[av_layerslider id=’1′]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ scroll_down=” id=” color=’main_color’ custom_bg=” src=” attach=’scroll’ position=’top left’ repeat=’no-repeat’ video=” video_ratio=’16:9′ video_mobile_disabled=” overlay_enable=” overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=”]
[av_textblock size=” font_color=” color=” custom_class=”]

PCI Requirement 8

Identify and authenticate access to system components

Welcome to PCI Requirement 8, which focuses on two actions: identify and authenticate. How do you trace the actions of each user in your system? Are your user IDs and passwords secure? How do you know if your users are who they say they are? Does your staff know what to do if they suspect their account is at risk?

Our PCI Requirement 8 videos will show you how to establish a process of identifying and authenticating access into your organization’s systems. Click on a video below to get started with PCI Requirement 8.

[av_masonry_entries link=’post_tag,189′ sort=’yes’ items=’-1′ columns=’3′ paginate=’pagination’ query_orderby=’date’ query_order=’ASC’ size=’flex’ gap=’large’ overlay_fx=” id=” caption_elements=’title excerpt’ caption_styling=” caption_display=’on-hover’ custom_class=”]