{"id":1674,"date":"2014-04-01T09:06:02","date_gmt":"2014-04-01T14:06:02","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=1674"},"modified":"2015-04-24T16:33:51","modified_gmt":"2015-04-24T21:33:51","slug":"everything-you-need-to-know-about-pci-dss-compliance","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/everything-you-need-to-know-about-pci-dss-compliance\/","title":{"rendered":"Everything You Need to Know About PCI DSS Compliance"},"content":{"rendered":"<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><iframe loading=\"lazy\" align=\"right\" frameborder=\"0\" height=\"320\" scrolling=\"no\" src=\"\/\/embed.gettyimages.com\/embed\/455449601?et=gfR_OpeEYUWEbNPj5MDDUQ&amp;sig=7-C2gIZOGUZ80CS48aBDGHNEHXiEp6jS98g8xZ45ZtA=\" width=\"300\"><\/iframe>Data protection for businesses in the modern, connected world is now more important than ever. It\u2019s not always easy to protect data and all too easy to fall into the traps set by hackers and malware authors, especially when it comes to staff, who often inadvertently click on phishing links.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">For those companies that accept credit card payments from their customers, ensuring those details remain secure is even more vital. It\u2019s not just company data that needs to be protected and a breach can be a very costly affair in terms of fines, if it\u2019s found that the requirements for PCI DSS regulations haven\u2019t been met.<\/span><\/span><br>\n\t\u00a0\n<\/p>\n<h2>\n\t<span style=\"color:#006400;\"><span style=\"font-size: 16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><strong>What is PCI DSS?<\/strong><\/span><\/span><\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">It\u2019s the abbreviated term for <strong>Payment Card Industry Data Security Standards<\/strong> and compliance is an ongoing process for businesses, rather than (as many assume), a year-end audit. In order to ensure that your business is allowed to continue accepting customer card payments, it\u2019s necessary for them to comply with <a href=\"https:\/\/www.pcisecuritystandards.org\/security_standards\/documents.php?category=saqs\" target=\"_blank\" rel=\"nofollow\">twelve basic rules.<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">These surround security and how data is stored, accessed, moved or deleted and in order to comply, you must:<\/span><\/span>\n<\/p>\n<ul>\n<li>\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Use robust security software solutions \u2013 an antivirus software package won\u2019t do, it has to be layered, using firewalls too (hardware and software)<\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Use strong passwords and not vendor defaults on routers, hardware firewalls, webcams, video conferencing equipment and so on<\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Have firm policies in place concerning who can access the data<\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Protect stored data with encryption and the correct access rights<\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Implement risk management procedures<\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Carry out monitoring and testing in order to successfully track access to cardholder data<\/span><\/span>\n\t<\/li>\n<\/ul>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Employees that need to access the data as a part of their job are the only people in the organization that should be able to. Even then, they should not be able to store information on their own devices, unless it\u2019s encrypted and you are certain that the device is secure at all times. This is difficult to police though, so it\u2019s not advisable as it will make compliance that much more difficult.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Companies should have a firm security policy in place too, in order to ensure that employees know the risks and how to avoid them. It\u2019s also a good idea to have a good disaster recovery plan in place so that should the worst happen, the data isn\u2019t lost.<\/span><\/span>\n<\/p>\n<h2>\n\t<span style=\"color:#006400;\"><span style=\"font-size: 16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><strong>PCI DSS for Merchants<\/strong><\/span><\/span><\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">There are also four additional categories for merchants:<\/span><\/span>\n<\/p>\n<ol>\n<li style=\"margin-left: 40px;\">\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Merchants with more than 6,000,000 transactions taking place per year or those that have had data compromised in the past, or that the credit card company has classed as level 1 <\/span><\/span>\n\t<\/li>\n<li style=\"margin-left: 40px;\">\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">150,000 to 6,000,000 transactions per year<\/span><\/span>\n\t<\/li>\n<li style=\"margin-left: 40px;\">\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">20,000 to 150,000 transactions per year<\/span><\/span>\n\t<\/li>\n<li style=\"margin-left: 40px;\">\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Less than 20,000 transactions per year<\/span><\/span>\n\t<\/li>\n<\/ol>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Credit