HOW TO PROTECT YOUR BUSINESS AND YOUR CUSTOMERS FROM DATA FRAUD



Similar documents
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

How To Protect Your Business From A Hacker Attack

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

PAI Secure Program Guide

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

PCI General Policy. Effective Date: August Approval: December 17, Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS:

Information Technology

Viterbo University Credit Card Processing & Data Security Procedures and Policy

Policy for Protecting Customer Data

How To Protect Visa Account Information

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY

Why Is Compliance with PCI DSS Important?

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Frequently Asked Questions

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

CREDIT CARD PROCESSING POLICY AND PROCEDURES

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

Josiah Wilkinson Internal Security Assessor. Nationwide

This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format.

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Payment Card Industry Data Security Standards.

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors

Becoming PCI Compliant

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

How To Protect Your Credit Card Information From Being Stolen

Franchise Data Compromise Trends and Cardholder. December, 2010

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

Project Title slide Project: PCI. Are You At Risk?

PCI Compliance Security Awareness Program For Marine Corps Community Services Contacts: Paul Watson

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

Payment Card Industry Compliance

And Take a Step on the IG Career Path

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level.

Payment Card Industry - Achieving PCI Compliance Steps Steps

Credit Card Security

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

Conquering PCI DSS Compliance

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Dartmouth College Merchant Credit Card Policy for Processors

PCI DSS Requirements - Security Controls and Processes

Thoughts on PCI DSS 3.0. September, 2014

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY

PCI DSS COMPLIANCE DATA

PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

PCI Data Security Standards (DSS)

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines?

Your Compliance Classification Level and What it Means

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

PROTECTION OF OUR MERCHANTS AND REFERRAL PARTNERS IS OUR FIRST CONCERN

University Policy Accepting Credit Cards to Conduct University Business

PCI Compliance: Protection Against Data Breaches

PCI Compliance for Healthcare

Table of Contents. 2 TouchSuite Welcome Kit

Implementation Guide

Fraud Protection, You and Your Bank

PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Saint Louis University Merchant Card Processing Policy & Procedures

Global Partner Management Notice

worldpay.com Understanding the 12 requirements of PCI DSS SaferPayments Be smart. Be compliant. Be protected.

PCI DSS. CollectorSolutions, Incorporated

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

How To Complete A Pci Ds Self Assessment Questionnaire

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance

Accepting Payment Cards and ecommerce Payments

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Policies and Procedures

2.0 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS (PCI-DSS)

Data Security for the Hospitality

The Comprehensive, Yet Concise Guide to Credit Card Processing

PCI Compliance. Top 10 Questions & Answers

Transcription:

HOW TO PROTECT YOUR BUSINESS AND YOUR CUSTOMERS FROM DATA FRAUD

2 Protecting Data Is Good Business What s at stake? Risky behavior: Results of an NFIB/Visa USA survey 3 Are You a Target? Gauge your risk for data fraud Rank your risk level: Four simple questions 4 Take Action to Protect Your Business and Your Customers Eliminate prohibited data Protect stored data Secure the environment 7 Payment Card Industry Data Security Standard (PCI DSS) 8 Simple Steps to Safeguard Confidential Business Information Apply these simple steps today 9 Helpful Resources Take advantage of these online security programs

ABOUT VISA USA Visa USA is a leading payments brand and the nation s largest payments system, enabling banks to provide their consumer and business customers with a wide variety of payment alternatives tailored to meet their evolving needs. Visa USA is committed to increasing the choice, convenience, acceptance and security of Visa payments for all stakeholders financial institutions, cardholders and merchants. In the United States, more than 521 million Visa-branded cards have been issued by our 13,320 financial institution customers. Visa products generated nearly $1.8 trillion in total volume in the United States through March 2007 and enjoy unsurpassed acceptance around the globe. For more information, visit www.visa.com. 1

