SlideShare a Scribd company logo
1 of 3
Download to read offline
PCI DSS Compliance For
Remote Access During
COVID-19 Pandemic
How does the PCI Data Security Standard
(PCI DSS) support secure remote working?
Ÿ Uninstall or disable applica ons and so ware that may not be used, to reduce the risk of threat or
a ack from such sources.
As per PCI SSC, one of the best ways to guarantee con nued compliance is by maintaining a strong
security culture within the organiza on. Establishing a security culture does not just help deal with
challenges faced during the COVID-19 situa on but even beyond such a crisis, during such a similar
unforeseen situa on in the future. PCI SSC has provided several security requirements that should be
implementedtoprotectremoteworkersandtheirenvironments.Hereiswhattheguidelinesinclude-
Ÿ Use mul -factor authen ca on for all remote network access origina ng from outside the
company’s network.
Ÿ Enforce a strong password policy and do not allow the use of shared passwords. Addi onally,
employees should be educated about the importance of protec ng passwords and other
authen ca on creden als from unauthorized persons.
Ÿ Ensure all systems used by staff have up-to-date patches, an -malware protec on, and firewall
func onality in place to protect from internet-based threats.
Ÿ
As the COVID-19 pandemic con nues to spread across the world, companies have embraced the new
way of business opera ons. This includes allowing employees and stakeholders to work remotely. With
new government-mandated regula ons and restric ons on the movement of individuals, has widely
encouragedbusinessestoadoptremoteworkingmodels.Whilethismovehashelpedcontrolthespread
ofpandemicsitua onslargely,ithashoweverledtoasurgeincybercrimeslikedatabreach/the .
With cybersecurity issues growing dras cally, the PCI Security Standards Council was quick to recognize
the crisis situa on and the extraordinary circumstances that companies around the world are facing. To
address the severity of the situa on, PCI SSC issued a guideline detailing guidance for remote work. The
issuedguidestressestheneedtomaintainsecurityprac cestoprotectpaymentcarddata.However,itis
important to note that the issued guidelines are designed for this specific situa on of remote work and
© VISTA InfoSec ®
VISTA InfoSec’s Advice on taking preventive
measures for data theft/breach during
COVID-19 situation
Ÿ Implement access controls to ensure that only individuals who are authorized have access to the
cardholderdataenvironment(CDE)orthoseresources.
Ÿ Limitaccesstosystemcomponentsandcardholderdatatoonlyauthorizedindividuals.
Ÿ Have in place an appropriately configured VPN to protect all transmissions to/from the remote device
thatcontainssensi veinforma on.
Ÿ Ensure your organiza on has in place appropriate incident response plans to deal with unforeseen
situa ons. However, it is important to note that the procedures for detec ng and responding to a
poten aldatabreachfromremoteworkenvironmentscouldbedifferentfromon-siteloca ons.
Ÿ Automa cally disconnect remote access sessions a er a period of inac vity, to avoid idle, open
connec onsaccessedbyunauthorizedpersons.
The best way to secure confiden al data and prevent incidents of a breach is by building strong security
policies and procedures and having security awareness programs in place within the organiza on. This
will not only help organiza ons deal with unforeseen situa ons but also prevent incidents that may
impact business opera ons. To prevent falling prey to cybersecurity crimes here are some measures we
Security awareness programs
It goes without saying that, having in place necessary security awareness programs will go a long way in
protec ng confiden al data and prevent security breaches. Moreover, the security-awareness program
