“Security” Posts

6 Information-Security Risks to Know About as You Prepare for 2019

6 Information-Security Risks to Know About as You Prepare for 2019

As the owner of a small to medium-sized business, you probably understand the importance of information. Your company likely gathers a wealth of data from its various IT systems that you process, store, and even analyze to help make better tactical and strategic decisions. The amount of information gathered by businesses of all sizes is constantly growing, and it’s becoming increasingly important to take the right security measures to protect your company’s stored data. This article highlights six information-security risks you should know about as you prepare for 2019. Information Security Cybercriminals recognize that companies are gathering more…

PCI Security: Time and Costs to Reach Compliance

PCI Security: Time and Costs to Reach Compliance

In 2017, Target completed a multi-state settlement for $18.5 million stemming from a massive 2013 data breach that exposed customer credit card data (over 40 million records) and contact information (over 70 million records). Target's security was called into question, but it was actually an issue with its outside services: an HVAC supplier was noncompliant with the Payment Card Industry Data Security Standard (PCI DSS). This incident highlights the importance of PCI compliance, both internally and in association with your service providers, such as your Payment Processor. PCI security is becoming an even more pertinent topic of conversation in…

Why You Should Ditch Your Credit Card Processing Authorization Form

Why You Should Ditch Your Credit Card Processing Authorization Form

If you’ve been in business for long (or have been a patron at an old-school establishment), you’re likely all too familiar with the dreaded credit card processing authorization form. We say “dreaded” because these forms pose a number of issues for business owners that range from cumbersome to dangerous. Credit card processing authorization forms require customers to write down their full name, billing address, card type, credit card number, expiration date, CVV and provide a signature … on paper. This process is cumbersome because the information must then be keyed into a payment processing system. It’s dangerous because…

Why Tokenization Is Better Than Point to Point Encryption

Why Tokenization Is Better Than Point to Point Encryption

Whether you’re a developer seeking an integrated payment solution or a business owner searching for a credit card processing partner, the security of cardholder data should be at the top of your checklist. When processing and storing credit card data via a terminal, the payment processing security standard can vary. Below, we compare the two current standards for securing cardholder data: point to point encryption and cloud-based tokenization. Point to Point Encryption vs. Cloud-Based Tokenization Point to point encryption (P2PE) encrypts data from point A, when a card is swiped or dipped in a terminal, until it reaches point…

How Retailers Can Reduce Risk and Ease PCI DSS Compliance

How Retailers Can Reduce Risk and Ease PCI DSS Compliance

The retail industry is one of the most targeted industries for cyberattacks and data breaches. In fact, research shows that retail suffers more data breaches than the financial services, insurance and hospitality industries. Cybercriminals and hackers target retailers because they know they can easily get their hands on consumers’ personally identifiable information (PII), especially payment card data. As a result, we’ve all witnessed the headlines for large-scale data breaches at top retailers such as Target and Home Depot, which have negatively affected millions of consumers. These breaches have costly repercussions for retailers, who end up paying fines, legal fees…