04:14 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
Repost This

BB&T Payment Solutions Offers Free Data Security Webinar For Small Business Owners

Designed to help small business owners navigate, understand and protect their businesses from security pitfalls

WINSTON-SALEM, N.C., Jan. 23, 2012 /PRNewswire/ -- BB&T Payment Solutions is offering a free educational webinar designed to help small business owners navigate, understand and protect their businesses from security pitfalls.

"Understanding Data Security and Fraud Prevention" is available 24 hours a day, seven days a week, on the BB&T website at www.bbt.com/paymentswebinar. The 12-minute, pre-recorded webinar is presented by Martin Currin, BB&T Merchant Services sales manager, and Marybeth Eason, BB&T Merchant Services product and channel manager.

"Understanding the rules regarding compliance with the Payment Card Industry Data Security Standard and how they impact business can be confusing for merchants and service providers," said Eason. "This seminar is a convenient and easy way for merchants to understand the framework and why data security is important to them."

The BB&T Payment Solutions series allows clients to choose when and where to view the webinars which fit easily into business owners' busy schedules. Business owners can access these focused, concise educational tools on demand - whether at work, or after they get home at night. The webinars feature subject-matter experts who provide information to help business owners identify solutions to current business challenges and manage their payment processes.

Additional webinars are planned. All will be available on the Payment Solutions Webinar page at www.bbt.com/paymentswebinar along with archives of past webinars.

About BB&T

BB&T Corporation (NYSE: BBT) is one of the largest financial services holding companies in the U.S. with $174.6 billion in assets and market capitalization of $17.5 billion, as of Dec. 31, 2011. Based in Winston-Salem, N.C., the company operates approximately 1,800 financial centers in 12 states and Washington, D.C., and offers a full range of consumer and commercial banking, securities brokerage, asset management, mortgage and insurance products and services. A Fortune 500 company, BB&T is consistently recognized for outstanding client satisfaction by J.D. Power and Associates, the U.S. Small Business Administration, Greenwich Associates and others. More information about BB&T and its full line of products and services is available at www.BBT.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web