helps keep employees well informed about the poten al threat or risk they may encounter in an
unprotected environment. Besides it also helps the employees understand the importance of data
securityand compliance.Havingsaid that,companies that werePCI DSScompliant priorto this crisiswill
already have such a program in place. However, such programs may require some altera ons in the case
of addressing remote work challenges. They would need to probably educate employees about the
poten alrisksfromaremoteworkfromthehomeenvironment.Organiza onswillhavetolookforways
to ensure the con nued security of systems, processes, and equipment suppor ng the processing of
paymentcarddata.
Disaster or incident response program
While situa ons and nature of breach may definitely differ in a work remotely model, but it is equally
essen al and relevant for having a separate or altered disaster management program in place for a
remoteworkenvironment. Theorganiza onsshouldhaveinplacenecessarydeployableac onstodeal
with a situa on of the /breach. So, in an unforeseen event organiza on will be in a be er posi on to
recoveranddealwiththeincidentiftheyhaveappropriatemeasuresinplace.
© VISTA InfoSec ®
Do write to us your feedback, comments and queries or, if you have any requirements:
info@vistainfosec.com
You can reach us on:
USA
+1-415-513 5261
INDIA
+91 73045 57744
SINGAPORE
+65-3129-0397
© VISTA InfoSec ®
Monitoring process & Access
Situa ons are very different for both organiza ons and employees working from home. Keeping a tab on
employees adhering to security protocols is indeed a challenge for organiza ons. Companies must
effec vely monitor employees working remotely and processing card payments. Organiza ons should
haveinplacemeasuresthatensurecontrolledaccess.Haveinplaceamul -factorauthen ca onprocess
to ensure that no unauthorized person gets access cardholder payment data or account data. Deploy
necessary so ware or tools like Data Loss Preven on to secure and control data transfer. Tools like this
allow companies to monitor transfer or credit card informa on and block their transfer through insecure
exit points such as file-sharing services or instant messaging applica ons that employees may use while
working remotely. Organiza ons must also ensure that their employees destroy or shred any important
orsensi veinforma ondocumentifnolongerrequiredorstorethemsecurelyunderalock.
Company approved hardware
Employees should only use company-approved hardware for work which includes laptops, phones, hard
disks,drives,orUSBs.Thisisonewayanorganiza oncanmaintaincontrolofsystemsandthetechnology
suppor ng payment processing. Organiza ons can deploy DPL tools to ensure that no unauthorized
devices are connected to work computers. Deploying such tools will limit unauthorized access but also
block USBand peripheralports. Wealso recommend organiza ons updatetheiremployee’s laptops with
updated firewalls, an virus solu ons, and necessary security patches. The security controls deployed
shouldbeconfiguredinsuchawaythatuserscannotdisablethembyanymeans.
Conclusion
VISTA InfoSec has been serving clients in the industry for nearly 16 years. So, knowing the in’s out of
informa on security, we can help our clients maintain compliance even during a situa on of crisis. Our
expert advisors have the capability to assist companies prevent or even deal with the situa on of
breach/the . So if you are looking for expert advice to deal with the current challenges of COVID-19
situa on, do drop us a mail on askus[@]vistainfosec.com. For more details about our company and our
InfoSecSolu onofferingsdovisitourwebsitewww.vistainfosec.com
facebook.com/vistainfosec/ in.linkedin.com/company/vistainfosec twitter.com/VISTAINFOSEC

