Risk Assessments, Security, PCI, PCI Community, Assessment, PCIDSS, COVID19, Remote Work

Remote PCI Assessments: We're Adapting With You

Recent events have changed the world we typically wake up to, and it is continuing to change. The ways we interact, the ways we seek necessities, and the ways we conduct business, have all shifted in a very short period of time. 

For many retailers, business is continuing and even trending upwards as consumers shift their shopping habits to online. What doesn't seem likely to change however, is the responsibility that retailers have to protect the consumers' personal information.

Read More
By Sherri Collis on Mar 24, 2020 1:12:05 PM
Risk Assessments, Security, CIO, Cybersecurity, Security Consulting, Healthcare, CISO, HIPAA, Infosecurity, Health Information Security, Threat-Based Risk

When to get a Threat-Based Risk Assessment

Healthcare CISOs and CIOs continue to struggle to get the resources they require to address increasing threats in the digital environment and too often they are presented with risk analysis reports that simply contain a laundry-list of security control failures.

Read More
By Security Consulting Team on Feb 20, 2020 11:32:31 AM
Risk Assessments, Security, Digital Experience, Digital Transformation, GDPR, Privacy, Business Consulting, Customer Experience, Artificial Intelligence, Agile Coaching, iterative, scrum, scrum master, scrum team, product owner, CEO, Technology Trends, Retrospective

Online's Top 10 Blogs of 2019

Is it this time of year already?! The time of year when the days literally fly off the calendar. When we sit back and consider all that transpired. The many projects, trends, buzzwords, predictions, challenges, and success stories that shaped our year.

It's also the time when we round up some of our favorite blogs that we published in 2019.  While it’s hard for us to pick our Top 10, we did our best. We hope you like the list our team put together.

Read More
By Marketing Team Elves on Dec 18, 2019 10:39:38 AM
Risk Assessments, Security, Cybersecurity, Hacker, Risk, RSP, hacking, pen testing

Tribe of Hackers - Red Teams & More

Online is proud to feature a chapter from Tribe of Hackers, written by Marcus J. Carey and Jennifer Jin. Our very own security expert Jeff Man shared many insights and stories in chapter 25 of this highly acclaimed book.

Jeffrey Man is a respected information security expert, advisor, evangelist, and co-host of the security podcast Security Weekly. He has more than 35 years of experience in all aspects of computer, network, and information security. Jeffrey has held various information security roles within the DoD as well as private sector enterprises, is a former PCI QSA, and was part of the first penetration testing red team at the NSA.

Read More
By Jeff Man on Aug 29, 2019 5:50:02 PM
Risk Assessments, Security, Privacy

Turn Down That Noise! Tuning into Cybersecurity for the Financial Sector

"Turn down that noise!" I suspect that at some point in your life you’ve uttered those words or perhaps had them spoken to you. In my case it was my parents telling me to turn down my music when I was a teenager. What I never understood was why they viewed my music as noise. To me, it was a symphony of sounds that I connected to in a variety of ways. I realized, as I got older, that noise was really just another term for “I don’t understand, like or connect with that.”

Sometimes it’s just about volume. Sometimes it’s about something else.

Read More
By Alain Espinosa on Oct 18, 2018 1:44:12 PM
Risk Assessments, Security, Contact Centers

Visa's Chatbot Security Alert

On July 19, Visa posted an important and timely security alert regarding“Chatbots”. In a nutshell, Visa says that due to the rise in online and mobile commerce, AI and chatbots (both text and voice) have become increasingly important to payment system companies to handle increasing call volumes. With that said, Visa goes on to say that they have become aware of attackers targeting these online chat service providers and distributing malware to intercept payment card data.

Read More
By Mark Hannah on Jul 26, 2018 1:32:04 PM
Risk Assessments, Security, Genesys, Contact Centers

When 24x7 Security is Not Enough

Neighbors, babysitters, handymen, even family members; your backyard, upstairs deck, even your own front door…

Statistics show the vast majority of burglaries and theft, especially identity theft, are perpetrated by a household acquaintance or family member. The US Department of Justice says that “Offenders were known to their victims in 65% of violent burglaries; offenders were strangers in 28%.” Similarly, any Google search yields countless articles listing front doors, backyards, and ground floor windows as the most common points of entry for burglars. 

Read More
By Steve Levinson on May 31, 2018 3:33:37 PM