Cimcor Blog

PCI and File Integrity Monitoring for Businesses
PCI and File Integrity Monitoring for Businesses
The Payment Card Industry Data Security Standard (PCI DSS) has been in effect since 2004, but the need for continued compliance strategies is just as...
PCI DSS 3.2 Deadlines and Requirements
PCI DSS 3.2 Deadlines and Requirements
By now, many organizations have implemented PCI DSS v3.2 and though the previous version (v3.1) expired in October of 2016,  some of the new...
4 Key Features to Look for in Your PCI Software
4 Key Features to Look for in Your PCI Software
So you’re looking for a PCI compliance software to help you comply with regulatory statutes. While there are many options out there, it is important...
How To Pass Interim PCI  DSS Compliance Assessments 80% of Retailers Fail
How To Pass Interim PCI  DSS Compliance Assessments 80% of Retailers Fail
Eighty percent of retailers and other PCI-impacted organizations fail interim compliance assessments. According to the 2015 PCI Compliance Report by...
5 Ways to Ensure POS Malware Doesn't Ruin Your Holidays
5 Ways to Ensure POS Malware Doesn't Ruin Your Holidays
The holiday season may not spell peace or joy for countless IT professionals this year. The 2016 Kaspersky Black Friday Threat Overview predicts that...
6 Signs Your Point of Sale Systems are Under Cybercriminal Attack
6 Signs Your Point of Sale Systems are Under Cybercriminal Attack
Point-of-sale data breaches aren't necessarily simple, which is why they're so pervasive in the retail and hospitality industries. Verizon reports...
7 Reasons Point-of-Sale Data Breaches are a Threat to Every Retailer
7 Reasons Point-of-Sale Data Breaches are a Threat to Every Retailer
Your retail stores can't function without point-of-sale systems, but they're one of the greatest information security vulnerabilities. Recent news...
5 Items Missing From Your Information Security Threat Vulnerability Assessments
5 Items Missing From Your Information Security Threat Vulnerability Assessments
Where does your average information security professional spend the majority of their time? If you guessed monitoring or compliance activities,...
5 Security Objectives That Require File Integrity Monitoring
5 Security Objectives That Require File Integrity Monitoring
Both first-time and experienced users of file integrity monitoring software may not be aware of the full scope of its benefits. For many...
7 Features You Need in a File Integrity Monitoring Software
7 Features You Need in a File Integrity Monitoring Software
The increasing incidence of data breaches over the past decade has led to the creation of numerous regulatory standards such as the PCI-DSS. These...