{"id":4540,"date":"2016-03-01T13:20:38","date_gmt":"2016-03-01T19:20:38","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4540"},"modified":"2016-02-09T16:36:05","modified_gmt":"2016-02-09T22:36:05","slug":"making-pci-compliance-less-stressful","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/making-pci-compliance-less-stressful\/","title":{"rendered":"Making PCI Compliance Less Stressful"},"content":{"rendered":"<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">If your business requires you to deal with credit card holders, you\u2019ll have records of your customers\u2019 account details. Both your customers and you will want to know that this information is kept safe, and free from prying eyes.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">It\u2019s not just good business practice; it\u2019s the law. And complying with this legal requirement can be a complicated and stress-laden affair \u2013 if you let it.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Don\u2019t. This guide should help.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">PCI: Why?<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">By law, the Payment Card Industry or PCI imposes <a href=\"https:\/\/tekconcierge.com\/why-pci-compliance-is-so-important\/\" target=\"_blank\" rel=\"nofollow\">Data Security Standards <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>(PCI DSS) to ensure the privacy of credit card transactions.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">All businesses conducting 6 million or more credit card transactions a year are <a href=\"http:\/\/www.compliance101.com\/pci-compliance\/pci-compliance-audit\/\" target=\"_blank\" rel=\"nofollow\">classified as Level 1<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, and are required to submit to an annual audit conducted by a qualified PCI auditor. Note that it\u2019s the number of transactions per year, rather than their cash value that counts.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Organisations processing less than a million credit card transactions yearly are classified as Level 4, which includes the majority of small businesses. For them, a PCI audit is typically called for once a breach of customer credit card data has already occurred. So they\u2019ll have to contend with both the hassle of preparing for and passing the audit, and the stress and consequences of their data having been breached.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_breach.png\" rel=\"attachment wp-att-4542\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4542 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_breach.png\" alt=\"PCI_breach\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_breach.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_breach-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_breach-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">The Audit Trail<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">A PCI compliance audit is essentially an examination of your Point of Sale (PoS) system, which assesses the configuration of your systems, potential vulnerabilities, and recommended steps for ensuring that your customer data remains secure.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">A PCI-approved qualified security assessor (QSA) performs the audit, beginning with a study of the policies, procedures, network and system configuration of your security set-up. A risk assessment is drawn up by the QSA, which is your road-map for improving your network security infrastructure.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">The QSA will initiate a training programme for your staff, with an emphasis on security awareness and the information and skills required for meeting existing PCI regulations and standards.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">A review of the risk assessment will empower the QSA to suggest priority areas of potential vulnerability which have to be looked at, and if these can be readily met, may actually reduce the scale of the total audit. If there are many issues arising, the QSA may be required to manage the implementation of remedial measures. Otherwise, the official may simply take on the role of consultant.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">If You Don\u2019t Comply?<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">To meet PCI compliance standards, it\u2019s necessary to maintain a strong firewall between the domain holding your customers\u2019 credit card data, and your own wireless network. The PCI standards on this are high, and continue to change as the techniques used by hackers are evolving. <\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">If your system doesn\u2019t meet the compliance standards and a credit card data breach occurs, your organisation may become liable to fines and legal penalties <a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_creditcard.png\" rel=\"attachment wp-att-4543\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4543 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_creditcard.png\" alt=\"PCI_creditcard\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_creditcard.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_creditcard-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_creditcard-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a>imposed on behalf of the credit card companies and related financial institutions.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">On top of this, you\u2019ll have the extreme loss in consumer confidence and loyalty to contend with. Years of good will built up with your customers can disappear after a single data breach \u2013 and restoring their confidence may take years more.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">The best way to avoid this is to be prepared.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Be Aware of What\u2019s Required<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">Before your audit, go over the PCI requirements, to know which policies and procedures have to be in place. Check the configuration of any new equipment or software installed since your last audit, to make sure that these comply.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Each quarter, an Approved Scanning Vendor or ASV is mandated to perform a check on all your outward-facing IPs, and it\u2019s important to pass these scans.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Depending on your circumstances and PCI Level, other periodic checks such as semi-annual reviews of rules set for your firewall and routers, and 90-days storage of security camera data and visitor logs may be required. Be aware of what\u2019s necessary, and take steps to meet the requirements in good time.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Have Your Documents Ready<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">It\u2019s a legal process, so <a href=\"https:\/\/www.securestate.com\/blog\/2012\/11\/05\/pci-compliance-with-less-stress-simple-steps-for-easier-audits\" target=\"_blank\" rel=\"nofollow\">documentation is essential<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. You can help yourself a lot, by having the required documents readily available and logically organised \u2013 together with any data samples or policies that the audit demands.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Issues? Don\u2019t Panic!<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">If a compliance issue is thrown up, think of it as an opportunity to improve your network security, rather than a calamity. Take the recommended steps to alleviate the situation, and your Report on Compliance should be a favourable one.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Think Long-Term<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">PCI compliance isn\u2019t a one-off deal. Hackers are continuously looking to gain access to credit card data, and the PCI standards will change over time, to counter this. So it\u2019s important to be aware of the shifting standards, and to react to them accordingly, to ensure your compliance in future.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Some Best Practices<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_data.png\" rel=\"attachment wp-att-4544\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4544 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_data.png\" alt=\"PCI_data\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_data.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_data-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/03\/pci_data-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">You\u2019ll <a href=\"https:\/\/www.pcicomplianceguide.org\/a-fresh-new-start-means-a-fresh-new-look-at-your-pci-status\/\" target=\"_blank\" rel=\"nofollow\">need to continue monitoring <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>your security set-up, to ensure that all relevant PCI standards are being complied with. This may involve scanning for rogue Wi-Fi devices, penetration tests, management and monitoring of event logs, scanning for PCI issues, and other measures.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">As your business grows, the number of card transactions you process in a year may increase enough to put you into another PCI level. So you should keep an eye on your volume of business; failing to comply with the correct PCI standards for your level of business can lead to fines and penalties.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Keep a close eye on where the data on your customers has been and is currently being stored \u2013 and who currently has access to it. You\u2019ll need to make sure your credit card database continues to be secure, and review access permissions for those handling the information.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Finally, ensure that the procedures and policies required by the PCI continue to be observed, and that all periodic tasks that the standards require you to perform (scans, filling out of questionnaires, etc.) are being performed.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">PCI compliance is complex, but it isn\u2019t rocket science. And taking these logical steps to smooth your way will ensure that you meet the legal requirements \u2013 and retain the confidence and loyalty of your credit card customers.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 If your business requires you to deal with credit card holders, you\u2019ll have records of your customers\u2019 account details. Both your customers and you will want to know that this information is kept safe, and free from prying eyes. \u00a0 It\u2019s not just good business practice; it\u2019s the law. And complying with this legal [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4543,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,13],"tags":[],"class_list":["post-4540","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-pc-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4540"}],"version-history":[{"count":3,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4540\/revisions"}],"predecessor-version":[{"id":4546,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4540\/revisions\/4546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4543"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}