
{"id":1555,"date":"2011-08-10T00:00:00","date_gmt":"2011-08-10T00:00:00","guid":{"rendered":"http:\/\/otava.test\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/"},"modified":"2011-08-10T00:00:00","modified_gmt":"2011-08-10T00:00:00","slug":"fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/","title":{"rendered":"Fend Off Hackers with PCI Compliant Hosting &#038; Virtual Private Firewall Security"},"content":{"rendered":"<p>Hackers strike again &#8211; and hard. In March 2011, 24,000 Pentagon files were stolen during just one intrusion into a corporate contractor\u2019s computer system by a foreign intelligence service. As a result, the U.S. Department of Defense is now tightening security gaps in military allies\u2019 systems to avoid future breaches by a hacker looking to find a way in through the backdoor. The invasion has prompted increased investment in building better <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/pci-compliant-hosting\/pci-glossary-of-terms#Firewall\">firewalls<\/a>, but the question must be asked, who is regulating the electronic privacy practices of vendors, or business associates, of the government?<\/p>\n<p>A <a href=\"https:\/\/www.nytimes.com\/2011\/08\/05\/technology\/guardians-of-internet-security-are-targets.html?scp=9&amp;sq=hackers&amp;st=cse\">recent string of attacks<\/a> on the very computer security companies that are contracted to protect corporate and government data exemplify their own insecurity and inability to protect their clients. While this form of hacking was conducted more on principle to expose security vulnerabilities than it was to steal information for illicit use, it still reveals a trend of critical network security weaknesses within government and corporate privately-held IT contractors.<\/p>\n<p>While electronic regulations exist for healthcare organizations and all commerce merchants, including e-commerce, should they also relate to confidential strategic political plans? The <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/hipaa-compliant-hosting\/hipaa-glossary-of-terms#Healthcare%20Insurance\">HIPAA<\/a> Privacy and Security Laws and the <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/hipaa-compliant-hosting\/hipaa-glossary-of-terms#Health%20Information%20Technology%20for%20Economic%20and%20Clinical%20Health\">HITECH<\/a> Act aim to protect health records and patient data from medical identity theft, an issue that affects 1.5 million Americans, according to a <a href=\"https:\/\/www.prnewswire.com\/news-releases\/medical-identity-theft-the-growing-cost-of-indifference-117992874.html\">study<\/a> by the Poneman Institute. However, the physicians, hospitals and other types of covered entities are only as safe as their business associates, including hosting providers, billing and coding services and others that touch patient data in some form.<\/p>\n<p>E-commerce companies have also been classic targets of hackers searching for credit card information to use or sell. The major global payment brands, Visa, Discover, American Express, JCB International and MasterCard are the founding members of <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/pci-compliant-hosting\/pci-glossary-of-terms#Payment Card Industry\">PCI DSS &#8211; Payment Card Industry Data Security Standard<\/a>. Developed to keep customer <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/pci-compliant-hosting\/pci-glossary-of-terms#Cardholder Data\">cardholder data<\/a> secure during storage and transactions, merchants are encouraged to follow network security, access control and other PCI requirements to create a safe environment for private data.<\/p>\n<p>While identity theft is not the only issue that IT professionals must address, the need for security is essential when choosing a compliant hosting solution. One security aspect is firewalls and application of the different types. If your company is looking for <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA compliant hosting<\/a> or <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/pci-compliant-cloud\/\">PCI compliant hosting<\/a> solutions, a Virtual Private Firewall is the minimum recommended option due to key firewall features, including <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/pci-compliant-hosting\/pci-glossary-of-terms#Intrusion Detection Service (IDS)\">Intrusion Detection Service (IDS)<\/a> and <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/pci-compliant-hosting\/pci-glossary-of-terms#Intrusion Prevention Service (IPS)\">Intrusion Prevention Service (IPS)<\/a> that provide network monitoring and auditing to identify security breaches. While a shared firewall is often included in most hosting packages, it does not provide IDS or IPS. Additionally, managed firewall services are shared and not private to the client, thus increasing security vulnerabilities. Some companies opt to use dedicated firewall hardware, taking the level of privacy to the physical level of the device itself.<\/p>\n<p>With the recent security breaches at the government and private contractor level, it is even more imperative to investigate all data hosting options and security measures provided by your vendors as you choose a PCI or HIPAA compliant hosting solution in order to avoid potentially costly and brand-damaging invasions by data thieves.