Too Small to Count

Too Small to CountThe biggest factor facing small businesses today is the ever-present issue of uncertainty. The items that come top of mind are usually taxes, healthcare issues or the economy, but make room for more worries about credit card processing and PCI-DSS compliance.

The PCI Security Standards Council has recently published their change highlights getting ready for PCI-DSS 3.0, indicating new sub-requirements due to the growing maturity and increased security risks in the payment security industry since PCI-DSS inception in 2006.

This industry continually expands through guidelines, education and continued qualification programs that touch every aspect of the ecosystem and providers for credit card processing including the payment processing software programs, the pin-pad terminals, the qualified security assessors, approved scanning vendors and the set of data security standards that merchants need to follow.

For those who may not be familiar with the basics of processing credit cards, it always involves four parties: the merchant, the acquiring bank which provides the processing services for the merchant, the customer and the bank that issued the card to the customer. The agreements, terms, fees and liability is set between the major card brands and these four parties. However, backlash from the constant news of breaches, albeit mostly larger entities, is starting to draw other parties into this equation. This does not look favorable for small merchants that continue to think that security and PCI-DSS compliance isn’t a concern or that they are too small to count.

The usual penalizing mechanisms for a merchant breach with card payment data as outlined by PCI-DSS and would cause the merchant to significantly increase their cost of credit-card processing. They would have to prove PCI-DSS compliance but no longer by the standards set for Level 4 merchants that allows them to provide self-assessment reporting. Annually, they would have to hire a qualified security assessor as listed and certified by the PCI Security Standards Council website and follow the requirements given for Level 1 tier merchants forever more. This cost could range from $5,000 to upwards of tens of thousands of dollars depending on the scope of the card-processing systems and network. It’s unknown how many merchants have been penalized in this manner because of a breach; and likely, we will not know since the terms and required compliance is a closed-agreement between the major card brands and the four parties. But, as maturity continues to come to this industry so does the ability to detect and alert fraudulent trends that point back to the lack of security on the part of the merchants. Do not think that as a small business your volume of transactions is too small to be able to pin-point an issue back to your organization.

Fraud is usually reported to local and state enforcement agencies, but lately, state attorney generals are getting notified. Banks bear a costly burden when they have to re-issue credit cards to their customers and are not pleased when they encounter reoccurring fraud on a single account. In Virginia, for example, a merchant was prosecuted by the state attorney general’s office, holding them accountable for the losses associated with credit card fraud. They were found not in compliance with state laws that require timely resolution and customer breach notification. Because they did not take action quickly to rectify the security situation, their customers were hit with repeating fraud, even after being issued new credit cards.

Acquiring banks and merchants have set agreements and are required to ensure PCI-DSS compliance of any new merchant that they sign on for their services. But, compliance is really only a judgment based on a point-of-time review and is not an indicator that ongoing security basics will be executed to continually protect the credit card data. For the most part, if fraud is detected, the fines and liability fall on the acquiring bank, and they must penalize the merchant that does not keep up with their security responsibilities.

It is human nature, especially if we are time constrained, budget constrained or just hesitant because we don’t understand something to think that if something is working – leave it alone!  Business cannot think about their point of sale systems and online payment services this way; they need to consider these as critical services. With minimal maintenance, actions can be taken to avoid the uncertainty and minimize risk of ruin from preventable fines and possible legal actions:

  • Take cues from the proposed changes to PCI-DSS;
  • Ensure that you change default passwords;
  • Use strong passwords;
  • Plan to change passwords ever so often to prevent unauthorized access;
  • Ensure virus protections, patches and updates to your systems and payment applications are applied in a timely manner; and  
  • Get help from qualified system integrators that have participated in the PCI-DSS certification program or look for approved scanning vendors that help you ensure your report for security self-assessment is accurate.

About the Author

Kim Singletary is the director of product marketing at McAfee where she is focused on how technology, mobility, data, and the Internet of Things are changing our day-to-day work environments and the ramifications of sustainable security, compliance and privacy.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.