Understanding PCI Compliance

Understanding PCI Compliance It’s a nightmare scenario for customers and manufacturers alike: a data breach exposing sensitive information to tech-savvy thieves. As Sears and Delta recently learned, the impact can be much worse if credit card data leaks. And despite IT teams’ best efforts, the question of another massive data breach is “when” rather than “if.” Back…

Scammers discovering ways to combat credit card chip technology

Scammers discovering ways to combat credit card chip technology. Last week’s data breach involving Zippy’s restaurants highlights the risks of using your credit card, despite all the security improvements made to help protect you from fraud. The Hawaii Better Business Bureau says scammers have discovered ways of combating credit card chip technology. In at least one…

What is transaction laundering and what is the Industry doing about it?

Transaction laundering has quickly evolved into one of the payment industry’s most prominent and most difficult problems. Transaction laundering — also previously known as “undisclosed aggregation” or “factoring” — occurs when a merchant processes unknown transactions on behalf of another business. This hidden business is often engaged in prohibited activities, and the “front” merchant may…

The new PCI DSS 3.2 standards – New authentication requirements for cardholder data

The new PCI DSS 3.2 standards – New authentication requirements for cardholder data. Poor password management – including the continued reliance on default, stolen, weak and non-unique passwords – is a key factor in more than 80% of hack-driven breaches, according to Verizon’s 2017 Data Breach Investigation Report. In response to growing waives of fraud…