Your tired and tired of working in your office, so you head down to the nicest Starbucks in your area to get a coffee. The shop has got a few other people in it like you - waking up from a low point in the afternoon. You notice that several of the people have laptops, but there is a nice table near an outlet so you can plug in if you need it.
As more information and applications are moving to the cloud, it is necessary to secure all of these against unintended or malicious access. How you choose to protect that information depends on the value of the information to your business. This post looks at a couple of means for protecting your business property that resides in the cloud - standard web access security, username/password authentication, two-factor access, and encoding.
Payment Card Industry (PCI) compliance is made up of two parts. The first part is a scan of the merchant's computer and network systems. The second part is self assessment questionnaire covering twelve items. This post discusses the scanning of the merchant's computer and network.
The rules for handling credit cards are beginning to be enforced by the credit card issuers (e.g., MasterCard). This post describes the compliance process for small businesses.