Remember Y2K? Panic. Confusion. Companies bombarded with hype and opinion. There are some of us old enough to remember all the warnings of doom and gloom if you were not ready. System meltdown and businesses going to the wall. The build up to GDPR was rather like Y2K. The many GDPR emails with warnings we… Read more »
Posts Categorized: Compliance
The ASV Program Guide describes the various responsibilities for all parties involved in the PCI ASV Scanning process. There are a number of parties, but here we’re just concentrating on two. They are the scan customer (you) and the Approved Scanning Vendor (Ambersail). The following text is taken from the official ASV program guide, which… Read more »
Recently, we have started with a significant number of new clients on ASV scanning projects. This is the PCI scan on networks that needs to be performed by merchants and service providers. Nothing new in that. We have been an ASV for over ten years. What has caught our eye is what has prompted these… Read more »
Business owners: is your cyber security health at risk? I can tell you that the bar for cyber security health in many small businesses is very low indeed. There are two important facts I’d like to point out concerning the cyber security health of the nation. Firstly, that the economy consists mostly of smaller businesses, many… Read more »
Ensuring that the Board understands how cyber security risks affect the business – a challenge for all Non-Executive Directors
AMEX now maintains a full list of all PCI DSS compliant service providers. Service providers pay a fee to register, and full details of the scheme are available directly from the AMEX web site.
How much penetration testing and vulnerability scanning does PCI DSS v3 require?
We’re pleased to announce that Ambersail is a Cyber Essentials Certification Body and we can help you achieve either Stage 1 or Stage 2 compliance as required. Cyber Essentials is a UK Government-sponsored scheme open to organisations of all sizes. It includes a formal certification showing adherence to a basic set of information security controls. It is… Read more »