What are the services you need from Dynamic Net, Inc. once you’ve made the decision you want to have a fully integrated (i.e. the customer never leaves your web site) PCI Compliant hosting experience?
Maybe you’ve been one of our customers for years, and need to be PCI compliant for your eCommerce offerings. Maybe you’ve read Revealing the process of becoming PCI Compliant, and decided you want care from a provider with high integrity as well as great security. Either way, you want to know the minimum requirements you need from us in order to get off the ground and become PCI Compliant.
Are you being lulled into believing you are on a managed server when you rent your server from the likes of Rackspace.com and other data centers stating they are offering managed servers?
What does it really mean when a data center provider states they offer managed servers?
If you want to accept credit cards online, then you need to be PCI Compliant, whether your business is brand new, or your business been established for centuries.
Over the years, we’ve helped various business owners and managers to become PCI Compliant.
To those who have not gone through the PCI Compliance process, the road to having their first PCI Compliance certificate can look long, hard, and daunting.
This article is meant to take away the sting, especially for first time business owners and managers, by revealing the process of becoming PCI Compliant.
Prior to today, my recommendation for creating secure passwords was to browse https://www.random.org/passwords/?num=20&len=12&format=html&rnd=new, and pick a random password.
The problem with this method is that it forces you to memorize something very foreign to you or to have a method to help you remember the password.
Did you know there’s an easier way to create secure passwords? Let me walk you through the thought process.
With that many web hosting providers, it can be easy to get into the mentality of well, a computer is a computer, and automation is automated… therefore hosting is a commodity… and therefore it all comes down to who has the best price for the amount of storage, traffic, and generic feature sets.
Yet, behind all of those web hosting provider businesses are stewards who set up and maintain the security (or do they?), who set up and maintain the infrastructure (or do they?), and so on.
Even though we strongly believe security should be an entitlement for hosting customers, we strongly believe that security starts at home.
A hosting provider can have the most secure environment in the world, but if the customer uses weak passwords and out-dated applications, then that’s like waving a sign stating “thieves and vandals welcome.”
According to a Gartner Survey done in August 2006, approximately $2 billion in ecommerce sales were lost because of security concerns among online shoppers. Providing a secure online environment builds customer trust in your website and can translate into increased sales and other conversion activity. Website security is a must for online transactions.
I think one of the lessons we all learn growing up is that being a snitch — tattling, whistle blowing, etc. — is a bad thing; and that only in the face of death (even if that counts for anything) should you even consider being a snitch.
Sometimes I think that attitude is so pervasive in our society, at large, that most of us impacted by hackers do not even consider snitching on the hacker who tried to break into our web site, email, database, or server. Even if it did cross one’s mind, some might have the attitude of what good will it do especially given the global nature of the Internet — who has jurisdiction, language barriers, culture barriers, and what else might be present.
How does one even know if their web site or server is subject to being attacked?
Does your hosting provider believe you are entitled to peace of mind? Does your hosting provider believe you have the right to be secure in your own (hosting) home? If yes, what are their actions? Let me share with you, our point of view.
What can be done to go above and beyond PCI compliance? What can be done to proactively know if a shared hosting customer has malware or hacks on their site?
Would it make sense for some one to tell you a building was being kept secure from trespassers; yet, as you watched, over time, you didn’t see anyone on foot patrolling the area (inside or out), did not see anyone watching monitors (where there even cameras monitoring areas?), there were no recordings from the monitors being kept for any period of time. How would you feel about the security of the building? Could the security team learn from break in attempts? Would the security team even know if there was a break in?
Are you involved in the PCI Compliance dance? Do you know your partners? Do you need a PCI Compliant hosting provider who takes the dance seriously? Who will hold your hand, and walk you through any difficult or tedious step?