More Specialized SAQs: The New SAQ B-IP

April 8, 2014 • Published Categories Industry Topics Tags , , , , , , , , , , , ,

NOTE: There have been updates to the PCI DSS 3.0 standard since this post was published. The current revision is 3.2r1.1; however, the only significant changes to the SAQ B-IP have been the additions of segmentation testing and multifactor authentication for all remote access. The new … Read more

A Fresh New Start Means a Fresh New Look at your PCI Status

January 8, 2014 • Published Categories Best Practices Tags , , , , ,
Fresh Start at PCI

Happy New Year! It’s the time of year when many of us celebrate a fresh start and make new resolutions. Your resolution may have been one of the common ones: get to the gym more, stress less, actually use those vacation days this year. And … Read more

Top 5 Takeaways from the 2013 North American PCI Community Meeting

October 14, 2013 • Published Categories Industry Topics Tags , , , , , , , , , , , ,
Mandalay Bay PCI Compliance Meeting

In recent years, the annual PCI Community Meetings (both here in the U.S. and abroad) have served as an important forum for discussing and gaining a stronger understanding of payment data security best practices and requirements. With the planned release of version 3.0 of both … Read more

How To Select A PCI Compliant Service Provider: Advice For Small Business Owners

June 13, 2013 • Published Categories PCI 101 Tags , , , ,

Service providers are a key component to ensuring compliance. Outsourcing to a PCI-compliant service provider is one of the best ways business owners can help reduce their PCI obligations and risk of a data breach. As a business owner, it is your responsibility to make … Read more

Key Takeaways from the SSC Mobile and Cloud Guidelines

March 18, 2013 • Published Categories Industry Topics, ISOs/Acquirers Tags , , , , , , , ,
SSC Mobile and Cloud Guidlines

The PCI Mobile Payment Acceptance Security Guidelines for Merchants as End-Users was designed to create awareness of challenges in and best practices for accepting payments with a mobile device. The following are three key takeaways from the document: General-purpose mobile devices (i.e., smartphones, tablets, etc.) are designed … Read more

More and More Hackers are “Foodies.” Well, Sort of…

February 5, 2013 • Published Categories Industry Topics Tags , , , , , , , , , , , , , , ,
Foodies

According to the most recent Verizon Data Breach Investigations Report, hackers are apparently spending a lot more time discovering the latest hip, trendy restaurants. But they are not spending money on artisanal cheeses, free-range chicken, or chickpea and orzo salad with Piquillo pepper vinaigrette. Nope. They … Read more