<\/p>\n<p>Sources<br \/>\n<a href=\"https:\/\/www.nytimes.com\/2011\/07\/15\/world\/15cyber.html?pagewanted=1&amp;sq=hackers&amp;st=cse&amp;scp=4\">NYTimes.com<\/a><br \/>\n<a href=\"https:\/\/www.healthcareitnews.com\/news\/medical-identity-theft-rise\">Healthcare IT News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers strike again &#8211; and hard. In March 2011, 24,000 Pentagon files were stolen during just one intrusion into a corporate contractor\u2019s computer system by a foreign intelligence service. As a result, the U.S. Department of Defense is now tightening security gaps in military allies\u2019 systems to avoid future breaches by a hacker looking to find a way in through the backdoor. The invasion has prompted increased investment in building better firewalls, but the question must be asked, who is regulating the electronic privacy practices of vendors, or business associates, of the government? A recent string of attacks on the very computer security companies that are contracted to protect corporate and government data exemplify their own insecurity and inability to protect their clients. While this form of hacking was conducted more on principle to expose security vulnerabilities than it was to steal information for illicit use, it still reveals a trend of critical network security weaknesses within government and corporate privately-held IT contractors. While electronic regulations exist for healthcare organizations and all commerce merchants, including e-commerce, should they also relate to confidential strategic political plans? The HIPAA Privacy and Security Laws and the HITECH Act aim to protect health records&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-1555","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fend Off Hackers with PCI Compliant Hosting &amp; Virtual Private Firewall Security | OTAVA<\/title>\n<meta name=\"description\" content=\"The hacking invasion has prompted increased investment in building better firewalls for vendors, business associates, and the government.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fend Off Hackers with PCI Compliant Hosting &amp; Virtual Private Firewall Security\" \/>\n<meta property=\"og:description\" content=\"The hacking invasion has prompted increased investment in building better firewalls for vendors, business associates, and the government.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-10T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Fend Off Hackers with PCI Compliant Hosting &#038; Virtual Private Firewall Security\",\"datePublished\":\"2011-08-10T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/\"},\"wordCount\":540,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/\",\"url\":\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/\",\"name\":\"Fend Off Hackers with PCI Compliant Hosting & Virtual Private Firewall Security | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2011-08-10T00:00:00+00:00\",\"description\":\"The hacking invasion has prompted increased investment in building better firewalls for vendors, business associates, and the government.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fend Off Hackers with PCI Compliant Hosting &#038; Virtual Private Firewall Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fend Off Hackers with PCI Compliant Hosting & Virtual Private Firewall Security | OTAVA","description":"The hacking invasion has prompted increased investment in building better firewalls for vendors, business associates, and the government.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/","og_locale":"en_US","og_type":"article","og_title":"Fend Off Hackers with PCI Compliant Hosting & Virtual Private Firewall Security","og_description":"The hacking invasion has prompted increased investment in building better firewalls for vendors, business associates, and the government.","og_url":"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/","og_site_name":"OTAVA","article_published_time":"2011-08-10T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Fend Off Hackers with PCI Compliant Hosting &#038; Virtual Private Firewall Security","datePublished":"2011-08-10T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/"},"wordCount":540,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/","url":"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/","name":"Fend Off Hackers with PCI Compliant Hosting & Virtual Private Firewall Security | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2011-08-10T00:00:00+00:00","description":"The hacking invasion has prompted increased investment in building better firewalls for vendors, business associates, and the government.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/fend-off-hackers-with-pci-compliant-hosting-virtual-private-firewall-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Fend Off Hackers with PCI Compliant Hosting &#038; Virtual Private Firewall Security"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=1555"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1555\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=1555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=1555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=1555"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=1555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}