Best Practices for Achieving PCI DSS Compliance

Not only is PCI DSS compliance mandatory, it’s also the starting point for solid payment system cyber security

Not only is PCI DSS compliance mandatory, it’s also the starting point for solid payment system cyber security

PCI DSS compliance is mandatory for any organization that accepts or processes payment cards, yet shockingly, a recent study by SecurityScorecard found that over 90% of U.S. retailers fail to meet four or more PCI DSS requirements.

Not only is PCI DSS compliance mandatory, it’s also the starting point for solid payment system cyber security

Compliance with PCI DSS is not something to be taken lightly. If you are found non-compliant in the wake of a breach, the potential penalties are severe. The credit card companies that mandate PCI DSS compliance could levy fines amounting to tens or even hundreds of thousands of dollars; if you are unable to pay the fines, you will no longer be able to accept their cards.

Additional fallout could include:

  • Some state-level data privacy laws mirror PCI DSS compliance standards or refer to them directly; non-compliance could result in your business running afoul of your state’s laws.
  • Federal law enforcement may open an investigation to ensure that credit card data stolen from your organization is not being used to finance terrorist activities.
  • Angry customers could decide to file costly civil lawsuits against you.
  • If you file a cyber insurance claim, your provider may deny it.

The stakes are too high to leave compliance to chance. Utilize these best practices to help maintain PCI DSS compliance:

Monitor POS Terminals for Card Skimmers

If you have brick-and-mortar locations, train employees to monitor POS terminals for card skimmers. While unattended terminals in self-checkout areas are most at risk, card skimmers have also been found on terminals in human-staffed checkout lanes; they take only a few moments to install.

Always Change Default Manufacturer Passwords

PCI DSS compliance requires changing default, manufacturer-provided passwords on all equipment prior to connecting it to the network. These passwords are widely available online, often right on the manufacturers’ websites, and they’re the first thing any hacker that wants to break into your system will try.

Make Sure Your Employee Training is Relevant to Your Industry

PCI DSS compliance requires organizations to provide employees with security awareness training; make sure this training is relevant to your industry and organization. The cyber security and compliance issues that retail employees encounter will be different than those found at a collection agency or a healthcare facility.

Understand that Compliance is a Continuous Effort

Nearly all the retailers SecurityScorecard found out of compliance with PCI DSS failed requirement no. 6, which is about developing and maintaining secure systems and applications through prompt installation of software security updates and implementing secure software development practices and change control protocols. Your PCI DSS compliance protocols should not be centered around passing your annual audit but maintaining a secure payment card environment year-round.

Use a GRC Automation Solution

Today’s data environments are highly complex, and technology changes rapidly. Keeping up with PCI DSS compliance requirements can be challenging, especially if your company is still using spreadsheet software. Upgrading to a modern GRC automation solution such as Continuum GRC’s IT Audit Machine (ITAM) will help you prepare for your annual audits and maintain continuous compliance year-round far more quickly, easily, and for less money.

Finally, don’t make the mistake of thinking that PCI DSS compliance – or compliance with any framework or standard – equals cyber security. Compliance is the starting point for enterprise cyber security, not the do-all, end all.

The cyber security experts at Continuum GRC have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting your organization from security breaches. Continuum GRC offers full-service and in-house risk assessment and risk management subscriptions, and we help companies all around the world sustain proactive cyber security programs.

Continuum GRC is proactive cyber security®. Call 1-888-896-6207 to discuss your organization’s cyber security needs and find out how we can help your organization protect its systems and ensure compliance.

Cloud Security: Understanding SOC 2 Type 2 Attestations

An SOC 2 Type 2 report is crucial when selecting a cloud service vendor

An SOC 2 Type 2 report is crucial when selecting a cloud service vendor

We are living in a cloud-first world; cloud services, including storage services and SaaS providers, are wildly popular. Unfortunately, third-party vendor breaches are at epidemic levels, and new regulations such as the EU GDPR are seeking to hold organizations accountable if third-party business associates that store or handle their sensitive data, including their cloud vendors, are hacked. One way for businesses to protect themselves is to look for an SOC 2 Type 2 report when evaluating cloud vendors.

While cloud vendors are embracing the SOC 2 Type 2 to demonstrate their commitment to data integrity and security, many client organizations are still unfamiliar with this important audit standard.

What is an SOC 2 Report?

The SOC 2 is part of the American Institute of Certified Public Accountants (AICPA) SOC reporting framework and utilizes the AT-101 professional standard. Unlike the SOC 1, which focuses on financial reporting controls, the SOC 2 documents service organizations’ non-financial reporting controls. It was specifically designed for to address the needs of service organizations that store customer data in the cloud, including SaaS providers.

SOC 2 attestations are based on AICPA’s Trust Service Principles of Security, Availability, Processing Integrity, Confidentiality, and Privacy. Reporting organizations are not required to address each one of the Trust Service Principles; SOC 2 reports can be limited to the principles that are relevant to the services being provided. AICPA’s principles of Security attest that the organization protects information and systems against unauthorized access, information disclosure, and damage; and Privacy, which attests that the service organization collects, uses, retains, discloses, and disposes of personal information properly.

Type 1 vs. Type 2

There are two types of SOC 2 reports, Type 1 and Type 2. When evaluating a cloud vendor, always look for a Type 2. While a Type 1 audit provides a snapshot of an organization’s controls at a point in time, a Type 2 audit examines them over a specified period. The Type 1 is, thus, only preliminary to the Type 2. An SOC 2 Type 1 demonstrates that the provider has controls in place but has not yet audited them. A Type 2 demonstrates that they have tested the controls over a period of time and proven that they work.

SOC 2 Type 2 reports benefit both cloud vendors and their clients. Client organizations can rest assured knowing that their cloud vendors’ controls meet the highest standards of data governance and security. Cloud vendors are able to differentiate themselves in a crowded marketplace and enjoy their own peace of mind, knowing that they have proactive data governance and cyber security controls in place to protect their systems and their clients’ data.

While SOC 2 audits are time-consuming and rigorous, GRC automation technologies such as Continuum GRC’s IT Audit Machine (ITAM) can make the process take far less time and go far more smoothly.

The cyber security experts at Continuum GRC have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting your organization from security breaches. Continuum GRC offers full-service and in-house risk assessment and risk management subscriptions, and we help companies all around the world sustain proactive cyber security programs.

Continuum GRC is proactive cyber security®. Call 1-888-896-6207 to discuss your organization’s cyber security needs and find out how we can help your organization protect its systems and ensure compliance.