Categories: Newsletters

eMazzanti Technologies | Technology Newsletter | Hoboken, NJ – New York, NY | October 2013

Advice to Managers: Five Ways to Simplify Your PCI 2.0 Compliance
used with permission from the Cisco Small Business Resource Center

If the acronym “PCI” makes your heart race, you’re in good company.

“Small and medium-sized businesses can feel blindsided by all that PCI requires them to do,” says Aaron Reynolds, an author of the 2011 PCI Compliance Report by Verizon Business Services. “They have to comply with the same standard that initially was targeted at larger merchants and service providers.” Complying is complex.

“Unless the business has expertise in PCI and network security technologies, it will have a hard time controlling its compliance costs,” says Sean Walls, managing senior security consultant at Presidio Networked Solutions.

Help is at hand. Cisco and many of its partners offer cost-effective PCI compliance services–including helping SMBs complete their self-assessment questionnaire or assess PCI readiness.

Some Cisco partner companies are also certified by the PCI as Qualified Security Assessor (QSA) companies, which have QSA employees who have been certified by the PCI Council to validate an entity’s adherence to the PCI DSS.

Read more


For Payment Card Industry (PCI) Data Security Standard and Payment Application Data Security Standard – Version 3.0
August 2013

Introduction
This document from the PCI Security Standards Council (PCI SSC) highlights anticipated changes to the PCI Data Security Standard (PCI DSS) and Payment Application-Data Security Standard (PA-DSS) in order to prepare organizations for the introduction of Version 3.0 in November 2013. Its objectives are to:
  • Help stakeholders prepare to review and discuss the draft versions of PCI DSS and PA-DSS at the 2013 Community Meetings.
  • Prepare stakeholders to align their security programs with the updated Standards.
  • Provide additional time for merchants to review and understand changes prior to implementation.

Publishing this document prior to release of more detailed information on the revised Standards is part of the PCI SSC’s ongoing commitment to provide a steady flow of information during the standards development process and eliminate any perceived surprises in the process.


Preserve and Protect Your Data

 

Summary
As the amount of data being created continues to increase, and that info is accessed and shared by more people, SMBs can’t afford to ignore the need for data protection. Small and medium businesses are powered by information.
Should your business lose that information or even suffer an interruption in access, it can have serious consequences. When it comes to protecting their electronic data, some SMBs feel they are at a disadvantage because they lack the large budgets and dedicated IT staff that many large enterprises enjoy. While this may be true, that doesn’t detract from the fact that SMBs face the same fundamental data protection concerns as large businesses, as no business is too small to be immune to data loss. As the amount of data being created continues to increase, and that info is accessed and shared by more people, you can’t afford to ignore the need for data protection.

Read more


Privacy Law: Helpful Guides
used with permission from SBA.gov

 

For many companies, collecting sensitive consumer and employee information is an essential part of doing business. It is your legal responsibility to take steps to properly secure or dispose of it.  Financial data, personal information from children, and material derived from credit reports may raise additional compliance considerations. In addition, you may have legal responsibilities to victims of identity theft.  The Federal Trade Commission (FTC)</span rel=”nofollow”> regulates and oversees business privacy laws and policies that impact consumers. Check out the following guides from more information on how you can ensure you are compliant.

Read more


Compliance Requirements You Need To Understand

HIPAA Compliance can be a mystery. It can be even more mysterious when you don’t understand technology. When you dig deep and try to understand the tasks and procedures you need to protect electronic data you are likely to encounter technical terms — and IT buzzwords —  that are confusing. Here are some tips you can use to ensure that your technology foundation is strong enough to support HIPAA compliance. Remember that HIPAA compliance is a fundamental requirement for you to earn and keep your Meaningful Use incentive money.

Read more


Where in the World is eMazzanti?
Advice to Managers
PCI Data Security Standard
Preserve and Protect
Privacy Law
Compliance Requirements
eMazzanti presents…
eMazzanti Rocks!
Opportunities

eMazzanti presents…

HIPAA – What’s New for Business Associates
Important changes have been made to the HIPAA Privacy and Security Rule.

Watch the Video


“eMazzanti Technologies is one of the top solution providers in the country driving big return on investment for customers. Congratultions on the LEADERSHIP SOLUTIONS you’re providing to clients!”Steven Burke
Everything Channel


SUPPORT
TREES FOR AMERICA!

Share your thoughts about your experience with eMazzanti and to thank you for writing a review, eMazzanti will donate $50 to Trees For America in order to plant trees in areas that have been affected by disaster. We can’t wait to hear from you! To find out how to help click here.



.

eMazzanti seeks bright
minds to join the team.

Currently we have
four Open Positions!
Check them out here!

Refer a Network Engineer and be eligible for a shopping spree at Mazzanti’s online store.  Qualifying applicants must receive full time employment and have referenced the referring friend on the original application in order for the referrer to be eligible for the annual drawing.  Shopping spree is limited to $1,000 in merchandise.

Watch our Recruitment Video!

Bryan Antepara

Bryan Antepara: IT Specialist Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers. Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service. He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

The Executive’s Guide to Security Operations Center Models

Cyber threats never take a day off, never clock out and go home at the…

3 days ago

Introduction to Azure Services

Building, deploying, and managing applications via Microsoft's global network of data centers is easier with…

3 days ago

Introduction to Microsoft Copilot

Microsoft Copilot is a tool, powered by AI, that aims to boost your productivity within…

4 days ago

Project Management: Why is it important?

Making things happen is the art and science of project management. The process involves managing…

1 week ago

Enhancing Website Performance and User Experience Through Caching Strategies

In today's fast digital life, website performance is important, as it holds visitors and ensures…

1 week ago

Protecting Municipal Data: Security Tips for City Officials

The FBI reported that cyber attacks against government facilities saw an increase of almost 36…

1 week ago