More Related Content

What's hot

The Ultimate Guide to PSIM - Introduction
The Ultimate Guide to PSIM - IntroductionThe Ultimate Guide to PSIM - Introduction
The Ultimate Guide to PSIM - IntroductionAdlan Hussain
 
Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management OverviewWesley Moore
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small BusinessesWilkins Consulting, LLC
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessAnton Chuvakin
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
Disaster Proofing Your Computer Systems
Disaster Proofing Your Computer SystemsDisaster Proofing Your Computer Systems
Disaster Proofing Your Computer Systemsandrewcahill
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Automated Incident Handling Using SIM
Automated Incident Handling Using SIMAutomated Incident Handling Using SIM
Automated Incident Handling Using SIMAnton Chuvakin
 
The importance of information security risk management
The importance of information security risk managementThe importance of information security risk management
The importance of information security risk managementMichael Francis
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0Aladdin Dandis
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation Adlan Hussain
 
Datix Handler Training manual
Datix Handler Training manualDatix Handler Training manual
Datix Handler Training manualOla Hill
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystepAllan Crowe PCIP
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseAnton Chuvakin
 

What's hot (20)

The Ultimate Guide to PSIM - Introduction
The Ultimate Guide to PSIM - IntroductionThe Ultimate Guide to PSIM - Introduction
The Ultimate Guide to PSIM - Introduction
 
Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management Overview
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response Process
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Disaster Proofing Your Computer Systems
Disaster Proofing Your Computer SystemsDisaster Proofing Your Computer Systems
Disaster Proofing Your Computer Systems
 
PSIM for Healthcare
PSIM for HealthcarePSIM for Healthcare
PSIM for Healthcare
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Automated Incident Handling Using SIM
Automated Incident Handling Using SIMAutomated Incident Handling Using SIM
Automated Incident Handling Using SIM
 
The importance of information security risk management
The importance of information security risk managementThe importance of information security risk management
The importance of information security risk management
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation CNL Software - IPSecurityCenter Presentation
CNL Software - IPSecurityCenter Presentation
 
Datix Handler Training manual
Datix Handler Training manualDatix Handler Training manual
Datix Handler Training manual
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
 

Similar to Pci dss compliance for remote access during covid 19 pandemic article 1 with links

Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity SMKCreations
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Richard Lawson
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
M2 Poster IT
M2 Poster ITM2 Poster IT
M2 Poster ITSam DB
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfBahaa Abdul Hussein
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReportfinance40
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Md Shaifullar Rabbi
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptxItzRoswell1
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxmccormicknadine86
 
COMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docxCOMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docxToobaTanvir3
 

Similar to Pci dss compliance for remote access during covid 19 pandemic article 1 with links (20)

Module 1 / Unit 5 Digital Cybersecurity
Module 1 / Unit 5  Digital Cybersecurity Module 1 / Unit 5  Digital Cybersecurity
Module 1 / Unit 5 Digital Cybersecurity
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
NCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdfNCSC_SBG_Actions.pdf
NCSC_SBG_Actions.pdf
 
Policy for PDO
Policy for PDOPolicy for PDO
Policy for PDO
 
M2 Poster IT
M2 Poster ITM2 Poster IT
M2 Poster IT
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdfImplementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
Implementing Cyber Security for Digital Finance - Bahaa Abdul Hussein .pdf
 
Symantec_2004_AnnualReport
Symantec_2004_AnnualReportSymantec_2004_AnnualReport
Symantec_2004_AnnualReport
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
CYBERSECURITY.pptx
CYBERSECURITY.pptxCYBERSECURITY.pptx
CYBERSECURITY.pptx
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docxCMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
CMGT 400 Grading Rubric Learning Team – CMGT 400 Week 4 Learning Tea.docx
 
COMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docxCOMPUTER SYSTEM SECURITY.docx
COMPUTER SYSTEM SECURITY.docx
 

More from VISTA InfoSec

Future of Data Privacy Examining the Impact of GDPR and CPRA on Business Prac...
Future of Data Privacy Examining the Impact of GDPR and CPRA on Business Prac...Future of Data Privacy Examining the Impact of GDPR and CPRA on Business Prac...
Future of Data Privacy Examining the Impact of GDPR and CPRA on Business Prac...VISTA InfoSec
 
CCPA Compliance Vs CPRA Compliance.pdf
CCPA Compliance Vs CPRA Compliance.pdfCCPA Compliance Vs CPRA Compliance.pdf
CCPA Compliance Vs CPRA Compliance.pdfVISTA InfoSec
 
HIPAA Compliance Checklist 2022
HIPAA Compliance Checklist 2022HIPAA Compliance Checklist 2022
HIPAA Compliance Checklist 2022VISTA InfoSec
 
SOC2 Advisory and Attestation
SOC2 Advisory and AttestationSOC2 Advisory and Attestation
SOC2 Advisory and AttestationVISTA InfoSec
 
What is expected from an organization under NCA ECC Compliance?
What is expected from an organization under NCA ECC Compliance?What is expected from an organization under NCA ECC Compliance?
What is expected from an organization under NCA ECC Compliance?VISTA InfoSec
 
