SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
1
Whitepaper
PCI Compliance: Protect Your Business from
Data Breach
The security and safety of personal and financial data is increasingly
threatened. Nowhere is that more apparent than in the retail industry
—a primary target for cyber criminals.
Retail businesses are particularly vulnerable because of the volume of credit
card information, the fact that this information is distributed among many
locations, the lengthy amount of time it can take them to detect a breach,
and the often inadequate staff and safeguards they have in place.
Some experts forecast that as many as one in six small businesses will be
breached.1
Small businesses are particularly vulnerable; according to Visa,
97% of U.S. events occurred at small merchants, and 91% of those were
brick and mortar merchants.2
Larger organizations, too, are vulnerable to the consequences of such a
breach. Examples from recent years include Bank of America, Boston Market,
Sports Authority, and Forever 21. A particularly devastating case was the
breach of TJX Corp., which resulted in the loss of at least 45 million credit
card numbers to a single hacker.
Merchants often underestimate the financial impact of a breach, which can
be significant. Smaller retailers that suffer a major and widely publicized
breach of credit card data may actually find themselves out of business
due to costs associated with fees, fines, and remediation, as well as
ongoing damage to their brands and reputations.
For example, the average cost of a breach is estimated at $80,000 per
location for Level 4 merchants, and can reach into the millions depending
on the size of the merchant and the extent of the breach.3
Direct costs include
mandatory forensic audits, credit card replacement, fees, fines, and breach
remediation to prevent a recurrence.
PCI COMPLIANCE IS ESSENTIAL FOR SECURE TRANSACTIONS
AND FINANCIAL STABILITY
Merchants often
underestimate the
financial impact of a
breach. Direct costs
include mandatory
forensic audits, credit
card replacement,
fees, fines and
breach remediation.
2
Whitepaper
For these reasons, complying with PCI-DSS (Payment Card Industry Data
Security Standard, also known simply as PCI) is much more than just a
technical goal for retailers. It is necessary for business stability.
PCI was originally created as a joint initiative by Visa, MasterCard,
American Express, JCB, and Discover to protect card-holder information
and reduce data theft and fraud. The first version was released in
December 2004, and it has since then undergone two significant
updates. The current version, 2.0, was issued in October 2010.
PCI compliance is mandatory for all organizations who accept Visa
and MasterCard credit cards. If a retailer is found to be noncompliant,
it could incur significant fines and be restricted from accepting credit
cards until compliance is achieved.
While no standard can guarantee 100% prevention of a major
credit card data breach, PCI compliance can significantly reduce the
probability of such an event. Being PCI compliant means that merchants
are pursuing established best practices specifically designed to protect
sensitive credit card data from unauthorized access—critical both for
themselves and their customers.
What is PCI-DSS?
Table 1: Typical Breach/Remediation Timeline
Day 1
Notification of breach
Stop taking credit cards
Pay for a forensic audit
Monitor media/social media
Day 5
Forensic audit complete
Contact a Qualified Security Assessor (QSA)
Day 7
Obtain proposals for remediation
Day 10 to
Day 40 -180
Execute remediation and compliance plan
Replace credit cards
Disclose breach/address brand and media impact
Post breach plus one year - revenue impact
Breach remediation can take months, as shown in Table 1. For these reasons,
complying with
PCI-DSS (Payment
Card Industry Data
Security Standard,
also known simply
as PCI) is much more
than just a technical
goal for retailers.
It is necessary for
business stability.
3
Whitepaper
All members of the PCI payment card network, including merchants and
service providers, must comply with 12 different requirements organized
into six core categories:
Source: PCI DSS Requirements and Security Assessment Procedures, Version 2.0,
https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf
PCI DSS Requirements
Build and Maintain a Secure Network
1.	 Install and maintain a firewall configured to protect card-holder data.
2.	 Do not use vendor-supplied defaults for system passwords and other security parameters.
Protect Card-holder Data
3.	 Protect stored card-holder data.
4.	 Encrypt transmission of card-holder data across open, public networks.
Maintain a Vulnerability Management Program
5.	 Use and regularly update anti-virus software or programs.
6.	 Develop and maintain secure systems and applications.
Implement Strong Access Control Measures
7.	 Restrict access to card-holder data within the organization on the basis of business
need-to-know.
