by Carson & SAINT Admin | Sep 2, 2015 | Compliance
This is the second of a six-part blog series about PCI compliance. Last week, we discussed terminology of PCI Compliance, what it is, and to whom it applies. Refer to part one for a glossary of PCI-related terms at any time during the series. This week, we’ll...
by Carson & SAINT Admin | Aug 26, 2015 | Compliance, Cybersecurity 101, PCI Compliance
This is the first of a six-part blog series about Payment Card Industry (PCI) compliance. Over the next few weeks, we’ll be discussing PCI, its scope, compliance reporting requirements, readiness assessments, remediation, penetration testing, and vulnerability scans....
by Carson & SAINT Admin | Aug 4, 2015 | Cybersecurity 101, Security & Protection
Working from home can be an efficient way to save you and your business time and money. However, when it comes to cyber security, do you know if your home and work networks are safe? If you’re conducting business on a home device or anywhere outside of the office,...
by Carson & SAINT Admin | Jul 28, 2015 | Security & Protection
Why is Security Important to the SDLC? SDLC stands for the Software Development Lifecycle and is used to refer to the process of developing a software product. It is extremely vital to keep security in mind during every step of the process, or as we in the...
by Carson & SAINT Admin | Jul 22, 2015 | Cybersecurity 101
Two-Factor authentication, or 2FA, is a small step that will go a long way in protecting your online accounts. 2FA will provide a second layer of protection to your information and should be used whenever possible at home and work. When a user enables 2FA, they are...
by Carson & SAINT Admin | Jul 16, 2015 | Cybersecurity 101
Something (or someone) is always trying to get into your network. There are APTs, hackers, phishing, data breaches, penetration tests, and vulnerability exploit. But if you’re not in the industry that may have all sounded like a foreign language. Carson Inc. wants to...
by Carson & SAINT Admin | Jun 10, 2015 | Internet of Things, Security & Protection
Due to the highly networked nature of the devices, security needs to be incorporated within the development of the Internet of Things (IoT). Recommendations for security with IoT revolve around training employees, keeping unauthorized users from gaining access, and...
by Carson & SAINT Admin | Jun 3, 2015 | Internet of Things
Phones, computers, laptops, televisions, door locks and even refrigerators can connect to the Internet. With so many devices talking to one another, there is a constant stream of information being shared. But, is there a price for all these devices being...
by Carson & SAINT Admin | May 27, 2015 | Internet of Things
It seems everything is connecting to the Internet – from cars to refridgerators to lawn mowers. The future of machine-to-machine technology seems inevitable. People are continuing to demand smarter applications and devices to fulfill their growing hunger for constant...
by Carson & SAINT Admin | May 20, 2015 | Attacks Breaches & Hacks
With the proliferation of the Internet, users are constantly on devices that contain a lot of their personal information. And now, with technologies like iCloud and other password storage methods, hackers can gain access to that information through social engineering....