Posts Tagged ‘Credit card’

Hackers steal credit-card numbers from restaurant customers

Here we have another unnecessary credit card data breach in a small organization which resulted in a loss of customers data demonstrating poor baseline security of small organization in this case a restaurant. Small organizations are not ready for PCI Compliance. Checkout why PCI Compliance is essential and why small merchants have to comply. Review […]

Comments (20)

PCI DSS Law and State of Nevada

Image by purpleslog via Flickr 45 States followed California when they introduced “SB1386”, the Security Breach Information Act, which has specific and restrictive privacy breach reporting requirements. Similarly to the SB1386 Law, California, Massachusetts & Texas are already looking at making PCI DSS Law and history tells us that when California moves, everyone else follows! […]

Comments (4)

Credit Card Primary Account Number and Encryption

50 Ways to Protect Your Identity and Your Credit: Everything You Need to Know About Identity Theft, Credit Cards, Credit Repair, and Credit Reports Primary Account Number (PAN) is a “12-digit or 19-digit numeric code embossed on the face side of a bank card, and also encoded in the Magnetic Stripe. The primary account number […]

Comments (10)

Credit card authorization process weakness

Image via Wikipedia Credit Repair Kit For Dummies (For Dummies (Business & Personal Finance)) Credit card authorization sequence: 1) Creditholder swipes card at merchant. A request is sent to merchants bank 2) Merchants bank “asks” processor to determine the cardholder bank 3) Processing network finds cardholders bank and request approval for purchase 4) Cardholders bank […]

Comments (13)

PCI compliance is essential and why you have to

During this down turn economy organized cyber crime is a booming underground business these days. Most of the security expert and FBI agree that cybercrimes are on the rise and pose a biggest threat to US vital infrastructure. Cybercriminals are thieves in cyberspace who will swipe the sensitive data and sell to other criminals in […]

Comments (3)

Security breach and notification

Image by victoriabernal via Flickr California was the first state in the nation to pass a data breach notification law in 2003, and it’s now planning to broaden the notification for companies doing business in the state. Notification will require specific information about the breach to the consumer and send notices to the state authorities […]

Comments (4)

Open Network and Security

Open networks are heterogeneous environment where users like to use all the applications and systems at any given time. In a heterogeneous environment, each department run different hardware and software, but you can control the protocols which will work on this environment. Universities are famous for open network. Most Universities network is comprised of a […]

Leave a Comment