Developing an Effective Change Management Program

Detection of change is easy… There, I said it. Anyone can do it. One thousand monkeys with keyboards can pound out scripts to detect change. What is not so easy, what the ...

Fraud the Facts

UK Finance's annual ‘Fraud the Facts’ report aims to reveal the extent of the fraud detection and prevention challenge facing organisations today. PCI Pal's advice in response to the findings surrounding Cardholder-Not-Present ...

Is your contact centre bleeding? Why older DTMF deployments may be leaving the back door ajar

n consumer research we conducted in late 2018, we found that almost half of consumers questioned had already experienced a compromise of their personal data. Given these results, data security is becoming ...

A Beginner’s Guide to PCI Compliance

PCI DSS, or the Payment Card Industry Data Security Standard, is the set of regulatory requirements all organizations who process card payments must adhere to. Sounds simple enough, right? But PCI compliance ...
Third Party Security Risks to Consider and Manage

Third Party Security Risks to Consider and Manage

Guest article by Josh Lefkowitz, CEO of Flashpoint Acceptable business risks must be managed, and none more so than those associated with external vendors who often have intimate access to infrastructure or ...

Retail Sector feature: Retail, data security and (re)building trust

PCI Pal’s CTO, Geoff Forsyth, features on Retail Sector. Read the full feature here. Data security may have once been the sole mandate of the IT professional but that is no longer ...

De-scoping the contact center mitigates staff security threat

Sorry, this entry is only available in American English. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the ...

The latest: March event roundup

March has been a busy month for events for our teams in the UK and US. Here’s a recap of two key exhibitions on either side of the Atlantic. On March 18th, ...

Exploring the ‘What ifs’ of Insider Security Threats

The risk of malicious activity from a business’ own staff is real, current, and no industry is immune. Statistics from the most recent CIFAS Employee FraudScape report show that 585 insider fraud ...
e-Crime & Cybersecurity Congress: Cloud Security Fundamentals

e-Crime & Cybersecurity Congress: Cloud Security Fundamentals

I was a panellist at the e-Crime & Cybersecurity Congress last week, the discussion was titled 'What's happening to your business? Cloud security, new business metrics and future risks and priorities for ...
Loading...