847.221.0200  Main Office
800.925.0559  INCIDENT RESPONSE HOTLINE

Halock Blog

pci-looming-thumb

PCI v3.0 Transition Year Ends…With One More Deadline Looming »

 

As we rang in the New Year, the transition year for PCI v3.0 compliance came to a close.  All businesses are now required to be compliant with version three of the PCI Data Security Standard (DSS).  But did you know that a handful of the requirements are still considered best practice until they become … Read More »

givesback-thumbr

HALOCK Gives Back – 2014 Year in Review »


All year long, HALOCK employees are helping clients secure their information and data assets, and at the same time, these same employees are great stewards of the communities in which they live.  In 2014, they have run, walked, biked and stepped up innumerable stairs for worthy causes. They’ve lost a few golf balls for … Read More »

regen-thumb

In the Wake of REGIN: Accounting for the State Sponsored Threat »


Recently the Symantec Corporation uncovered a highly sophisticated, modular piece of malware that has been infecting computers in a variety of countries as far back as 2008. Backdoor.regin has characteristics beyond those of modern malware and is already generally accepted as a product of nation-state cyber espionage. The implant likely took considerable resources and … Read More »

protect-mobile-thumb

IT Pros: 4 Tips to Help Friends & Family Protect their Mobile Devices this Holiday Season »


As the holidays approach, you’ll probably be seeing many relatives and friends. Many will pull you aside and ask you about the latest security news, myths and rumors. While preparing for a Thanksgiving visit, one relative asked me about a hoax security alert warning that her iPhone’s flashlight was listening to her conversations.
Educated security … Read More »

shellshock-thumb

All Done with Shellshock? Get Ready for the Next One. »

Why read another article on the Shellshock bug when there have been a number of well-written articles and blog posts on it? Because almost all of the articles and blogs are talking about the bug itself, how it can be exploited, and how much of the Internet is open to it. However, what you … Read More »

View Older Posts