To Implement
Data Classification is a process of categorizing data and a… Read more »
Reducing PCI Scope, What Makes Good Network Segmentation?
To reduce PCI Scope, all systems in your environment must be in scope and PCI and all PCI requirements should be applied to them.
Five Steps for Maintaining PCI Compliance in the Cloud
If your organization plans to store, process or transmit payment card information via the cloud, compliance with the PCI DSS is of particular concern. This article covers five key points provided by the PCI Security Standards Council.
Webinar: AWS and Your SOC 2 Report
AWS cloud services does not mitigate risks, it only changes… Read more »
What to Expect with PCI 4.0
After years in the making, the PCI Security Standards Council… Read more »
Will FCC Order 19-72A1 Affect Your PCI Compliance?
The Federal Communications Commission (FCC) released order 19-72A1 on August… Read more »