There’s a bright side to regulations
Hackers use command-and-control (C2) servers to maintain communication between their master sites and the compromised systems within a victim’s network. C2 activity is usually the last chance to stop a cyberattack before it causes critical harm.
Interestingly, the GTIR found that companies with a PCI requirement had less than 50 percent less C2 traffic than those that didn’t. The payment card industry data security standard (PCI DSS) outlines the necessary requirements for ensuring the security of credit card information and is required in industries like retail and finance. It isn’t a magic solution that will immediately make your systems safe, says Heimerl, but being PCI compliant helps you at least speak the right language.
Hackers use command-and-control (C2) servers to maintain communication between their master sites and the compromised systems within a victim’s network. C2 activity is usually the last chance to stop a cyberattack before it causes critical harm.
Interestingly, the GTIR found that companies with a PCI requirement had less than 50 percent less C2 traffic than those that didn’t. The payment card industry data security standard (PCI DSS) outlines the necessary requirements for ensuring the security of credit card information and is required in industries like retail and finance. It isn’t a magic solution that will immediately make your systems safe, says Heimerl, but being PCI compliant helps you at least speak the right language.