Tag: pci compliant hosting

Next Wednesday, Online Tech’s Director of Operations Jason Yaeger will be participating on a panel discussion with technical and administrative PCI DSS experts, including Bob Russo from the PCI Security Standards Council, to discuss the role that cloud service providers play in protecting cardholder data, as well as the security issues involved. Title: Navigating PCI Security Mountains in the Cloud Register: Sign Up on BrightTalk.com Who: Brandon Dunlap, Brightfly, Inc.; Bob Russo, PCI SSC; Jason Yaeger, Director of Operations, Online Tech; Randal Asay, …

SearchSecurity.TechTarget.com recently reported on the PCI SSC (Payment Card Industry Security Standards Council) and their first annual PCI Community Meeting to discuss the changes made in PCI DSS 3.0 that affects merchants, ecommerce and retailers that deal with credit cardholder data. In an interview with PCI SSC Gen. Manager Bob Russo and their CTO (Chief Technology Officer) Troy Leach, they highlight the most-discussed proposed changes at the meeting, including the pain points of PCI compliant hosting outsourcing and integrating with …

Join a PCI DSS panel discussion with technical and administrative experts in the field as they discuss the role that cloud service providers play in protecting cardholder data and the security issues involved. With Bob Russo from the PCI SSC (Payment Card Industry Security Standards Council) and Jason Yaeger of Online Tech, PCI Compliant Hosting provider, the webinar combines regulatory and tech perspectives to guide merchants on creating a PCI compliant cloud. Title: Navigating PCI Security Mountains in the Cloud Register: Sign …

Recently Online Tech has released their next generation cloud offering that serves clients with mission-critical applications or sensitive data. I had a chance to speak with Mike Klein, Co-CEO, about the new encrypted cloud. According to Klein, Online Tech’s encrypted cloud focuses on three things: mission critical applications, regulatory compliance and security. Mission Critical Applications – The main focus behind the encrypted cloud was offering customers with mission-critical applications the highest performance and the highest reliability. Clients who have applications …

Last month Jeremy King, the European Director for the Payment Card Industry Security Standards Council (PCI SSC) had an interview with BankInfoSecurity.com, in order to address pain points they encounter as they continue to shape the Payment Card Industry Data Security Standards (PCI DSS). The issues of new technology and the propensity for more organized criminal activities creates unique problems for the council. Any company that stores, transmits, or processes credit cardholder data must be PCI compliant, and as a …

For ecommerce websites, partnering with a PCI DSS compliant hosting provider can help you achieve many requirements of the standard while building a layered security solution to protect credit cardholder information, whether stored or merely in transit. Where should you start? [If you’re not sure what the requirements are, read What is PCI Compliance?] For a fully protected system with multiple layers of technical security, start with a web application firewall (WAF), a device that sits behind your virtual or dedicated …

Internet retail companies have so many things they need to worry about. Outside of actually making their product, they have to make and monitor their website. They need to meet the appropriate compliances. They have to market their products online, and when orders come in, they need to fulfill the order and ship it to the correct buyer. Couple that with any brick and mortar stores companies may also need to monitor and distribute to, and it’s enough to make …

For companies that deal with credit cardholder data, including e-commerce, retail, franchise, etc., the Payment Card Industry Data Security Standards (PCI DSS) are the official security guidelines set by the major credit card brands. Of the 12 PCI DSS requirements and sub-requirements, 12.9.1 dictates:[1] Create the incident response plan to be implemented in the event of system breach. Ensure the plan addresses the following, at a minimum: Roles, responsibilities, and communication and contact strategies in the event of a compromise …

A daily log review can detect patterns of normal use and provide insight into any abnormalities in the system network and servers instead of auditing devices after an event occurs.  With consistent monitoring and analysis, data breaches can be pinpointed faster and remediated more effectively. If you collect, store or process credit cardholder data, you need to meet PCI DSS (Payment Card Industry Data Security Standard) compliance requirement 10.6. PCI requirement 10.6 requires log review: Review logs for all system …

Last week Online Tech exhibited at booth #108 at the IRCE show in Chicago. With two consecutive days of jam-packed sessions, speakers covered everything imaginable related to e-commerce. I followed the “Fulfillment, Customer Service and Payment: Making the Last Mile Count” track on the final day of speakers. Jason Roussos, CMO of Living Direct and Chuck Fillinger, Senior Associate of The Strawhecker Group spoke to the audience on the importance of developing ecosystems and strong relationships with vendors in the …

Get started now. Exceptional service awaits.

Live Chat