Support Center

InfoSec Tools

Last Updated: Mar 20, 2019 07:28AM EDT

2018 Data Breach Investigations Report (Verizon)
2018 Trustwave Global Security Report
2017 Data Breach Investigations Report (Verizon)
2016 Identity Fraud: Fraud Hits an Inflection Point (Javelin)
2016 Trustwave Global Security Report
California Consumer Privacy Act of 2018
Consumer Attitudes Toward Breaches (Merchant Acquirers' Committee)
GDPR Key Changes (
Guidance for Multi-Factor Authentication (PCI Security Standards Council)
Hacked Email (
Identity Theft Threat and Mitigations (National Security Agency)
Net Losses: Estimating the Global Cost of Cybercrime (McAfee)
PCI DSS v3.2.1 (PCI Security Standards Council)
PCI DSS v3.2 (PCI Security Standards Council)
PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users (PCI Security Standards Council)
Place a Security Freeze on Your Credit (TransUnion)
Reform of EU Data Protection Rules (European Commission)
Security Breach Response Plan Toolkit (International Association of Privacy Professionals)
Social Networking and Identity Theft (Identity Theft Resource Center)
US DHS, DOJ Respond to Carper Inquiries on Agencies' Response to Threat of Ransomware





  Acceptable Use Policy - Details appropriate electronic usage at work


  Baiting - Leaving USB drives in random places; when inserted into a computer, they install a virus


  Document Disposal Policy - Details the process for disposing of sensitive paperwork
  Dumpster Diving - Pulling personal information from a trashcan or dumpster

  Identity Theft - When criminals use stolen PII to create a “new” identity

  Juice Jacking - Stealing personal data from a cell phone while it’s being charged at a public charging station
  Malware - Intrusive software that allows unauthorized access to a computer or network
  Mobile Pay - When customers pay with their smartphones through mobile-based readers or terminals, near-field or other close-range communications, or mobile apps
  Mousejack Attack - Hacking computers at a distance of 100 yards, using wireless devices
  Password Policy - Identifies recommendations for password creation
  Payment Card Industry (PCI) - The Payment Card Industry (PCI) denotes the debit, credit, prepaid, e-purse, ATM, and POS cards and associated businesses
  Payment Card Industry Security Standards Council - The Payment Card Industry Security Standards Council was formed by the major card issuers (American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International) to manage the ongoing evolution of the Payment Card Industry Data Security Standard (PCI DSS)
  Payment Card Industry Data Security Standard (PCI DSS) - The PCI DSS consists of 12 requirements with multiple sub-requirements that contain directives against which businesses may measure their own payment card security policies, procedures and guidelines. Compliance efforts and acceptance must be completed on a periodic basis.
  Phishing - Using legitimate-looking emails to try and steal personal information
  Piggybacking - Convincing authorized personnel to let you follow them into a secure area
  PII - Personally Identifiable Information
  Privacy Policy - Used to notify guests about the type of PII that will be collected and the company’s commitment to protecting the guest’s privacy
  POS - Point-of-Sale
  Pretexting - Using PII to make a request seem legitimate so more information is divulged
  Ransomware - A virus-laden attachment that scrambles data within your computer when opened, leading to hackers demanding a sum of money for your system to be restored
  Security Freeze - Prevent lenders and others from accessing your credit; requires special steps when applying for new credit
  Security Policy - Detail how a company will protect the data it has agreed to keep private and how it will respond if a breach occurs
  Social Engineering - Convincing individuals to reveal information that can help criminals access their PII
  Social Media - Websites or applications through which users create and share content or participate in social networking
  Social Media Policy - Sets parameters for accessing social media sites at work as well as prohibits employee postings of an unprofessional or derogatory nature
  Spoofing - Mimicking an IP address and accessing personal information through a bluetooth connection
  Tailgating - Following an authorized person into a secure area without permission
  Vishing - A ruse conducted by phone in which the caller poses as a legitimate institution to extract personal information from the person being called

Contact Us
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found