card companies such as MasterCard and Visa also may require an on-site visit to validate compliance and a network scan carried out by an <a href=\"http:\/\/www.pcicomplianceguide.org\/pci-scanvendors.php\" target=\"_blank\" rel=\"nofollow\">approved scanning vendor<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. Merchants are defined as any business that accepts payment cards which bear the logo of the members of PCI SSC (Payment Card Industry Security Standards Council); these are:<\/span><\/span>\n<\/p>\n<ol>\n<li style=\"margin-left: 40px;\">\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">American Express<\/span><\/span>\n\t<\/li>\n<li style=\"margin-left: 40px;\">\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">JCB<\/span><\/span>\n\t<\/li>\n<li style=\"margin-left: 40px;\">\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">MasterCard<\/span><\/span>\n\t<\/li>\n<li style=\"margin-left: 40px;\">\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Visa<\/span><\/span>\n\t<\/li>\n<li style=\"margin-left: 40px;\">\n\t\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Discover<\/span><\/span>\n\t<\/li>\n<\/ol>\n<h2>\n\t<span style=\"color:#006400;\"><span style=\"font-size: 16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><strong>What Happens if you Don\u2019t Comply?<\/strong><\/span><\/span><\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">If your business fails to comply with the standards, then you could be liable of a fine of between $5,000 \u2013 $100,000 <strong>per month, <\/strong>as well as the cost of any forensic audit. It\u2019s also likely that the bank will terminate any agreement you have in place, or increase transaction fees. For smaller businesses especially, this can be enough to completely kill the company off, forcing them to either rethink the business model, or go out of business entirely.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">The worrying thing about this is that even though many companies are compliant in their first year, a <a href=\"http:\/\/www.computerworld.com\/s\/article\/9246128\/Maintaining_PCI_compliance_is_a_big_challenge_for_most_companies\" target=\"_blank\" rel=\"nofollow\">recent Verizon study<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> found that many fail to maintain compliance. This is not just small businesses, as the study focused on 500 large organization from various industry sectors.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0 <a href=\"http:\/\/www.computerworld.com\/s\/article\/9246128\/Maintaining_PCI_compliance_is_a_big_challenge_for_most_companies\" rel=\"nofollow\" style=\"\" target=\"_blank\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Percentage of Companies Passing Compliance\" class=\"alignnone size-full wp-image-1690\" height=\"377\" src=\"\/blog\/wp-content\/uploads\/2014\/03\/percentage-of-companies-passing-compliance.png\" style=\"\" title=\"Percentage of Companies Passing Compliance\" width=\"612\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/03\/percentage-of-companies-passing-compliance.png 612w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/03\/percentage-of-companies-passing-compliance-300x184.png 300w\" sizes=\"auto, (max-width: 612px) 100vw, 612px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">The research found that just 11.1% of businesses remained compliant between each formal assessment. This is due to the fact we mentioned earlier; PCI DSS compliance is an ongoing requirement all year round and not something that needs to be addressed just before the next audit.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><a href=\"http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_pci-report-2014_en_xg.pdf\" rel=\"nofollow\" style=\"\" target=\"_blank\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"PCI DSS Compliance Stats\" class=\"alignnone size-full wp-image-1689\" height=\"247\" src=\"\/blog\/wp-content\/uploads\/2014\/03\/pci-dss-compliance-stats.png\" style=\"\" title=\"PCI DSS Compliance Stats\" width=\"596\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/03\/pci-dss-compliance-stats.png 596w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/03\/pci-dss-compliance-stats-300x124.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/span>\n<\/p>\n<h2>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><span style=\"color:#006400;\"><strong>Industries accessed in Verizon report<\/strong><\/span><\/span><\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">\u2013You can download a copy of the full, <a href=\"http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_pci-report-2014_en_xg.pdf\" target=\"_blank\" rel=\"nofollow\">56-page report here (PDF)<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>.<\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">While PCI DSS is not a law, the consequences of a breach to any businesses can be severe, so it\u2019s not something that should be taken lightly. In fact, any company that is complacent when it comes to sensitive customer data will probably not be in business for very long. Consumers are demanding these days, and those who have been an active internet user for a long time will know that it\u2019s take a while for consumer confidence to become high when it comes to making payments over the net.