8.	 Assign a unique identifier to each employee with computer access.
9.	 Restrict physical access to card-holder data.
Regularly Monitor and Test Networks
10.	 Track and monitor all access to network resources and card-holder data.
11.	 Regularly test security systems and processes.
Maintain an Information Security Policy
12.	 Maintain a policy that addresses information security for all employees.
•	 Can you demonstrate that all of your cashiers have been trained upon
hire with a PCI-certified training program, and does that training recur
every year?
•	 Can you demonstrate that all of your employees have read and signed
an employee awareness security policy?
•	 Can you demonstrate that all members of your team or your approved
vendors are using a secure virtual private network with two-factor
authentication to access applications or systems behind your firewall?
Most retailers are aware of the importance of PCI compliance, but many
lack the essential safeguards required to fully achieve it.
For example, when retailers who accept credit cards are asked the
following questions, frequently at least one answer is “no,” indicating
that they are not compliant:
What is required for PCI compliance? All members of the
PCI payment card
network, including
merchants and
service providers,
must comply with
twelve different
requirements
organized into six
core categories.
4
Whitepaper
On-Site Security Audit: Required for Level 1 merchants, this is also
known as a Report on Compliance (ROC) and must be completed
by a PCI-certified Qualified Security Assessor (QSA).
Annual Self-Assessment Questionnaire: In lieu of a ROC, Level 2-4
merchants must complete one of six Self-Assessment Questionnaires (SAQ)
to document PCI compliance status. This must recur annually to identify
compliance shortfalls.
Quarterly External Vulnerability Scans: All merchants are required to
have external network scans performed by a PCI-certified Authorized-
Scanning Vendor (ASV). Scan requirements are rigorous: all 65,000
ports must be scanned, vulnerabilities detected, “high” severity-level
vulnerabilities must be remediated, and two key reports completed
and filed with the bank card processor.
As this chart shows, merchant validation requirements fall into three groups:
PCI compliance is not a one-time achievement, but is validated on an
ongoing basis. The terms of validation vary based of the total number of
annual credit card transactions that merchants generate each year, and
are organized into four levels:
Level Criteria
On-Site
Security
Audit
Self-Assessment
Questionnaire
External
Vulnerability
Scan
1. Any merchant
processing more
than 6 million
transactions per
year
Required
Annually
Required
Quarterly
2. Any merchant
processing 1
to 6 million
transactions per
year
Required
Annually
Required
Quarterly
3. Any merchant
processing
20,000 to
1 million
transactions per
year
Required
Annually
Required
Quarterly
4. All other
merchants, not in
Levels 1, 2 or 3
Required
Annually
Required
Quarterly
PCI compliance
is not a one-time
achievement, but
is validated on an
ongoing basis. The
terms of validation
vary based of the
total number of
annual credit card
transactions that
merchants generate
each year, and are
organized into
four levels.
5
Whitepaper
PCI is a complex set of standards, but is critical to financial stability for any
size merchant that accepts credit cards. EarthLink Business offers a full range
of services to support merchants on the path to PCI compliance.
This includes EarthLink’s PCI Compliance Solutions services, which provides
Level 2-4 merchants with $100,000 in breach protection4
per location subject
to per occurrence and yearly aggregate limits of $500,000 to cover eligible
expense, as well as tools to validate PCI compliance. Through an easy-to-use
web-based portal, merchants can conduct quarterly Authorized Scan Vendor
(ASV) scans, Self-Assessment Questionnaires (SAQ), and training, and have
access to a security policy and online knowledge base.
EarthLink also provides secure MPLS WAN, secure Point of Sale (POS)
transport, managed security and other services to address gaps.
PCI Compliance Solutions from EarthLink Business
Financially Protect Yourself from a Breach: Consider acquiring breach
protection for each of your site locations to help cover costs of a forensic
audit, fees, fines and credit card replacement in the event of a breach.
