l +1 262-553-6510


  • Breakfast Bytes - Endpoint Security Is the Problem/Cloud Not An Answer



    Interrelated topics of endpoint security, how to do it, issues with cloud security, issues with server virtualization, issues with PCI compliance in the cloud

    Why endpoint security is incredibly important.

    The correct way to do online banking.

    We start off with the basics of what an endpoint is and how to secure it.

  • Breakfast Bytes - Firewall Security



    Firewall security is incredibly important and is incredibly lacking just about everywhere.

    People still think that SOHO routers are real firewalls. They are not. Stateful packet inspection and NAT are not security.

  • Computer Security & Maintenance Self-Assessment

    The following is a computer systems security and maintenance self-assessment that organizations of all sizes can use to test their overall security strategy. Most of this list is also applicable to residential scenarios. Special items related to HIPPA or PCI environments are notated.

    This is not an exhaustive list to verify HIPPA or PCI compliance, but is intended to be an overview in terms that most business decision makers will understand.

    The QPC website has many articles where you can find solutions to any strategy deficiencies revealed to you through use of this assessment. Use the handy search boxes in the Breakfast Bytes area and the Resources area to find articles and podcasts pertinent to the subjects you are interested in learning more about.


  • PCI DSS 3.0 and Network Security

    1/4/2014 Author: Felicia

    Payment Card Industry (PCI) standards have recently changed. The new version of PCI DSS 3.0 was published in November 2013. You may want to visit the PCI Standards Security Council website. You can find the PCI 3.0 DSS full document here. And you can find the version 2.0 to 3.0 changes here.

  • Top Security Predictions for 2014 - WatchGuard

    Will there be a U.S. data breach? Should you expect CryptoLocker clones? WatchGuard reveals malicious and clever exploits expected in 2014, and how security professionals can prepare their defenses. Learn how to tackle future security challenges including protecting your network from advanced threats, defending the - - "Internet of Things," and how to win the fight against modern hackers and malware. Also ways to make 2014 "The Year of Security Visibility" with new tools for actionable security intelligence.

    For best viewing select "Full-screen" mode in the YouTube player. 

  • Understanding Security Appliances


    Understanding Security Appliances

    Author: Felicia King


    What is a security appliance

    A security appliance is a device that protects the perimeter and the inside of your network. The perimeter is secured because the security appliance is between the internet connection and your devices. The inside of the network is secured to the extent that you make use of proper network design, and allow the device to secure the traffic between the networks. The security appliance, when properly programmed, will also isolate guest from trusted traffic allowing for secure functionality for both types of clients. The best

  • Watchguard - Stop Accidental Data Loss

    This video explains the importance of Data Loss Prevention enforcement technologies as required in environments that must be HIPPA or PCI compliant. Many companies may wish to use DLP technologies to ensure that no company confidential data is leaked accidentally or otherwise. DLP is a very effective tool to support that goal.