Webinar - PCI DSS Merchant Levels validations and applicable
Webinar - PCI DSS Merchant Levels validations and applicableWebinar - PCI DSS Merchant Levels validations and applicable
Webinar - PCI DSS Merchant Levels validations and applicableVISTA InfoSec
 
Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates VISTA InfoSec
 
Webinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key managementWebinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key managementVISTA InfoSec
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesVISTA InfoSec
 
What to expect from the New York Privacy Act
What to expect from the New York Privacy ActWhat to expect from the New York Privacy Act
What to expect from the New York Privacy ActVISTA InfoSec
 
Guide on ISO 27001 Controls
Guide on ISO 27001 ControlsGuide on ISO 27001 Controls
Guide on ISO 27001 ControlsVISTA InfoSec
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Why should I do SOC2?
Why should I do SOC2?Why should I do SOC2?
Why should I do SOC2?VISTA InfoSec
 
What is GDPR Data Flow Mapping
What is GDPR Data Flow MappingWhat is GDPR Data Flow Mapping
What is GDPR Data Flow MappingVISTA InfoSec
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
Which SOC Report Do I need?
Which SOC Report Do I need?Which SOC Report Do I need?
Which SOC Report Do I need?VISTA InfoSec
 
Key additions and amendments introduced under the CPRA
Key additions and amendments introduced under the CPRAKey additions and amendments introduced under the CPRA
Key additions and amendments introduced under the CPRAVISTA InfoSec
 
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery ProcessVISTA InfoSec
 
SOC 2 Type 1 Vs. Type 2: Do You Really Need It? This Will Help You Decide!
SOC 2 Type 1 Vs. Type 2: Do You Really Need It? This Will Help You Decide! SOC 2 Type 1 Vs. Type 2: Do You Really Need It? This Will Help You Decide!
SOC 2 Type 1 Vs. Type 2: Do You Really Need It? This Will Help You Decide! VISTA InfoSec
 
Why is gdpr essential for small businesses with links
Why is gdpr essential for small businesses with linksWhy is gdpr essential for small businesses with links
Why is gdpr essential for small businesses with linksVISTA InfoSec
 

More from VISTA InfoSec (20)

Future of Data Privacy Examining the Impact of GDPR and CPRA on Business Prac...
Future of Data Privacy Examining the Impact of GDPR and CPRA on Business Prac...Future of Data Privacy Examining the Impact of GDPR and CPRA on Business Prac...
Future of Data Privacy Examining the Impact of GDPR and CPRA on Business Prac...
 
CCPA Compliance Vs CPRA Compliance.pdf
CCPA Compliance Vs CPRA Compliance.pdfCCPA Compliance Vs CPRA Compliance.pdf
CCPA Compliance Vs CPRA Compliance.pdf
 
HIPAA Compliance Checklist 2022
HIPAA Compliance Checklist 2022HIPAA Compliance Checklist 2022
HIPAA Compliance Checklist 2022
 
SOC2 Advisory and Attestation
SOC2 Advisory and AttestationSOC2 Advisory and Attestation
SOC2 Advisory and Attestation
 
What is expected from an organization under NCA ECC Compliance?
What is expected from an organization under NCA ECC Compliance?What is expected from an organization under NCA ECC Compliance?
What is expected from an organization under NCA ECC Compliance?
 
Webinar - PCI DSS Merchant Levels validations and applicable
Webinar - PCI DSS Merchant Levels validations and applicableWebinar - PCI DSS Merchant Levels validations and applicable
Webinar - PCI DSS Merchant Levels validations and applicable
 
Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates
 
Webinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key managementWebinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key management
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
 
What to expect from the New York Privacy Act
What to expect from the New York Privacy ActWhat to expect from the New York Privacy Act
What to expect from the New York Privacy Act
 
Guide on ISO 27001 Controls
Guide on ISO 27001 ControlsGuide on ISO 27001 Controls
Guide on ISO 27001 Controls
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Why should I do SOC2?
Why should I do SOC2?Why should I do SOC2?
Why should I do SOC2?
 
