TechR2

Retiring point of sale terminals? Protect your data.

Retiring point of sale terminals? Protect your data. We’ve all been to the grocery store, tried to sign the screen for our credit card purchase, and watched as our careful signature is rendered as an illegible scrawl. In-store credit card terminals and point of sale (POS) terminals don’t last forever. But what happens when they […]

Back to School: Is your student data safe?

Back to School: Is your student data safe? Families everywhere are preparing their students to go back to school, and the schools themselves are preparing themselves for the student invasion. But are schools prepared for the student data security challenges? Anyone who has a student knows that sensitive data, such as social security numbers and […]

Data Security Predictions for 2014

  With the Target breach closing out the year with a bang, specialists have put together some predictions for the year to come. The theme for 2014 is heightened expectations. Consumers and regulators are expected to put more pressure on organizations to step up their security measures throughout 2014. Kroll Advisory Solutions recently released its […]

Data Loss Prevention Best Practices

  Data loss prevention (DLP) is going to become even more important now that BYOD policies are taking over. It is important to understand what steps need to be taken and what considerations need to be made in order to protect your organization and its brand. We have touched on this subject before but its […]

Point of Sale Machines are Potential Cause of Another Data Breach

  Neiman Marcus is the latest victim of a data breach caused by credit card hackers. Brian Krebs reported last week that the upscale department store had its database of customer information hacked last month. This comes in the wake of Targets historic breach of over 40 million credit card numbers and an additional 70 […]

What is Cyber Liability Insurance and Why is it Important?

  Cyber liability insurance protects an organization from risks associated with e-business, the internet, networks, and informational assets controlled by first and third parties. The original cyber liability policies written were almost soely for companies providing computer hardware and software services. Today, with ever changing state and federal regulations, plus the addition of compliance standards […]

New study on hard drive failure rates surprises many.

[vc_row type=”grid” video_bg=”” css=”.vc_custom_1644068845848{padding-top: 80px !important;padding-bottom: 40px !important;}”][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]Online backup specialists Backblaze completed a study on the reliability of hard drive brands currently on the market, and the results were very interesting. The study consisted of over 25,000 drives (27,134 to be exact) from the industries top manufacturers Hitachi, Seagate, Western Digital, Toshiba, […]

Recent data breaches once again sparks credit card technology debate

[vc_row type=”grid” video_bg=”” css=”.vc_custom_1644068749869{padding-top: 80px !important;padding-bottom: 40px !important;}”][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]Recent data breaches in the US (mainly Target and Neiman Marcus) have once again sparked the age old debate of magnetic strip cards vs. EMV (Europay/Mastercard/Visa) chip cards. Whenever a store completes a transaction the data from that transaction is stored on the organization’s servers. […]