• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

The Most Important Aspects of Payment Security

Payment security is important on two fronts. First you need to make sure not to lose customer information for fear of lawsuits or public embarrassment. Second you have to make sure that the payments are being processes correctly to protect your bottom line. Here is some info to help out.

July 11, 2016 TechDecisions Staff Leave a Comment

If you accept payments from customers, it’s important to understand the responsibility your business absorbs as a result. Here are the most important aspects of payment security to know in order to keep your customers’ sensitive information adequately protected.

The Importance of PCI Compliance

PCI compliance refers to a set of security standards established in 2006 by the Payment Card Industry. They were developed to ensure that any organization that processes, stores or transmits sensitive payment data maintains certain security protocols. The details of those standards are frequently adapted based on the latest data breach-related activity, and vulnerabilities detected as a result. Because PCI compliance standards differentiate security measures for merchants based on the type and volume of their payment transactions, it’s important for any business to understand the specific requirements that apply to their business model and the channels in which they sell, including affixed and mobile point-of-sale terminals, mobile payments and online payment gateways.

The Importance of EMV Chip Card Technology

Though most credit and debit cards issued to cardholders in the United States include an EMV chip on the card’s front and a magnetic strip on the back for choice in payment processing, EMV chip card technology was adapted into payment cards because it offers greater payment security throughout processing, and for the card itself. Unlike magnetic strips, the EMV chip on the card’s front is difficult for payment thieves to “skim” or replicate. EMV chip card technology also conceals sensitive account information with encryption and tokenization. The Department of Justice estimates that 86 percent of identity theft cases originate with existing account information. With encryption and tokenization, meaningful information is protected from cyber thieves. Should they intercept information during EMV payment processing, the numbers they will see are ambiguous “tokens” that have been assigned to replace the real account numbers.

Kendall Reed is a key contributor in planning and executing marketing initiatives for retail SMB solutions for NCR Counterpoint POS, which provides solutions for a variety of industries including sporting goods, lawn and garden, and wine and liquor.

The Importance of Internal Controls

PCI compliance involves the security of hardware, software, point-of-sale terminals, mobile devices and internal payment processes related to customer payment data. Payment security breaches do not only originate with cyber security issues. In fact, they often include the physical manipulation of a point-of-sale device, a dishonest employee who abuses his or her access to company systems, or an identity thief posing as a customer to compromise another customer’s payment security from afar. Educate your staff on the importance of following security standards and being aware of how their actions impact payment security. For example, a customer’s credit card number should never be written down on paper or otherwise retained at your business, even if the customer requests that a member of your team do so. Mobile payments should be processed using only private password-protected Internet connections, and devices should use the most current operating system available. Point-of-sale terminals and card readers should be checked as part of standard business opening and closing procedures, and firewalls, network connections, software and hardware should be checked at least once a quarter, per PCI compliance standards.

Accepting credit and debit card payments is part of doing business, but it also means your business has the responsibility of providing adequate payment security — for the protection of customers and your business.

 

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Corporate, Data Backup & Recovery, Data Security, Legal, Privacy

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.