Cybersecurity
Latest Posts from Our Blog
Welcome to SandStorm IT’s 6-part series about Payment Card Industry Data Security Standard (PCI DSS). In this series, we’ll cover what PCI DSS is and the various requirements: Part 1 – What is PCI DSS? Part 2- Building and Maintaining a Secure Network (You are here) Part 3 – Protecting Data Part 4 – Further…
Read MoreDay by day, we do more and more through our web browsers. We perform daily work tasks like checking and sending email, visiting websites to learn about news in our chosen fields, and work in web-based operational systems all through our browsers, and outside of the office, we use those same browsers to check our…
Read MoreWhat is SPAM? SPAM is junk mail that you receive that you didn’t sign up for. The Merriam-Webster dictionary defines it as “unsolicited usually commercial messages (such as e-mails, text messages, or Internet postings) sent to a large number of recipients or posted in a large number of places“. And none of us are immune…
Read MoreAdobe Flash, originally released by Macromedia in 1995, is a once widely used and vastly capable web application platform. In 2005 Flash player was installed on more devices than any other internet-based media application, including Java, Quicktime, and Windows Media Player. Flash media player still exists today but has been widely deprecated over the last…
Read MoreWelcome to SandStorm IT’s 6-part series about Payment Card Industry Data Security Standard (PCI DSS). In this series, we’ll cover what PCI DSS is and the various requirements: Part 1 – What is PCI DSS? (You are here) Part 2- Building and Maintaining a Secure Network Part 3 – Protecting Data Part 4 – Further…
Read MoreThis blog post was inspired by some recent news I heard about a company some of my friends work for. They just had an incident where someone spoofed the email address of an executive in the company and all of the employees’ W-2s were emailed to an unknown party. All of the people that work…
Read MoreAccording to Macy’s, their e-commerce website was breached in October. Hackers managed to steal information from unknowing customers as they shopped online. Overall, it’s a very scary situation that proves that data breaches can happen to anyone. Last year, online tech store Newegg was hit with a data breach that skimmed the payments page for…
Read MoreWith the latest in face recognition and other biometric technology coming to the consumer level, biometric security may begin to cross your mind. You may wonder “Is biometric actually more secure?” The short answer is that it’s stronger than using a weak password, but not as strong as using a strong password. For more info…
Read More