Validate PCI Compliance: Select and complete the Self-Assessment
Questionnaire (SAQ) based on your environment. Select an Authorized
Security Vendor and complete the External Vulnerability Scan. Document
the process and file the necessary reports.
Achieve PCI Compliance: Requirements will vary depending on your
environment, but basic requirements include: implementing a fully managed,
stateful inspection firewall; installing layered, dynamic security with unified
threat management; implementing secure remote access with two-factor
authentication; educating staff; and implementing and managing a
security policy.
Maintain Compliance: Manage and maintain PCI compliance within
your organization. This includes conducting regular employee training,
documenting and following security policies, and conducting regular
assessments and scans to identify and remediate gaps.
It’s advisable to be proactive in protecting your business and customers
from credit card data breach; once a breach occurs, much of the damage
will have already been done. If you are a Level 2-4 merchant, follow these
key steps to start on the path toward compliance:
Proactively protect your business from breachIt’s advisable to
be proactive in
protecting your
business and
customers from
credit card data
breach; once a
breach occurs,
much of the damage
will have already
been done.
6
Whitepaper
Retail business success depends upon secure credit card transactions and
the protection of sensitive customer data.
Unfortunately, the odds of a security breach grow every year, as hackers,
criminal organizations, and malware all grow more sophisticated and
aggressive. And in the event that a breach occurs and results in the loss
of sensitive credit card information — the consequences could be very
serious, from fiscal, legal, and/or public relations standpoints.
Compliance with the PCI-DSS, an end-to-end standard addressing
both technology and business processes, is essential to make such
breaches far less likely. It’s also legally required for all retailers that
take Visa or MasterCard.
PCI-DSS is a complex standard, however, and one that requires ongoing
validation to remain in compliance. Many organizations will find that
by collaborating with a trusted partner, achieving and maintaining PCI
compliance can be both simplified and accelerated. EarthLink Business
delivers the tools, experience, and service to help retailers achieve,
maintain, and validate PCI-DSS compliance requirements.
Notes:
1.	 PCI Standards Council Annual Meeting 2011, QSA/ASV General Session,
9/20/11 – IC3 Executive.
2.	 Visa Data Security & Authentication Symposium: Securing Your Business Growth, 6/6/12,
http://usa.visa.com/download/merchants/symposium-website-2012.pdf.
3.	 PCI Standards Council, QSA summary report, 3/12/12.
4.	 The PCI Compliance Solution Services are provided and serviced by ANXeBusiness Corp. and
offered through EarthLink Business, and are subject to the terms and conditions found at http://
www.earthlinkbusiness.com/about-us/legal/terms.xea. All Data Breach Protection Service
reimbursements are limited to: $100,000.00 a year for each qualifying location, not to
exceed $500,000.00 per occurrence for customers with multiple locations, and an aggregate
maximum of $500,000.00 per customer. Use of the PCI Compliance Validation Service does
not guarantee that a data breach will not occur and alone cannot prevent losses. EarthLink
Business makes no representations as to whether the Data Breach Protection Service will apply
to or cover a particular claim or loss. The material in this document (or on this site) is intended
for informational purposes only, not as professional advice, and is provided on an “AS IS”
basis. EARTHLINK BUSINESS DISCLAIMS ALL WARRANTIES OR CONDITIONS, EXPRESS
OR IMPLIED, RELATING TO THE PCI COMPLANCE SOLUTION SERVICES, INCLUDING,
WITHOUT LIMITATION, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
THE ACCURACY AND COMPLETENESS OF ASSOCIATED INFORMATIONAL CONTENT
AND WILL NOT BE LIABLE FOR LOSSES, COSTS OR DAMAGES ARISING FROM THE PCI
COMPLIANCE SOLUTION SERVICES OR ANY ASSOCIATED INFORMATIONAL CONTENT.
SUMMARY
Email:
getinfo@earthlinkbusiness.com
Call:
1-877-355-1501
Visit:
www.earthlinkbusiness.com
To learn more about how
EarthLink can help your
organization
©2013EarthLink,Inc.Trademarksarepropertyoftheirrespectiveowners.Allrightsreserved1078-07155.