<\/span><\/span> <\/span>\n<\/p>\n<h2>\n\t<span style=\"font-size:16px;\"><span style=\"color:#006400;\"><span style=\"font-size: 16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><strong>Recent Security Breaches<\/strong><\/span><\/span><\/span> <\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Currently, there appears to be a string of credit card data breaches affecting payment systems. One of the <a href=\"https:\/\/www.privacyrights.org\/data-breach\/new\" target=\"_blank\" rel=\"nofollow\">latest attacks<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> took place on Sally Beauty Supply, based in Denton, Texas. The banks tracked the stolen credit cards, which appeared on sale in an underground crime store, back to the business and the company confirmed that it had identified an intrusion on its network.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">It\u2019s unfortunate that this is a common story and retailers in particular should be aware that it\u2019s possible to hack into actual POS terminals, increasing the need for high-end protection and constant monitoring if they\u2019re to ensure compliance and data safety.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><a href=\"http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_pci-report-2014_en_xg.pdf\" rel=\"nofollow\" style=\"\" target=\"_blank\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Global Card Fraud Losses Chart\" class=\"alignnone size-full wp-image-1688\" height=\"338\" src=\"\/blog\/wp-content\/uploads\/2014\/03\/global-card-fraud-losses-chart.png\" style=\"\" title=\"Global Card Fraud Losses Chart\" width=\"564\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/03\/global-card-fraud-losses-chart.png 564w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/03\/global-card-fraud-losses-chart-300x179.png 300w\" sizes=\"auto, (max-width: 564px) 100vw, 564px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">As you can see, credit card breaches are a costly affair and when it comes to security, this is just the tip of the iceberg. Malware, phishing, mobile malware \u2013 all of these are worth big money to cybercriminals and the worst of it? It\u2019s the criminals that are winning. With this in mind, it\u2019s worth educating your staff on the dangers of malware in order to ensure that breaches don\u2019t occur through an unsuspecting staff member clicking on a malware-infected link.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">If you believe that your customer data may have been compromised, then <a href=\"http:\/\/usa.visa.com\/download\/merchants\/cisp_what_to_do_if_compromised.pdf\" target=\"_blank\" rel=\"nofollow\">check out this PDF from Visa<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, which gives advice on what steps to take next.<\/span><\/span> <\/span>\n<\/p>\n<h2>\n\t<span style=\"font-size:16px;\"><span style=\"color:#006400;\"><span style=\"font-size: 16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><strong>Making PCI DSS Compliance Easier<\/strong><\/span><\/span><\/span> <\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Many businesses fail audits due to not having the staff or resources to take care of monitoring all of the time. Network administrators are often very busy people whose jobs involve numerous functions.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">This can be applying software patches for operating systems and a variety of software, setting up workers on the system, troubleshooting end-user issues and hardware and much more. However, monitoring software can make the job of the administrator much easier as it automates processes that would otherwise have to be carried out manually.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">For example, if a file that\u2019s important to complying with PCI DSS standards is <a href=\"\/help\/fs_5_3\/monitor_filesight.aspx\" target=\"_self\">moved, altered or deleted<\/a>, the administrator will be alerted and will be able to discover exactly who on the network made the change. It also quickly flags an attempt that may be made from an outside source to access the network.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">This makes it much easier to carry out compliance all year round, without the need to employ more staff. It\u2019s a cost-effective solution for many businesses and one that\u2019s becoming increasingly used, as more and more companies get caught out during an audit.<\/span><\/span> <\/span>\n<\/p>\n<h2>\n\t<span style=\"font-size:16px;\"><span style=\"color:#006400;\"><span style=\"font-size: 16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><strong>Tips to Help Pass an Audit<\/strong><\/span><\/span><\/span> <\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Firstly, it\u2019s advisable to check out more than one assessor. While there is a certain standard that has to be attained, like anything else in life, not all are created equal.