security

How MICROS Point of Sale Systems Got Hacked

Software giant Oracle Corporation became the victim of a data breach last week when a Russian organized cybercrime group gained access to hundreds of their systems. According to security experts the group gained access through a customer support portal for companies that use the MICROS point-of-sale software from Oracle. The MICROS software payment system is […]

How MICROS Point of Sale Systems Got Hacked Read More »

Data Breach at Wendy’s Expands to Over 1000 Locations

Data security issues at Wendy’s have now been super-sized. Following whispers of a data breach in January, Wendy’s finally confirmed payment security issues in May, when spokesmen admitted fewer than 300 stores had been affected by malware. Now, the company admits the real number of compromised restaurants is over 1,000. Thieves installed malware on POS

Data Breach at Wendy’s Expands to Over 1000 Locations Read More »

Err on the Side of Caution: Nonprofits and Virtual Credit Cards

A jarring amount of 17.6 million people (7% of Americans) had at least one incident of identity theft in 2014, according to the Bureau of Justice Statistics. Unfortunately some of that identity theft can come from third parties, including criminals accessing business accounts to get information about consumers. Nonprofits, small businesses and large corporate companies

Err on the Side of Caution: Nonprofits and Virtual Credit Cards Read More »

Visa and MasterCard Sued by Home Depot over Chip Card Security

Around the world, 80 countries have added EMV chips to their credit cards. These chip cards are more secure than credit cards with only a magnetic strip and have helped to reduce credit card fraud in many places. As a result, these cards are now being introduced in the United States. Many retailers, however, are

Visa and MasterCard Sued by Home Depot over Chip Card Security Read More »

Internet Security

Security is one of the defining internet issues of this decade.  While there is not one distinct body of law that governs a company’s rights and responsibilities, there are methods to prioritize compliance efforts.  This issue is relatively unique to the internet space since the laws and regulations that apply come from many different areas. 

Internet Security Read More »