10 Tips for Operationalizing Data Privacy

The road to finding the right vendor for your organization can often be a long one. You must define your needs, secure budget, conduct countless fact-finding calls, negotiate a contract, and then go live. This process takes time!

PCI DSS 4.0 looms large  

Merchants need to immediately start understanding what additional budget they are planning to allocate to tackle the increased time and costs necessary to maintain PCI compliance. Even working to find and procure the services of an approved scanning vendor will take time and internal resources.

Easing the Burden of Data Privacy Compliance

Many organizations lack enough awareness of the data they collect to effectively tackle consumer privacy. In some cases, a data mapping exercise coupled with a third-party vendor assessment can be enough to uncover the detail needed to map the flow of consumer data into and out of a business. In...

Leaping from Level 2 to Level 1 PCI Merchant Status? Here’s how we can help.

For many merchants, PCI Compliance and related activities are a necessary annual pursuit that require additional work for resource strapped internal business units.  The looming complexities of PCI DSS 4.0, combined with transitioning to a Level 1 merchant, will likely leave many organizations in the lurch as they determine how...

Can EMV 3DS 2.0 Benefit Your Organization?

EMV 3DS 2.0, the new standard, allows merchants to perform enhanced consumer authentication via means such as biometric verification or one-time SMS passcodes. Previously, all a fraudster would need to complete a Card-Not-Present transaction is a payment card and zip code. With EMV 3-D Secure pushing a one-time code to...

PAX POS Security and what it means to your organization

Security attacks should be mentioned in the same breath for predictability as death and taxes, and increasingly an organization’s security resources are too strapped for time to operate, complete project work, and continue to adapt and tune their security approach. Third parties who can evaluate your current security environment and provide critical, unbiased feedback with a plan for continued improvement are more...

Using Data Sciences to Understand Your Business

To maximize the efficacy of your data, you need to set an action plan that the data should inform from the moment of collection. To do this to the fullest, it’s essential to stay ahead of market trends and data science techniques. Where merchant organizations have identified a problem to...

Demystifying Token Conversion

There’s an inherent stickiness to any token provider, but as companies evaluate their payment architecture and look at pricing, performance, service level agreements (SLAs), and other factors, chances are that swapping out a provider or adding a new service will require a token conversion.

What’s happened with chargebacks since the Outdoor EMV Liability Shift?

For petroleum marketers, the April 17, 2021, Outdoor EMV liability shift has come and gone, but how has the shift impacted chargebacks at sites? Petroleum marketers have reported an influx of incorrect chargebacks flowing through, citing three primary aberrations: mobile transactions showing chargeback reasons related to EMV transactions, reason codes...

How does your organization implement and operate its Security Environment?

Security breaches, threats and attacks remain in the news on nearly a daily basis- most recently, the ransomware attack on the Colonial Pipeline company made headlines due to its massive impact on the fuel supply chain. Nick Stavropoulos, Director of Security at W. Capra stressed, “Implementing and operating your security...

Are you protected from ransomware?

When considering security protection and prevention measures, if the goal is to not become the next headline, the time to start working on your approach is today. This isn’t something that should be planned and budgeted for 2022.