What is GDPR Data Flow Mapping
What is GDPR Data Flow MappingWhat is GDPR Data Flow Mapping
What is GDPR Data Flow Mapping
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
Which SOC Report Do I need?
Which SOC Report Do I need?Which SOC Report Do I need?
Which SOC Report Do I need?
 
Key additions and amendments introduced under the CPRA
Key additions and amendments introduced under the CPRAKey additions and amendments introduced under the CPRA
Key additions and amendments introduced under the CPRA
 
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
 
SOC 2 Type 1 Vs. Type 2: Do You Really Need It? This Will Help You Decide!
SOC 2 Type 1 Vs. Type 2: Do You Really Need It? This Will Help You Decide! SOC 2 Type 1 Vs. Type 2: Do You Really Need It? This Will Help You Decide!
SOC 2 Type 1 Vs. Type 2: Do You Really Need It? This Will Help You Decide!
 
Why is gdpr essential for small businesses with links
Why is gdpr essential for small businesses with linksWhy is gdpr essential for small businesses with links
Why is gdpr essential for small businesses with links
 

Recently uploaded

Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

Pci dss compliance for remote access during covid 19 pandemic article 1 with links

  • 1. PCI DSS Compliance For Remote Access During COVID-19 Pandemic How does the PCI Data Security Standard (PCI DSS) support secure remote working? Ÿ Uninstall or disable applica ons and so ware that may not be used, to reduce the risk of threat or a ack from such sources. As per PCI SSC, one of the best ways to guarantee con nued compliance is by maintaining a strong security culture within the organiza on. Establishing a security culture does not just help deal with challenges faced during the COVID-19 situa on but even beyond such a crisis, during such a similar unforeseen situa on in the future. PCI SSC has provided several security requirements that should be implementedtoprotectremoteworkersandtheirenvironments.Hereiswhattheguidelinesinclude- Ÿ Use mul -factor authen ca on for all remote network access origina ng from outside the company’s network. Ÿ Enforce a strong password policy and do not allow the use of shared passwords. Addi onally, employees should be educated about the importance of protec ng passwords and other authen ca on creden als from unauthorized persons. Ÿ Ensure all systems used by staff have up-to-date patches, an -malware protec on, and firewall func onality in place to protect from internet-based threats. Ÿ As the COVID-19 pandemic con nues to spread across the world, companies have embraced the new way of business opera ons. This includes allowing employees and stakeholders to work remotely. With new government-mandated regula ons and restric ons on the movement of individuals, has widely encouragedbusinessestoadoptremoteworkingmodels.Whilethismovehashelpedcontrolthespread ofpandemicsitua onslargely,ithashoweverledtoasurgeincybercrimeslikedatabreach/the . With cybersecurity issues growing dras cally, the PCI Security Standards Council was quick to recognize the crisis situa on and the extraordinary circumstances that companies around the world are facing. To address the severity of the situa on, PCI SSC issued a guideline detailing guidance for remote work. The issuedguidestressestheneedtomaintainsecurityprac cestoprotectpaymentcarddata.However,itis important to note that the issued guidelines are designed for this specific situa on of remote work and © VISTA InfoSec ®
  • 2. VISTA InfoSec’s Advice on taking preventive measures for data theft/breach during COVID-19 situation Ÿ Implement access controls to ensure that only individuals who are authorized have access to the cardholderdataenvironment(CDE)orthoseresources. Ÿ Limitaccesstosystemcomponentsandcardholderdatatoonlyauthorizedindividuals. Ÿ Have in place an appropriately configured VPN to protect all transmissions to/from the remote device thatcontainssensi veinforma on. Ÿ Ensure your organiza on has in place appropriate incident response plans to deal with unforeseen situa ons. However, it is important to note that the procedures for detec ng and responding to a poten aldatabreachfromremoteworkenvironmentscouldbedifferentfromon-siteloca ons. Ÿ Automa cally disconnect remote access sessions a er a period of inac vity, to avoid idle, open connec onsaccessedbyunauthorizedpersons. The best