Website Security Solutions | Latest Guides | Blog

The Quick Guide to Ransom Attacks

| #Articles #Security

What is Ransomeware and Ransom Attacks? How does it work? A History of Ransom Attacks. Types of Ransomware. How to Protect Against Ransom Attacks? What to do if you are affected by ransomware encryption. What is Ransomeware and Ransom Attacks? Ransomware is malicious software that blocks, or denies access to a computer system or data until a ransom is paid by the victim. A ransom usually has a… [read more →]

The Quick and Easy Guide to PCI Compliance

| #Articles #Security

What is it PCI Compliance? Who is it for? 4 Levels of PCI Compliance Why do we need it? PCI Compliance Requirements Firewall Change IDs and Passwords Protect cardholder data-at-rest Protect cardholder data-in-transit AntiVirus Develop and Maintain secure systems and applications Restrict access to Data Unique ID and Authentication Restrict… [read more →]

Cloud Computing, Recent Hacks and Security Risks of 2019

| #Articles #Hacks #Security

What is Cloud Computing? Cloud Computing Risks Lack of Control and Availability Data Security Lost Data The Capital One Data Breach Cloud Computing Hack affects PCM Is Cloud Computing Worth it? What is Cloud Computing? Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a… [read more →]

New Portal and Tools

| #News

New Portal Public Beta Release We have been working hard over the last few months on our new Client Portal to release new features and improvements. At the beginning of 2019 we released the very first beta release of our new portal. Although minimal in features, the feedback we received from our beta testers was very positive. This pushed as to continue making it the best portal possible. We want… [read more →]

Route Poisoning: Why we need SSL/TLS

| #Articles

SSL/TLS is the bedrock of modern security. Just about all security strategies involve it or chain back to it at some point. At its core, the contract is this: something encrypted with a user’s public key can only be decrypted by the corresponding private key, and something encrypted with the user’s private key can only be decrypted by the corresponding public key. From this we derive digital sig… [read more →]