PCI-DSS is a
complex standard,
however, and one
that requires ongoing
validation to remain
in compliance.
Many organizations
will find that by
collaborating with
a trusted partner,
achieving and
maintaining PCI
compliance can be
both simplified and
accelerated.

Más contenido relacionado

Último

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 

Último (20)

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 

Destacado

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Destacado (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

PCI Compliance: Protect Your Business From Data Breach - Whitepaper

  • 1. 1 Whitepaper PCI Compliance: Protect Your Business from Data Breach The security and safety of personal and financial data is increasingly threatened. Nowhere is that more apparent than in the retail industry —a primary target for cyber criminals. Retail businesses are particularly vulnerable because of the volume of credit card information, the fact that this information is distributed among many locations, the lengthy amount of time it can take them to detect a breach, and the often inadequate staff and safeguards they have in place. Some experts forecast that as many as one in six small businesses will be breached.1 Small businesses are particularly vulnerable; according to Visa, 97% of U.S. events occurred at small merchants, and 91% of those were brick and mortar merchants.2 Larger organizations, too, are vulnerable to the consequences of such a breach. Examples from recent years include Bank of America, Boston Market, Sports Authority, and Forever 21. A particularly devastating case was the breach of TJX Corp., which resulted in the loss of at least 45 million credit card numbers to a single hacker. Merchants often underestimate the financial impact of a breach, which can be significant. Smaller retailers that suffer a major and widely publicized breach of credit card data may actually find themselves out of business due to costs associated with fees, fines, and remediation, as well as ongoing damage to their brands and reputations. For example, the average cost of a breach is estimated at $80,000 per location for Level 4 merchants, and can reach into the millions depending on the size of the merchant and the extent of the breach.3 Direct costs include mandatory forensic audits, credit card replacement, fees, fines, and breach remediation to prevent a recurrence. PCI COMPLIANCE IS ESSENTIAL FOR SECURE TRANSACTIONS AND FINANCIAL STABILITY Merchants often underestimate the financial impact of a breach. Direct costs include mandatory forensic audits, credit card replacement, fees, fines and breach remediation.
  • 2. 2 Whitepaper For these reasons, complying with PCI-DSS (Payment Card Industry Data Security Standard, also known simply as PCI) is much more than just a technical goal for retailers. It is necessary for business stability. PCI was originally created as a joint initiative by Visa, MasterCard, American Express, JCB, and Discover to protect card-holder information and reduce data theft and fraud. The first version was released in December 2004, and it has since then undergone two significant updates. The current version, 2.0, was issued in October 2010. PCI compliance is mandatory for all organizations who accept Visa and MasterCard credit cards. If a retailer is found to be noncompliant, it could incur significant fines and be restricted from accepting credit cards until compliance is achieved. While no standard can guarantee 100% prevention of a major credit card data breach, PCI compliance can significantly reduce the probability of such an event. Being PCI compliant means that merchants are pursuing established best practices specifically designed to protect sensitive credit card data from unauthorized access—critical both for themselves and their customers. What is PCI-DSS? Table 1: Typical Breach/Remediation Timeline Day 1 Notification of breach Stop taking credit cards Pay for a forensic audit Monitor media/social media Day 5 Forensic audit complete Contact a Qualified Security Assessor (QSA) Day 7 Obtain proposals for remediation Day 10 to Day 40 -180 Execute remediation and compliance plan Replace credit cards Disclose breach/address brand and media impact Post breach plus one year - revenue impact Breach remediation can take months, as shown in Table 1. For these reasons, complying with PCI-DSS (Payment Card Industry Data Security Standard, also known simply as PCI) is much more than just a technical goal for retailers. It is necessary for business stability.
