Data Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association



Similar documents
Important Info for Youth Sports Associations

Credit Card Processing Overview

Changing Consumer Purchasing Patterns. John Mayleben, CPP SVP, Technology and Product Development Michigan Retailers Association

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Best Practices (Top Security Tips)

CardControl. Credit Card Processing 101. Overview. Contents

PCI COMPLIANCE GUIDE For Merchants and Service Members

The Evolution of Data Breaches

Project Title slide Project: PCI. Are You At Risk?

How To Protect Your Data From Being Stolen

Payment Card Industry - Achieving PCI Compliance Steps Steps

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Josiah Wilkinson Internal Security Assessor. Nationwide

Franchise Data Compromise Trends and Cardholder. December, 2010

Payment Card Industry Data Security Standards.

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

Security. Tiffany Trent-Abram VP, Global Product Management. November 6 th, One Connection - A World of Opportunities

Data Security for the Hospitality

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

Frequently Asked Questions

Property of CampusGuard. Compliance With The PCI DSS

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

PC-DSS Compliance Strategies NDUS CIO Retreat July 27, 2011 Theresa Semmens, CISA

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW

How To Protect Your Business From A Hacker Attack

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

Target Security Breach

Accepting Payment Cards and ecommerce Payments

DATA SECURITY. Payment Card Industry (PCI) Compliance Steps for Organizations May 26, Merit Member Conference

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

SecurityMetrics Introduction to PCI Compliance

PCI Compliance Overview

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Information Technology

PCI DSS. CollectorSolutions, Incorporated

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

University Policy Accepting Credit Cards to Conduct University Business

Security & Compliance, Sikich LLP

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

Introduction to PCI DSS Compliance. May 18, :15 p.m. 2:15 p.m.

2.0 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS (PCI-DSS)

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level.

Becoming PCI Compliant

Complying with PCI is a necessary step in safely accepting Payment Cards.

CSU, Chico Credit Card PCI-DSS Risk Assessment

PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES

Dartmouth College Merchant Credit Card Policy for Processors

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines?

PROTECTION OF OUR MERCHANTS AND REFERRAL PARTNERS IS OUR FIRST CONCERN

Payment Card Industry Data Security Standards Compliance

Implementation Guide

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

How To Protect Your Credit Card Information From Being Stolen

Payment Card Industry (PCI) Data Security Standard. Attestation of Compliance for Self-Assessment Questionnaire C-VT. Version 2.0

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

Payment Card Industry Data Security Standard

A PCI Journey with Wichita State University

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

Fraud Protection, You and Your Bank

Whitepaper. PCI Compliance: Protect Your Business from Data Breach

Credit Card Handling Security Standards

Appendix 1 Payment Card Industry Data Security Standards Program

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors

Whitepaper. PCI Compliance: Protect Your Business from Data Breach

Payment Card Industry (PCI) Data Security Standard

Preparing for EMV chip card acceptance

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

UCSB Credit Card Processing and PCI Compliance

1/18/10. Walt Conway. PCI DSS in Context. Some History The Digital Dozen Key Players Cardholder Data Outsourcing Conclusions. PCI in Higher Education

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY

Office of Finance and Treasury

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

PCI Compliance: Protection Against Data Breaches

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)

Version 7.4 & higher is Critical for all Customers Processing Credit Cards!

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Payment Card Security

Payment Card Industry Compliance

University of Sunderland Business Assurance PCI Security Policy

Fraud - Preparing Data Card Transactions

PCI DSS Compliance Information Pack for Merchants

Why Is Compliance with PCI DSS Important?

