Five Tips to Prepare Your Business for PCI DSS 3.0

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Tips to Prepare Your Business for PCI DSS 3.0-4 Next

Protect Stored Card Data

If your organization does store sensitive credit card data, be sure to keep it to a minimum and add additional controls such as encryption to prevent access to the data. Organizations are often not aware they hold cardholder data in data warehouses, servers, backup systems, desktops or other systems. Understand where your cardholder data is stored and protect it from unauthorized access.

Another option to consider is implementing tokenization. Learn more about Using Tokenization for Superior Data Security.

In today's global marketplace, credit card breaches are widespread, affecting everyone from small and medium-sized businesses to Fortune 100 corporations. As we've seen with recent retail breaches at Home Depot, Kmart, Target, Michaels and others, cardholder data (CHD) has become a more prevalent target, and there's an increasing need to implement stronger security measures to protect consumers and their data. Businesses that manage CHD are required to comply with the Payment Card Industry Data Security Standard 3.0 (PCI DSS 3.0).

The PCI DSS 3.0 standard was effective January 1, 2014, however, organizations that were compliant with the requirements in PCI DSS 2.0 have an extended deadline and must comply with the new standard by January 1, 2015. The updated standards provide baseline security measures to align organizations more closely with industry best practices, and drive them to build the practices into their daily operations. PCI DSS is no longer a once-a-year auditing activity. It's now a continuous day-to-day practice. In this slideshow, cloud security vendor Qualys provides five tips to prepare your business for PCI 3.0.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.