  • 3. 3 Whitepaper All members of the PCI payment card network, including merchants and service providers, must comply with 12 different requirements organized into six core categories: Source: PCI DSS Requirements and Security Assessment Procedures, Version 2.0, https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf PCI DSS Requirements Build and Maintain a Secure Network 1. Install and maintain a firewall configured to protect card-holder data. 2. Do not use vendor-supplied defaults for system passwords and other security parameters. Protect Card-holder Data 3. Protect stored card-holder data. 4. Encrypt transmission of card-holder data across open, public networks. Maintain a Vulnerability Management Program 5. Use and regularly update anti-virus software or programs. 6. Develop and maintain secure systems and applications. Implement Strong Access Control Measures 7. Restrict access to card-holder data within the organization on the basis of business need-to-know. 8. Assign a unique identifier to each employee with computer access. 9. Restrict physical access to card-holder data. Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and card-holder data. 11. Regularly test security systems and processes. Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all employees. • Can you demonstrate that all of your cashiers have been trained upon hire with a PCI-certified training program, and does that training recur every year? • Can you demonstrate that all of your employees have read and signed an employee awareness security policy? • Can you demonstrate that all members of your team or your approved vendors are using a secure virtual private network with two-factor authentication to access applications or systems behind your firewall? Most retailers are aware of the importance of PCI compliance, but many lack the essential safeguards required to fully achieve it. For example, when retailers who accept credit cards are asked the following questions, frequently at least one answer is “no,” indicating that they are not compliant: What is required for PCI compliance? All members of the PCI payment card network, including merchants and service providers, must comply with twelve different requirements organized into six core categories.
  • 4. 4 Whitepaper On-Site Security Audit: Required for Level 1 merchants, this is also known as a Report on Compliance (ROC) and must be completed by a PCI-certified Qualified Security Assessor (QSA). Annual Self-Assessment Questionnaire: In lieu of a ROC, Level 2-4 merchants must complete one of six Self-Assessment Questionnaires (SAQ) to document PCI compliance status. This must recur annually to identify compliance shortfalls. Quarterly External Vulnerability Scans: All merchants are required to have external network scans performed by a PCI-certified Authorized- Scanning Vendor (ASV). Scan requirements are rigorous: all 65,000 ports must be scanned, vulnerabilities detected, “high” severity-level vulnerabilities must be remediated, and two key reports completed and filed with the bank card processor. As this chart shows, merchant validation requirements fall into three groups: PCI compliance is not a one-time achievement, but is validated on an ongoing basis. The terms of validation vary based of the total number of annual credit card transactions that merchants generate each year, and are organized into four levels: Level Criteria On-Site Security Audit Self-Assessment Questionnaire External Vulnerability Scan 1. Any merchant processing more than 6 million transactions per year Required Annually Required Quarterly 2. Any merchant processing 1 to 6 million transactions per year Required Annually Required Quarterly 3. Any merchant processing 20,000 to 1 million transactions per year Required Annually Required Quarterly 4. All other merchants, not in Levels 1, 2 or 3 Required Annually Required Quarterly PCI compliance is not a one-time achievement, but is validated on an ongoing basis. The terms of validation vary based of the total number of annual credit card transactions that merchants generate each year, and are organized into four levels.
  • 5. 5 Whitepaper PCI is a complex set of standards, but is critical to financial stability for any size merchant that accepts credit cards. EarthLink Business offers a full range of services to support merchants on the path to PCI compliance. This includes EarthLink’s PCI Compliance Solutions services, which provides Level 2-4 merchants with $100,000 in breach protection4 per location subject to per occurrence and yearly aggregate limits of $500,000 to cover eligible expense, as well as tools to validate PCI compliance. Through an easy-to-use web-based portal, merchants can conduct quarterly Authorized Scan Vendor (ASV) scans, Self-Assessment Questionnaires (SAQ), and training, and have access to a security policy and online knowledge base. EarthLink also provides secure MPLS WAN, secure Point of Sale (POS) transport, managed security and other services to address gaps. PCI Compliance Solutions from EarthLink Business Financially Protect Yourself from a Breach: Consider acquiring breach protection for each of your site locations to help cover costs of a forensic audit, fees, fines and credit card replacement in the event of a breach. Validate PCI Compliance: Select and complete the Self-Assessment Questionnaire (SAQ) based on your environment. Select an Authorized Security Vendor and complete the External Vulnerability Scan. Document the process and file the necessary reports. Achieve PCI Compliance: Requirements will vary depending on your environment, but basic requirements include: implementing a fully managed, stateful inspection firewall; installing layered, dynamic security with unified threat management; implementing secure remote access with two-factor authentication; educating staff; and implementing and managing a security policy. Maintain Compliance: Manage and maintain PCI compliance within your organization. This includes conducting regular employee training, documenting and following security policies, and conducting regular assessments and scans to identify and remediate gaps. It’s advisable to be proactive in protecting your business and customers from credit card data breach; once a breach occurs, much of the damage will have already been done. If you are a Level 2-4 merchant, follow these key steps to start on the path toward compliance: Proactively protect your business from breachIt’s advisable to be proactive in protecting your business and customers from credit card data breach; once a breach occurs, much of the damage will have already been done.
