Topic Category: Information Security
Computer and Laptop Security Best Practices While Traveling Many data breaches happen because an employee saves sensitive information on the laptop and that laptop was stolen while the employee …
What information should employees have access to? Employees working with cardholders: Employees who are working directly to support cardholders, such as call-center and operational employees, will generally have access to …
What Should I do if I have access to data, or see data, that I should not? In an email: if you receive sensitive data in an email, make …
PII Data What is PII? PII is any Personally Identifiable Information (PII) for any individual. This includes (but is not limited to): person’s name address telephone number email address …
PCI Data What is PCI and PCI DSS? PCI and PCI DSS stand for Payment Card Industry Data Security Standards. These set of rules govern how the financial industry …
Monitoring Employee Access Prepaid Program Managers should conduct a monthly audit of user access to sensitive systems to ensure that everyone has access to only the data that they …
What Information Should You be able to Access Prepaid Program Managers work in the financial services industry. Even if you are a FinTech company or entrepreneurial company, you are …
Shredding and Physical Disposal of Physical Plastics MasterCard and Visa have specific rules about how to destroy card plastics. From the time you receive card plastics, the plastics/envelopes need …
Disposal of Computers, Phones and Drives When you need to destroy something that is thin (paper, CDs/DVDs, card plastics), always use a crosscut shredder. The result is little tiny …
Encryption Encrypted and password-protected are often used synonymously. This is true to some extent, but not entirely. Keep in mind these key points about each. Password protecting a Microsoft …