CaaS/MaaS – Crime as a Service/Malware as a Service

Technology has always proven to be a double-edged sword throughout history; as the world improves technology standards and efficiency, so do the bad guys. The latest iteration of threats come in the form of what we know today as SaaS, but are re-engineered for malicious purposes and redefined as CaaS...

The MYTH of getting robbed from your pocket via Contactless Payments

While navigating on social media, I found a video around contactless fraud. The video warns people to be protective of their wallets as he initiated a contactless transaction with another person who carried his wallet inside his back pocket (you can see the video here). Of course, a video like...

Simple Security Tips for Consumers

We see a steady stream of news stories about data breaches that result in damage to company reputations, impact to share valuation, cost to implement new security measures and in many cases fines and/or penalties to cover the cost of associated fraud. In the payments and security world, we tend...

India Drafts Policy to Reduce Influence of Large Tech Companies

The following has been re-posted from Loyalty360. The original article can be found here. The draft of a new e-commerce policy has emerged in India, one that calls for a “level playing field” between Indian businesses and global competitors. The policy, if enacted, would require tech companies like Amazon or...

My Compliance Assessment Didn’t Go Well… Now What?

It’s a scary situation: after all the meetings, evidence gathering and reviews, the compliance assessment comes back with red flags. Regardless of the type of compliance assessment (PCI, SOX, SOC-2, etc.) the prospect of fines and/or business interruptions can put a dark cloud over any organization. So what do you...

W. Capra and McAfee Services

The following video was created by McAfee for their MPOWER Cybersecurity Summit. Featuring W. Capra Partner Matt Beale, the video discusses the professional relationship between McAfee and W. Capra. https://youtu.be/CU3kh9dePG8

Unlocking Security Issues

The following article has been re-posted from Convenience Store Decisions. The original posting can be found here. A multi-faceted approach to store security—from locks and cameras to smart safes and best practices in data security—is necessary to keep c-stores safe from theft in 2017. By Ed Collupy Around-the-clock business like...

The Dust Has Settled On Equifax. What Now?

On September 7, Equifax, one of the “big three” U.S. credit bureaus, announced a massive data breach impacting an estimated 143 million Americans.  Now that preliminary information related to the breach has been released, this CapraPLUS post reflects on what happened, the impacts of the event (both immediate and long-term),...

InfoSec: Facts vs. Feelings

Preservation of cultural integrity within an organization is often among senior leadership’s top priorities. This is understandable, given the influence that culture has on morale, efficiency, and productivity. Potential impact to the culture holds significant weight in decision making processes across all departments, particularly those that are revenue generators (aka...

What Happens When the Lights Go Out?

Background Driven by the high-profile data security breaches at global retail brands (Target, Michaels, etc.) over the past 10 years, directors across all retail verticals have elevated data security to a top priority of their organizations.  As a result, maintaining the confidentiality and integrity of PCI, PII, and sensitive corporate...

SIEM Without Limits

The following presentation from W. Capra’s Joe Piggeé Sr., along with the associated article below, has been re-posted from Information Security Solutions Review. You can find the original posting here. In this video you will: Understand what SIEM is. Learn what a SIEM can do. Know what to expect of...

Store Data Deserves Protection Too

The following, written by W. Capra’s Ed Collupy, has been re-posted from C-Store Decisions. As c-store retailers implement enhanced inventory-management solutions, they should also consider doing more to secure inventory data. So much of the attention on data security in the last few years has been focused on payments and...

Verified by MonsterInsights