We know Se·cu·rity (si kyo̵or′ə tē)

noun pl. securities -·ties
1.the state of being or feeling secure; freedom from fear, anxiety, danger, doubt, etc.; state or sense of safety or certainty
2.something that gives or assures safety, tranquillity, certainty, etc.; protection; safeguard.

What is PCI?

PCI DSS is a set of requirements for enhancing data security. This originally began as individual programs from Visa, MasterCard, American Express, Discover, and JCB. To facilitate the broad adoption of consistent data security measures Visa, MasterCard, American Express, Discover, and JCB aligned their individual policies to release the Payment Card Industry Data Security Standards.

Generic placeholder image

If your business accepts or processes payment cards, it must comply with the PCI DSS (Payment Card Industry Data Security Standards). All businesses and merchants that store, process and or transmit card holder information are now required to be PCI compliant.

Generic placeholder image

If you have little or no knowledge about the process of becomming PCI certified your are not alone, as a matter of fact most small business owners and merchants don't know where to start.

How can Vulnerability Scanning help me?

Similar to packet sniffing, port scanning and other “security tools”, vulnerability scanning can help you to secure your own network or it can be used by the bad guys to identify weaknesses in your system to mount an attack against. The idea is for you to know your weaknesses first and fix them before the bad guys use them against you.

Scan After we perform the vulnerability scan with your permision we will continue to work on a process for addressing the identified vulnerabilities. In most cases there will be patches or updates available to cure the problem. Sometimes though there may be operational or business reasons why you can’t apply the patch in your environment or the vendor of your product may not yet have released an update or patch. In those cases you will need to consider alternative means to mitigate the threat. You can refer to details from sources such as Secunia or Bugtraq or US-CERT to identify any ports to block or services to shut down that might help protect you from the identified vulnerability.

Above and beyond performing regular updates of antivirus software and applying the necessary patches for any new critical vulnerabilities, it is wise to implement a schedule for periodic vulnerability scans to make sure nothing has been missed. Quarterly or semi-annual vulnerability scanning can go a long way to helping you make sure you catch any weaknesses in your network before the bad guys do.

Frequently Asked Questions

Information Request

    Client Testimonials...

    We understand that no IT environment is like the other and create customized solutions for our clients to ensure the best possible service for your investment. Please contact us for details.

    Contact Us