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Ask around, do other businesses that you deal with have any recommendations? Perhaps your <a href=\"\/file-sight\/\" target=\"_self\">monitoring software vendor<\/a> will have a suggestion. Whatever the case, research each auditor in order to determine experience and capability. Ask how many audits they carry out in a year and look for those that have carried out around 20 as a good indicator of their grasp on the process.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<a href=\"\/file-sight\/?ref=blog\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"PA File Sight Monitoring Software\" class=\"aligncenter size-full wp-image-1808\" height=\"90\" src=\"\/blog\/wp-content\/uploads\/2014\/03\/pa-file-sight-monitoring-software.png\" style=\"border: 1px solid black;\" title=\"PA File Sight Monitoring Software\" width=\"728\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/03\/pa-file-sight-monitoring-software.png 728w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/03\/pa-file-sight-monitoring-software-300x37.png 300w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\"><\/a>\n<\/p>\n<h2>\n\t<span style=\"font-size:16px;\"><span style=\"color:#006400;\"><span style=\"font-size: 16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\"><strong>Checklists and Pre-Audit Assessment<\/strong><\/span><\/span><\/span> <\/span><br>\n<\/h2>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Before you plunge into the audit, it pays to make sure that you\u2019re as prepared as possible. You don\u2019t have to do this yourself, you can employ a consultant to come and help you with this and they should be able to tell you how close you are to compliance. A checklist will help to ensure that you\u2019re prepared in terms of what kind of documentation you will need to have in hand, what logs you need to have prepared and so on.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Don\u2019t make the mistake of waiting until the auditor arrives before collecting all of the necessary information, as this will just lengthen the process, costing you more money. The more prepared you are, the better off you will be. To make sure of this, go through the requirements with your IT team to ensure that you all understand what\u2019s necessary.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">It\u2019s not overly difficult to comply with PCI DSS, but still many companies fail every year. For the most part, this is because once an audit has been carried out, the business sweeps it under the carpet and forgets it for another year.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">It\u2019s important to understand that it\u2019s something that should be high on the agenda all of the time. Protecting credit card data is vital to the health of your company, so why would you risk that through sloppy practices?<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-size:16px;\"><span style=\"font-family: verdana,geneva,sans-serif;\">Use file monitoring software and ensure your security is as tight as it can be at all times, educate staff on security policies and procedures and follow the standards for PCI DSS compliance success.<\/span><\/span> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><a href=\"http:\/\/www.twitter.com\/home?status=RT:%20@poweradmn%20Everything%20You%20Need%20To%20Know%20About%20PCI%20DSS%20Compliance%20\/blog\/everything-you-need-to-know-about-pci-dss-compliance\/?ref=blog\" rel=\"nofollow\" style=\"\" target=\"_blank\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Tweet this\" class=\"aligncenter size-medium wp-image-1028\" height=\"75\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png\" style=\"\" title=\"Tweet this\" width=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> <\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><a href=\"https:\/\/plus.google.com\/share?url={\/blog\/everything-you-need-to-know-about-pci-dss-compliance\/?ref=blog}\" rel=\"nofollow\" style=\"\" target=\"_blank\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Share on Google+\" class=\"aligncenter size-medium wp-image-1053\" height=\"75\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png\" style=\"\" title=\"Share on Google+\" width=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data protection for businesses in the modern, connected world is now more important than ever. It\u2019s not always easy to protect data and all too easy to fall into the traps set by hackers and malware authors, especially when it comes to staff, who often inadvertently click on phishing links. For those companies that accept [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":1692,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,13,9,8],"tags":[],"class_list":["post-1674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-pc-security","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=1674"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1674\/revisions"}],"predecessor-version":[{"id":3525,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1674\/revisions\/3525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/1692"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=1674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=1674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=1674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}