Stephen Lawton SC Media | Page 5 of 6
Stephen Lawton

Stephen Lawton

Most recent articles by Stephen Lawton

PCI: Something borrowed

PCI: Something borrowed

For many companies that process credit cards or retail customers’ credit card data, the requirements of the Payment Card Industry Data Security Standard (PCI DSS) are all too familiar. But should companies that do not process credit cards implement the same data security restrictions as mandated for those that do? In this latest ebook from SC Magazine, we examine how even those companies not needing to adhere to the credit card guidance can benefit from the rules that PCI DSS lays out. Encryption and logging technologies are a boon to any company in need of protecting its internal or customer data. And some smaller companies are benefitting from promoting their businesses as PCI compliant.

Migration to IPv6 slogs on

Migration to IPv6 slogs on

While IPv6, the latest internet protocol, has been an approved standard for more than a decade, and internet experts have been warning about the sharp decrease in available IPv4 addresses, it languishes as an unappreciated and under-used protocol – a solution waiting for the problem to be acknowledged. The move to IPv6 will alleviate some network management issues and it will enable IP addresses to be assigned automatically to any new device with virtually no fear of duplicating that address. Yet, owing to the lack of dire consequences and the potential high cost of migration, many companies are sitting tight on their legacy network infrastructure.

Health care: The right stuff

Health care: The right stuff

Security experts agree that the health care industry is currently trying to digest a variety of data security and related laws, regulations and guidance. Adhering to standards is one thing, securing the infrastructure so that data leakage is thwarted is an entirely different ballgame. Many security tools are available to make the task easier, but appliances and software are only the beginning. Educating the workforce to be vigilant about security is another key ingredient. This latest eBook from SC Magazine examines specific ways that health care facilities – ranging from small clinics and medical offices to large, regional medical centers – can protect themselves from data losses due to cyber attacks, negligence and internal threats.

GRC: Harmonizing business practices

GRC: Harmonizing business practices

Negotiating the minefield that is governance, risk and compliance (GRC) can be a daunting task for corporate, financial and IT executives alike. With companies facing significantly greater risks due to government and private industry compliance regulations that vary from country to country, combined with significantly increased litigation, most managers are searching for new ways to decrease their risk profile while continuing to scale back on costs and personnel. While software can help, it needs to understand the overall business goals and environment in order to judge risk appropriately.

Next post in Research