way to secure confiden al data and prevent incidents of a breach is by building strong security policies and procedures and having security awareness programs in place within the organiza on. This will not only help organiza ons deal with unforeseen situa ons but also prevent incidents that may impact business opera ons. To prevent falling prey to cybersecurity crimes here are some measures we Security awareness programs It goes without saying that, having in place necessary security awareness programs will go a long way in protec ng confiden al data and prevent security breaches. Moreover, the security-awareness program helps keep employees well informed about the poten al threat or risk they may encounter in an unprotected environment. Besides it also helps the employees understand the importance of data securityand compliance.Havingsaid that,companies that werePCI DSScompliant priorto this crisiswill already have such a program in place. However, such programs may require some altera ons in the case of addressing remote work challenges. They would need to probably educate employees about the poten alrisksfromaremoteworkfromthehomeenvironment.Organiza onswillhavetolookforways to ensure the con nued security of systems, processes, and equipment suppor ng the processing of paymentcarddata. Disaster or incident response program While situa ons and nature of breach may definitely differ in a work remotely model, but it is equally essen al and relevant for having a separate or altered disaster management program in place for a remoteworkenvironment. Theorganiza onsshouldhaveinplacenecessarydeployableac onstodeal with a situa on of the /breach. So, in an unforeseen event organiza on will be in a be er posi on to recoveranddealwiththeincidentiftheyhaveappropriatemeasuresinplace. © VISTA InfoSec ®
  • 3. Do write to us your feedback, comments and queries or, if you have any requirements: info@vistainfosec.com You can reach us on: USA +1-415-513 5261 INDIA +91 73045 57744 SINGAPORE +65-3129-0397 © VISTA InfoSec ® Monitoring process & Access Situa ons are very different for both organiza ons and employees working from home. Keeping a tab on employees adhering to security protocols is indeed a challenge for organiza ons. Companies must effec vely monitor employees working remotely and processing card payments. Organiza ons should haveinplacemeasuresthatensurecontrolledaccess.Haveinplaceamul -factorauthen ca onprocess to ensure that no unauthorized person gets access cardholder payment data or account data. Deploy necessary so ware or tools like Data Loss Preven on to secure and control data transfer. Tools like this allow companies to monitor transfer or credit card informa on and block their transfer through insecure exit points such as file-sharing services or instant messaging applica ons that employees may use while working remotely. Organiza ons must also ensure that their employees destroy or shred any important orsensi veinforma ondocumentifnolongerrequiredorstorethemsecurelyunderalock. Company approved hardware Employees should only use company-approved hardware for work which includes laptops, phones, hard disks,drives,orUSBs.Thisisonewayanorganiza oncanmaintaincontrolofsystemsandthetechnology suppor ng payment processing. Organiza ons can deploy DPL tools to ensure that no unauthorized devices are connected to work computers. Deploying such tools will limit unauthorized access but also block USBand peripheralports. Wealso recommend organiza ons updatetheiremployee’s laptops with updated firewalls, an virus solu ons, and necessary security patches. The security controls deployed shouldbeconfiguredinsuchawaythatuserscannotdisablethembyanymeans. Conclusion VISTA InfoSec has been serving clients in the industry for nearly 16 years. So, knowing the in’s out of informa on security, we can help our clients maintain compliance even during a situa on of crisis. Our expert advisors have the capability to assist companies prevent or even deal with the situa on of breach/the . So if you are looking for expert advice to deal with the current challenges of COVID-19 situa on, do drop us a mail on askus[@]vistainfosec.com. For more details about our company and our InfoSecSolu onofferingsdovisitourwebsitewww.vistainfosec.com facebook.com/vistainfosec/ in.linkedin.com/company/vistainfosec twitter.com/VISTAINFOSEC