Is your Business PCI Compliant?

The PCI Data Security Standard specifies twelve requirements for compliance, organized into six logically related groups called “control objectives”. Each version of PCI DSS has divided these twelve requirements into a number of sub-requirements differently, but the twelve high-level requirements have not changed since the inception of the standard. Control objectives PCI DSS requirements Build […]

READ MORE

Smartphone Cities – Measuring mobile broadband and voice performance

The UK is increasingly becoming a smartphone society, with 70% of all adults owning a smartphone in the second half of 2015, making the performance of mobile networks more important than ever. Smartphone Cities provides information on mobile network performance across five UK cities: Cardiff, Edinburgh, Liverpool, London and Norwich, chosen because all four mobile […]

READ MORE

Is your system safe from fraud? Fingers crossed…

67% of the millions of daily SME “hacking” attempts are now targeted at telephone systems. By comparison, SQL servers – which represented the second-most attacked category – accounted for only 4% of attacks. Given these hacking attacks are now running 24/7 on hundreds of powerful servers, with software specifically designed to detect telephone systems, it’s […]

READ MORE