Why Penetration Tests are Critical for Accurately Assessing Security Risk

October 10, 2017 • Published Categories Best PracticesTags ,
Penetration tests look for vulnerabilities within various endpoints

How do you conduct your IT risk assessments? In a recent ControlScan customer survey, we asked IT leaders about risk assessments. Specifically, we wanted to know how often businesses are conducting them, as well as if they are doing so formally by using an external … Read more

The Three Essential Elements of Authentic PCI Compliance

March 27, 2017 • Published Categories Acquirer ProgramsTags , , ,
Authentic PCI compliance goes beyond simply checking the boxes of your SAQ

How many of your merchants are just checking the boxes? Checkbox compliance is nothing new in the payments industry. In fact, Google “checkbox compliance” and you quickly see that thousands of posts have been written about it. These posts describe the exercise of racing to … Read more

Small-Business Cybersecurity: Acquirers Make a Difference!

July 7, 2016 • Published Categories Acquirer ProgramsTags , , , , ,

New Small-Business Cybersecurity Tools for Acquirers Today the PCI Security Standards Council (SSC) announced a significant advancement in its efforts to foster small-business cybersecurity: A set of payment protection resources that acquirers can use to educate and empower the small merchants they serve to fight … Read more

How to Reduce Your Online Business’s PCI Burden

June 3, 2016 • Published Categories Best PracticesTags , ,
PCI Burden

Prepare Your Online Business for PCI 3.2 As they continue to evolve, the PCI DSS and its corresponding Self-Assessment Questionnaires (SAQs) are reflecting an increasing scrutiny on the way online businesses implement and manage the e-commerce functionality. Online Retailers in Hackers’ Crosshairs The majority of … Read more

PCI Scope: Getting It Wrong Can Be Explosive [Video]

May 16, 2016 • Published Categories Best PracticesTags , , ,

The Moving Target of PCI Scope You’ve got a business to run, yet today’s threat landscape demands that you quickly address your business’s security weaknesses. Effectively addressing the business’s security needs involves isolating the environment that attackers could exploit. But how can you isolate the … Read more