• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
Network Security

The Most Important Aspects of Payment Security

Payment security is important on two fronts. First you need to make sure not to lose customer information for fear of lawsuits or public embarrassment. Second you have to make sure that the payments are being processes correctly to protect your bottom line. Here is some info to help out.

July 11, 2016 TechDecisions Staff Leave a Comment

If you accept payments from customers, it’s important to understand the responsibility your business absorbs as a result. Here are the most important aspects of payment security to know in order to keep your customers’ sensitive information adequately protected.

The Importance of PCI Compliance

PCI compliance refers to a set of security standards established in 2006 by the Payment Card Industry. They were developed to ensure that any organization that processes, stores or transmits sensitive payment data maintains certain security protocols. The details of those standards are frequently adapted based on the latest data breach-related activity, and vulnerabilities detected as a result. Because PCI compliance standards differentiate security measures for merchants based on the type and volume of their payment transactions, it’s important for any business to understand the specific requirements that apply to their business model and the channels in which they sell, including affixed and mobile point-of-sale terminals, mobile payments and online payment gateways.

The Importance of EMV Chip Card Technology

Though most credit and debit cards issued to cardholders in the United States include an EMV chip on the card’s front and a magnetic strip on the back for choice in payment processing, EMV chip card technology was adapted into payment cards because it offers greater payment security throughout processing, and for the card itself. Unlike magnetic strips, the EMV chip on the card’s front is difficult for payment thieves to “skim” or replicate. EMV chip card technology also conceals sensitive account information with encryption and tokenization. The Department of Justice estimates that 86 percent of identity theft cases originate with existing account information. With encryption and tokenization, meaningful information is protected from cyber thieves. Should they intercept information during EMV payment processing, the numbers they will see are ambiguous “tokens” that have been assigned to replace the real account numbers.

Kendall Reed is a key contributor in planning and executing marketing initiatives for retail SMB solutions for NCR Counterpoint POS, which provides solutions for a variety of industries including sporting goods, lawn and garden, and wine and liquor.

The Importance of Internal Controls

PCI compliance involves the security of hardware, software, point-of-sale terminals, mobile devices and internal payment processes related to customer payment data. Payment security breaches do not only originate with cyber security issues. In fact, they often include the physical manipulation of a point-of-sale device, a dishonest employee who abuses his or her access to company systems, or an identity thief posing as a customer to compromise another customer’s payment security from afar. Educate your staff on the importance of following security standards and being aware of how their actions impact payment security. For example, a customer’s credit card number should never be written down on paper or otherwise retained at your business, even if the customer requests that a member of your team do so. Mobile payments should be processed using only private password-protected Internet connections, and devices should use the most current operating system available. Point-of-sale terminals and card readers should be checked as part of standard business opening and closing procedures, and firewalls, network connections, software and hardware should be checked at least once a quarter, per PCI compliance standards.

Accepting credit and debit card payments is part of doing business, but it also means your business has the responsibility of providing adequate payment security — for the protection of customers and your business.

 

Tagged With: Corporate, Data Backup & Recovery, Data Security, Legal, Privacy

Related Content:

  • Thrive SOAR MSSP Thrive Upgrades SOC With SOAR Integration
  • 10 Cybersecurity Mistakes 10 Common Cybersecurity Mistakes Your Organization is Making
  • XorDdos, Linux DDoS Trojan Watch Out For This Linux DDoS Trojan, Microsoft…
  • CISA, MSP Is Your IT Department Augmented by an MSP?…

Free downloadable guide you may like:

  • These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

    Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a variety of sources, including Indeed, Robert Half, CompTIA and others.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

Hybrid Work Challenges
The Three Most Common Hybrid Work Challenges Two Years Into the Pandemic

Many of us have been working in a hybrid environment for two years now. Our editors thought this would be a good time to take a look at what’s work...

These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a ...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2022 Emerald X, LLC. All rights reserved.