Blog

Key Takeaways from the PCI Awareness Training Course

by Futurex on January 23rd, 2017

A core facet of Futurex’s corporate culture is the ability to continually improve one’s own knowledge of the data security industry. From time to time, it can be beneficial for those of us at Futurex to revisit the fundamental concepts that shape what we do. In this vein of committing to improving our own knowledge, I decided to revisit the fundamentals of PCI requirements. To do so, I enrolled in the PCI Training course, which became available at no cost, as part of Global Payment Security Education Week. PCI Data Security Standards are set forth by the Payment Card Industry Security Standards Council (PCI SSC) to safeguard cardholder data, and they apply to any organization that has a hand in transmitting cardholder data.

Read More
Join Futurex in Celebrating Data Privacy Day on January 28th

Join Futurex in Celebrating Data Privacy Day on January 28th

by Futurex on January 16th, 2017

In today’s world, where much of our lives are lived while being connected online, there is limitless personally identifiable information (PII) in existence. Identifying data, such as your name, address, and date of birth, is freely available on the web. Also prevalent is the information about terms you search, where you work, where you have lived, which public figures you follow, which restaurants and shops you frequent, and any content you like or favorite. Due to this rich breadth and depth of information, it is important that we collectively make maintaining our privacy hygiene a higher priority.

Read More

Q&A: ATM Remote Key Loading

by Futurex on August 22nd, 2016

According to the Federal Reserve, automated teller machines (ATMs) are the second most commonly used method of interacting with financial institutions. This Q&A outlines the physical and logical protection needed for the rapidly growing number of ATMs.

Read More

Defining Insider Attacks

by Futurex on August 16th, 2016

A malicious outside is often portrayed as a person with a black hoodie, typing viciously on a keyboard to extract sensitive data from the depths of an organizational IT infrastructure. Organizations expect these attacks; they know the enemy and prepare for it. But what about the attacks you don’t expect? I am going to talk about insider attacks, who they are, and why I think this is so important to set up security measures to protect your organization from the inside out.

Read More