Think banks want you to comply with PCI DSS security? Think again.
See the 3 reasons why banks don't want small merchants like you to comply with the rules.Continue reading
HIPAA has a long list of "requirements" for IT providers -- but did you know that some of the rules are not as concrete as they seem?
See which parts of HIPAA's security rule gives you some flexibility, and see just how far you can bend the rules before the cracks start to show in your compliance and security.Continue reading
The Bash vulnerability known as Shellshock is not hitting SMB IT providers as hard as other companies, but it does raise questions about their vendors.
Are your technology vendors making the right choices for your security? How have they responded to this new threat? We explore these topics and more inside.Continue reading
Charlotte, NC – Calyptix Security, a leading provider of network security and management devices for small and medium business, today announced expanded spam filtering functionality to its flagship security device, AccessEnforcer. AccessEnforcer’s new capabilities include a “see reason” link on the spam filtering dashboard. Clicking the link reveals to users … Continue reading
POS malware is breaking through defenses at retailers across the nation -- but why are POS systems so vulnerable? And how can you stop this threat?
See 5 reasons why POS malware is winning the battle and 18 ways you can boost POS security to block it.Continue reading
Charlotte, NC – Calyptix Security Corp., a leading provider of network security and management tools, today announced that its flagship security solution, AccessEnforcer, now supports mobile VPN connections. The latest update enables Apple and Android mobile devices to have a secure and encrypted VPN connection to an office network protected … Continue reading
Basic wireless router security is terrible and it may be getting worse. We review the results of a hacker contest that found 15 zero-day vulnerabilities in popular SOHO routers.
See which router models are affected, and find out why most of these vulnerabilities have risen from the grave.Continue reading