We are getting more and more customers being targeted by companies trying to convince them that their whole corporate network should be PCI compliant if they process credit card information. Without thinking and planning how to do this, it is an understandable assumption.
I was recently locked in a room for an afternoon for various presentations on the subject of email security – such is the rock and roll lifestyle I lead here at Virtual IT. However I did find it mildly enlightening and it did make me think a little about how a very involved and technical process can remain almost invisible to the end user.
Security is never far from the top of the agenda and a couple of stories that caught my eye recently brought this into focus.
Firstly – Associated Press (AP) who recently had their Twitter account hacked. The hacker then tweeted that there had been an explosion at the White House and that President Obama had been injured. This was rectified reasonably quickly but not before the US stock market took a dive based on this misinformation. AP managed to regain control of their twitter account in fairly short order, and I’m sure you’ll be pleased to know that the stock market also recovered, and the world didn’t implode on itself in the mass panic. The only real lasting effect of this as far as I can see was a significant amount of egg on the collective face of AP.