ANX Corporate Blog: Posts tagged as pci compliance

Showing 1 through 5 of 18 total posts

Jun 17th 2014, 14:46

Compliance and protection for pharmacy owners

Posted by Chris Schramm
A pizza joint has to worry about PCI compliance. PCI Compliance is securing their customer’s credit card and personal information. A hospital has to worry about HIPAA compliance. HIPAA compliance is securing a patient’s personal information.
What if you have to worry about both?
Pharmacies are in this unique situation. They are receiving information on a customer’s prescription. This falls under HIPAA. They then have to charge the customer via credit card. This falls under PCI.
Which one is more important?
That’s a loaded question. A violation of either can result is massive fees, fines and bad PR. So both are equal and extremely important. A slip up, and you could lose your pharmacy. Fees, fines and loss of business can often

Comment BubbleComments (0)

Jan 14th 2013, 22:18

Genghis Grill Selects ANX as Endorsed Data Security and Compliance Provider

Posted by Glenn Moore
Fast Casual Restaurant Chain Protects its Brand and Customer Data from Cyber Criminals
SOUTHFIELD, Mich. (January 15, 2013) – Genghis Grill, the popular fast casual Dallas, Texas based restaurant chain, has selected ANXeBusiness Corp. (ANX) as the endorsed provider of security and Payment Card Industry Data Security Standard (PCI-DSS) solutions to their franchise community.
The announced alliance supports Genghis Grill’s initiative to help their franchisees keep sensitive customer card data safe from cyber criminals using ANX’s SecurePCI solution.  The solution provides each Genghis Grill location with $100,000 of data breach protection services.  SecurePCI also includes a comprehensive managed security and

Comment BubbleComments (0)

Feb 24th 2012, 10:31

The Increasing Cost of Non-Compliance

Posted by Jorge Flores
Welcome to another beautiful Friday! Let’s start off today with a fun fact.
This Day in History: February 24, 1955
"A young boy is born to University of Wisconsin graduate students Joanne Simpson and Abdulfattah Jandali. He is given up for adoption and taken in by a machinist and his wife in Mountain View, California. His name was Steve Jobs."
Data Breaches: The Expense That Keeps Rising
As many of you already know, the Online Trust Alliance (OTA) just released their latest report: The 2012 Data Protection & Breach Readiness Guide. This report highlights some interesting statistics from companies that experienced data breaches in 2011; the year fittingly dubbed as “The Year of the Data Breach”. Let’s take a look at

Comment BubbleComments (0)

Feb 17th 2012, 10:32

The Essentials of Encryption

Posted by Jorge Flores
“The ability to spread knowledge and inspire action are two of man’s greatest gifts” -Unknown
Welcome to the third installment of my data breach prevention/PCI compliance Tip of the Week blog series!
Recently, a very large software company has come under fire after discovering a data breach in one of its servers in India. The dissent this particular breach event has drawn is not rooted in how the attack was carried out, but in the lack of data security on those servers. The customer information that was taken in the data breach was stored in plain text. Sensitive customer information (including identifying and password information) was not encrypted. This company is not alone. The sad truth is that as more and more data breaches occur, the inadequate

Comment BubbleComments (0)

Feb 10th 2012, 08:02

Data Breach Prevention / PCI Compliance Tip of the Week

Posted by Jorge Flores
Happy Friday everyone! It's been another week in the trenches talking to merchants and corporations about PCI compliance and data breach prevention. I'm doing a weekly blog summarizing some key observations. My objective with this blog is to bolster knowledge, dispel myths, and spread valuable information on various topics within the PCI compliance realm.
Data Breach Prevention/PCI compliance Tip of the Week: Change your default passwords!
A stifling amount of large data breaches involving sensitive information center around a common and highly preventable mistake; not changing default passwords! This is one of the top methods of attack that hackers use to penetrate a network.  In fact, password breach is consistently near the top of the list of data breach root

Comment BubbleComments (0)