Skip to content

What PCI Compliance Is All About!

December 3, 2012

PCIInformation Technology (IT) departments, and companies in general are expected to have policies, processes and controls that address the confidentially, integrity and availability of PII.  An effective information security system starts with processes that audit and monitor data. These functions should be the safeguards against unauthorized access, theft and illicit use of PII.

Typically though, companies are not taking these activities seriously, and thus, are leaving their systems wide open to the possibility of theft. Most theft or misuse of PII and other information comes from within an organization.

Effective monitoring tools that are configured properly and reviewed regularly are the first line of defense. Loss of data occurs from the lack of and adherence to policies and procedures related to information handling. It is estimated that between 85% and 90% of the data theft cases reported could have been detected and, in some cases prevented with effective monitoring.

Article by “CSR”

Please Contact Tina Louise for more information…



No comments yet

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: