Study Finds Payment Executives at Security Crossroads

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Study Finds Payment Executives at Security Crossroads-8

Ask anyone in the payments industry how they are feeling about technology innovation, and you will get a mixed response. Many are embracing new customer convenience options such as mobile payments, virtual currencies, and the deployment of chip and PIN – yet, a new survey found a majority of executives believe pressure to migrate to these new payments systems puts customer data at risk.

According to Experian Data Breach Resolution's report, "Data Security in the Payments Ecosystem," retailers, financial institutions, payment processors and credit card brands responsible for delivering new payments systems in the U.S. are at a security crossroads. While the potential customer benefit of new technologies is significant, it remains to be seen if security risks will serve as a corporate barrier to adoption. Faced with the fallout of several large payment breaches over the last year, executives are faced with even more scrutiny to protect customer data.

In the following slideshow, Michael Bruemmer, vice president, Experian Data Breach Resolution, examines six key study takeaways for security decision-makers to consider when evaluating new payment technologies, exploring the impact of recent mega breaches on data breach response, as well as the path forward on how businesses can work together to improve security while delivering customers the payment options they want.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.