Randtronics

Blog

IT Security Compliance Overview

Across the different industries, there are a number of different IT security compliance directives that companies must comply with. Listed below are some of the more common security compliance schemes

Read More

Overview of Tokenization

Outside of the IT security industry, tokenization seems to be fairly unknown. And that’s a great shame, because it is an extremely powerful method of protecting sensitive data.

Read More

Key Management and PCI DSS

PCI Data Security Standard has been around for more than 11 years already. Then, why do organisations still find it too difficult to comply with and struggle with protecting their cardholder data environment? Often, key management requirements become the hardest to implement, but why?

Read More

Australia’s Data Retention Law

Australia’s Data Retention laws came into effect late 2015. Under these laws telecommunications service providers (including internet providers) must retain telecomminications data (not content) about the use of their services for two years. Law enforcement bodies and government agencies can access that data. Service providers require to protect retained data through encryption and prevent unauthorised

Read More