IT Security Services
Identity theft has become a multi-billion dollar issue that continues to accelerate. Protecting against it has become a multi-million dollar business. A survey conducted by the Federal Trade Commission (FTC) in 2006 estimated that 8.3 million American consumers, or 3.7 percent of the adult population, became victims of identity theft in 2005. Reported incidents collected by the agency in its annual fraud analysis showed 258,427 cases logged in their databases.
The Payment Card Industry is becoming very strict in enforcing the guidelines of the PCI-DSS standards. Protecting customer credit card information is very critical in establishing a well-rounded secure business. MBM Consulting Services has qualified PCI-DSS staff that can assist you in meeting your PCI requirements. Contact an MBM Consultant to help you become compliant.
The purpose of an information security architecture in today's organizations, is to bring focus to the key areas of concern for the enterprise, highlighting decision criteria and context for each domain. Since security is a system property it can be difficult for Enterprise Security groups to separate the disparate concerns that exist at different system layers and to understand their role in the system as a whole. With this said, each organization needs to develop an Information Security Architecture Blueprint. The blueprint will provide the organization a framework for understanding disparate design and process considerations; to organize architecture and actions toward improving enterprise security.
Many organizations confuse Vulnerability Assessments with Penetration Testing. These are two separate activities. Vulnerability Assessments pertain to an organizations Information Security Posture. The Vulnerability Assessment identifies any areas of the organizations network infrastructure that may be vulnerable to attacks. Penetration Testing tests those open holes to ensure those vulnerabilities are not present in an organizations information technology infrastructure.