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

PCI Compliance at The University of South Carolina. Failure is not an option. Rick Lambert PMP University of South Carolina

Viterbo University Credit Card Processing & Data Security Procedures and Policy

Tokenization Amplified XiIntercept. The ultimate PCI DSS cost & scope reduction mechanism

PCI Compliance: How to ensure customer cardholder data is handled with care

Symposium (FBOS) PCI Compliance. Connecting Great Ideas and Great People. Agenda

Your Compliance Classification Level and What it Means

Merchant guide to PCI DSS

COLLEGE POLICY ON CREDIT/DEBIT CARD PAYMENT PROCESSING

SecurityMetrics. PCI Starter Kit

PCI DSS Presentation University of Cincinnati

Transcription:

Data Security, Fraud Prevention, and Cost Control Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association

Michigan Retailers Association Incorporated in 1940 Represent retail interests in Lansing, Michigan The oldest, non-bank organization operating in the merchant acquiring space, now specializing in all types of non-cash treasury management solutions. 5500 merchants in 48 states and the District of Columbia, processing almost $1 billion annually ACH transactions Gift cards (storewide and community-wide solutions) 2

Payment Card Industry Data Security Standards (PCI-DSS)

What is PCI-DSS? Payment Card Industry Data Security Standard is the evolution of the various payment networks attempts to create individual security protocols and procedures. The standard is now owned and controlled by the PCI Security Standards Council. The PCI Council will continue to evaluate any changes that need to be made to the PCI standard through input from stakeholders. Updated standards can be reviewed at www.pcisecuritystandards.org

PCI Compliance PCI compliance is a journey, not a destination. All businesses that accept or process credit card transactions should be constantly reviewing and identifying areas where data might accumulate. Stand back and watch who touches a transaction and what they do with that data. Many times data accumulate in unexpected areas in a business. Staff members collect card data for many different reasons that seem legitimate at the time. Anytime a staff member is collecting card data, someone should be questioning is it really needed? PCI Compliance for most merchants is simply the completion of a Self Assessment Questionnaire (SAQ). The completed SAQ should be held in the merchant s office for presentation, if demanded by the card networks. SAQs should be completed on an annual basis.

Data Security Processor Level Processors have started to see an increasing number of hacking attempts. These attempts have become more subtle instead of the brute force data grabs. Processors (and merchants) have become much better at protecting data that is at rest, through encryption, firewalls, and other methods. Data in motion is still a problem. Hackers have learned that accessing the system and lurking in the system for days, weeks or months to collect data is more profitable than reaching in and simply grabbing a data file.

Data Security Merchant Level Merchants storing the complete and UNALTERED (nonencrypted) card data from a swiped transaction Protect data at rest AND in motion With card stripe data, a perfect duplicate can be created and used before the cardholder even suspects a problem. This allows someone to use a counterfeit card (with fake ID) anywhere he/she wants with little or no risk of capture.

Data Security Merchant POS Hackers have learned that they can also lurk in a retailers POS system and collect a significant amount of data. Remote access has become a major exposure point, businesses have legitimate business needs for allowing remote access. If you have opened the door for remote access by your employees or vendors, you have also opened the door for a hacker! In one case of a remote access hack, the bad guys hacked the POS vendor and used the login credentials on that system to access hundreds of retail POS systems. They were on the retailer s local systems for less than 5 minutes Custom made software was installed which simply captured the consumers mag stripe data and sent it each night to eastern Europe

What is Carding? Carding is the underground industry of selling and trading stolen card numbers. In less than 5 minutes, on the Internet Good card numbers, sold in lots of 100, with a money back guarantee! Card network plastic available by the box Skimming equipment and card encoding equipment

PCI-DSS -- Limit the Scope First!

ALL machines have to be PCI compliant? Server Credit Card Processing

Just one machine has What is the scope of PCI compliance to be PCI compliant here? Server Firewall Credit Card Processing

What Data Can I Keep? Data falls into two different categories Protected (that which you can keep but must ALWAYS protect) Card Number Expiration Date Prohibited (which is never stored after the authorization of the transaction and settlement of the batch) Mag stripe data CVV2 data PIN numbers 29

12 Points of PCI-DSS Compliance Install and maintain a firewall configuration to protect data Do not use vendor defaults for system passwords Protect cardholder data Encrypt transmission of cardholder data across public networks Use updated anti-virus software Develop and maintain secure systems Restrict access to data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to data Track and monitor all access to networks and data Regularly test the systems and processes Maintain policies that address information security 30

What Happens If.? Bad things happen to good people, how do you protect from a data breach? Data breach insurance is available and covers expenses related to a data breach Forensic Audit Card Replacement expenses PCI assessments and fines Government fines Usually $50,000 or $100,000 in coverage