October 10, 2019 •
As of last week—October 1 to be exact—all new assessments for protection of payment card personal identification number (PIN) data must be performed against the latest Payment Card Industry (PCI) PIN Security Requirements and Testing Procedures, version 3.0. The now-effective PCI PIN Security Standard includes changes to requirements and sunset dates that may have a […]
Encryption • Payment Security • PCI Compliance
December 19, 2018 •
Recently I sat down with CSP Magazine technology writer Jackson Lewis to talk about the technology “arms race” retailers and law enforcement are in with skimming criminals. We refer to it as such because, like every other area of cybersecurity, there is a continual one-upping of technology going on between the good guys and the bad guys. When it comes to fuel pump skimmers, however, there may be an end in sight…
Encryption • Payment Security • Point of Sale
July 24, 2017 •
The ability to devalue credit card data has made point-to-point encryption (P2PE) technology a hot topic among franchisors. And what’s not to love? With a PCI P2PE solution in place, your franchise can check off that PCI compliance box as well as rest assured that your payment transactions are safe and secure.But is securing your credit card transactions between the POS and the payment processor all your business should worry about? Does implementing P2PE make every other security technology irrelevant to your business?
Encryption • Firewalls • Malware
April 19, 2017 •
FTP servers are essential for sharing files and data, but healthcare providers continue to utilize them in an insecure manner. Just last year, the ControlScan Security Consulting team saw this in action within a large healthcare organization. What happens when FTP goes wrong and how can you prevent your FTP server from leaking ePHI? Read on to find out.
Encryption • Network Security
January 25, 2016 •
Whether it is PAN data (credit card numbers), ePHI, PII or intellectual property, the rationale is all the same; disclosing any sensitive data can be a nightmare for your company or product’s future. This post, however, is focused on cardholder data, because businesses with POS environments are the most commonly breached entities that exist and quite frankly, their average security posture is pretty low.
Encryption • Point of Sale
July 1, 2015 •
You may have heard that EMV is a safer technology, which is why the banks and card brands want you to use it. So why would I say that EMV is not a security technology?
EMV • Encryption • Point of Sale
October 24, 2014 •
“Excuse me, do you have WiFi?” While you may find the increased frequency of that question irritating, there’s no denying it: Your customers crave connectivity. And if you don’t provide it today, they will go elsewhere tomorrow.
Encryption • Internet of Things • Wireless Security