  • 6. 6 Whitepaper Retail business success depends upon secure credit card transactions and the protection of sensitive customer data. Unfortunately, the odds of a security breach grow every year, as hackers, criminal organizations, and malware all grow more sophisticated and aggressive. And in the event that a breach occurs and results in the loss of sensitive credit card information — the consequences could be very serious, from fiscal, legal, and/or public relations standpoints. Compliance with the PCI-DSS, an end-to-end standard addressing both technology and business processes, is essential to make such breaches far less likely. It’s also legally required for all retailers that take Visa or MasterCard. PCI-DSS is a complex standard, however, and one that requires ongoing validation to remain in compliance. Many organizations will find that by collaborating with a trusted partner, achieving and maintaining PCI compliance can be both simplified and accelerated. EarthLink Business delivers the tools, experience, and service to help retailers achieve, maintain, and validate PCI-DSS compliance requirements. Notes: 1. PCI Standards Council Annual Meeting 2011, QSA/ASV General Session, 9/20/11 – IC3 Executive. 2. Visa Data Security & Authentication Symposium: Securing Your Business Growth, 6/6/12, http://usa.visa.com/download/merchants/symposium-website-2012.pdf. 3. PCI Standards Council, QSA summary report, 3/12/12. 4. The PCI Compliance Solution Services are provided and serviced by ANXeBusiness Corp. and offered through EarthLink Business, and are subject to the terms and conditions found at http:// www.earthlinkbusiness.com/about-us/legal/terms.xea. All Data Breach Protection Service reimbursements are limited to: $100,000.00 a year for each qualifying location, not to exceed $500,000.00 per occurrence for customers with multiple locations, and an aggregate maximum of $500,000.00 per customer. Use of the PCI Compliance Validation Service does not guarantee that a data breach will not occur and alone cannot prevent losses. EarthLink Business makes no representations as to whether the Data Breach Protection Service will apply to or cover a particular claim or loss. The material in this document (or on this site) is intended for informational purposes only, not as professional advice, and is provided on an “AS IS” basis. EARTHLINK BUSINESS DISCLAIMS ALL WARRANTIES OR CONDITIONS, EXPRESS OR IMPLIED, RELATING TO THE PCI COMPLANCE SOLUTION SERVICES, INCLUDING, WITHOUT LIMITATION, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND THE ACCURACY AND COMPLETENESS OF ASSOCIATED INFORMATIONAL CONTENT AND WILL NOT BE LIABLE FOR LOSSES, COSTS OR DAMAGES ARISING FROM THE PCI COMPLIANCE SOLUTION SERVICES OR ANY ASSOCIATED INFORMATIONAL CONTENT. SUMMARY Email: getinfo@earthlinkbusiness.com Call: 1-877-355-1501 Visit: www.earthlinkbusiness.com To learn more about how EarthLink can help your organization ©2013EarthLink,Inc.Trademarksarepropertyoftheirrespectiveowners.Allrightsreserved1078-07155. PCI-DSS is a complex standard, however, and one that requires ongoing validation to remain in compliance. Many organizations will find that by collaborating with a trusted partner, achieving and maintaining PCI compliance can be both simplified and accelerated.