What PCI Compliance Is All About!
Information Technology (IT) departments, and companies in general are expected to have policies, processes and controls that address the confidentially, integrity and availability of PII. An effective information security system starts with processes that audit and monitor data. These functions should be the safeguards against unauthorized access, theft and illicit use of PII.
Typically though, companies are not taking these activities seriously, and thus, are leaving their systems wide open to the possibility of theft. Most theft or misuse of PII and other information comes from within an organization.
Effective monitoring tools that are configured properly and reviewed regularly are the first line of defense. Loss of data occurs from the lack of and adherence to policies and procedures related to information handling. It is estimated that between 85% and 90% of the data theft cases reported could have been detected and, in some cases prevented with effective monitoring.
Article by “CSR”
Please Contact Tina Louise for more information…