Risky Behavior A survey by NFIB, conducted in partnership with Visa USA, found that most small businesses are engaging in activities that could put their customer information at risk. 37% of card-accepting businesses knowingly store customer card numbers 24% store customer Social Security numbers 28% store customer bank account numbers or copies of their checks 52% keep at least one of these sensitive pieces of information 57% don t see securing customer data as something that requires formal planning 61% have never sought out information about how to properly handle and store customer information PROTECTING DATA IS GOOD BUSINESS What s at Stake? Few business owners can also claim to be security experts. However, with high-tech fraudsters growing ever-more sophisticated, it s important to clearly understand the nature of the threats that face us and take the necessary steps to protect our businesses and our mutual customers. Indeed, as a small-business owner, you take all the necessary precautions to protect your storefront. But did you know that criminals are seeking more than what s physically inside your business? Increasingly, they also want to rob your customers of their financial data. Leaving customer and employee data unprotected is like locking your jewelry in a safe but leaving the combination on top. Data is the currency most coveted by criminals today. Whether the target is payment card information, Social Security numbers or personnel files, data theft is a full-time occupation for a new breed of criminal. Small businesses are now being targeted by these sophisticated and relentless criminals, who may be operating from down the street or half a world away. When security is breached, thieves rob your business of its reputation and steal your customers trust. In fact, a March 2007 survey by Javelin Strategy & Research found a strong link between a consumer s perception of a retailer s reputation for protecting card account information and the consumer s willingness to shop there. Only 20 percent surveyed said they would likely continue shopping at a store if they learned it had a data breach that may have compromised their card account information, while 78 percent said they would be unlikely to continue to shop there. Besides the loss of customer goodwill, a breach may result in unflattering media headlines, fines from merchant banks or government regulatory agencies, or exposure to potential litigation. 2

Rank Your Risk Level: Four Simple Questions 1 Do you accept payment cards through a computer-based payment application or an application that is directly connected to the Internet (as opposed to a stand-alone dial-up terminal)? 2 Do you have multiple systems connected to your payment application, and do any of them have Internet access? 3 Do you use wireless Internet access at your business? 4 Does your business have an e-commerce component? ARE YOU A TARGET? Gauge Your Risk for Data Fraud Your risk exposure depends on the way you operate your business. If you answered yes to any of these questions to the left, it s time to get smart about your company s data security practices. However, even if you answered no to all of these questions, your business may still be vulnerable to data thieves. Visa has developed a list of four key vulnerabilities that small businesses should be aware of to help ensure they won t be victimized by fraudsters: 1 Storing Magnetic Stripe Data (and other sensitive data) The magnetic stripe on the back of payment cards contains two tracks of encoded payment data, also called track data, that could be used by thieves to create counterfeit cards and commit other forms of fraud. This sensitive cardholder data from the magnetic stripe is received by point-of-sale (POS) systems when a merchant swipes a payment card. POS systems often store this sensitive data post-authorization without the small business owner s knowledge, in violation of Visa rules. In addition to magnetic stripe data storage, Visa has also observed compromises involving other prohibited-to-store data, such as the CVV2 value and PIN data. CVV2 is the three-digit number on the signature panel on the back of the card used for telephone and e-commerce transactions. The PIN is entered by a consumer for debit transactions, and encrypted PIN blocks are created by the PIN Entry Device for debit transactions. 2 Missing or Outdated Security Patches Hackers are constantly attempting to exploit known software vulnerabilities, as well as uncover unknown deficiencies in commercially available software products. Product vendors respond with frequent fixes in the form of software updates or patches. It s crucial that all relevant software updates or patches be applied as soon as possible to minimize the risk of compromise. 3 Vendor-Supplied Default Settings and Passwords Hardware and software products come packaged from vendors with preset passwords and settings. Default passwords and settings are easily guessed and often are well publicized in hacker chat rooms. Once an attacker accesses one of these systems, security mechanisms can easily be turned off, databases can be accessed, and any evidence of an intrusion can be eliminated. 4 Uncontrolled Access to Sensitive Customer Information Small-business owners face the threat of sensitive customer data simply walking off. Data files, paper files and laptops are all portable. Without controls in place, this information can quickly disappear. 3

TAKE ACTION TO PROTECT YOUR BUSINESS AND YOUR CUSTOMERS It s smart business for you to invest the time and resources necessary to protect payment card data and other sensitive customer information. At stake is nothing less than your good name and the trust your customers place in you and your business. Several studies have indicated that the costs associated with mitigating a data breach far exceed the costs of sound security investments. Waiting on the sidelines is not an option. Since June 2001, Visa USA s Cardholder Information Security Program (CISP) has been mandated for all merchants and service providers that store, process or transmit Visa cardholder data. Under CISP, Visa enforces compliance with the industrywide Payment Card Industry Data Security Standard (PCI DSS), which enables members and merchants to implement a single security program across all payment brands. Outlined below are the key security standards as well as details particularly relevant to you as a small-business operator. Know and Comply with PCI DSS. If you accept card payments, you must comply with the PCI DSS, which sets requirements for protecting sensitive transaction information. The standard, supported by major payment card brands, has been in place since 2004 and provides effective tools to protect against cardholder data exposure and compromise. It consists of 12 basic requirements for safeguarding account data, supported by more detailed sub-requirements. (See chart on page 7.) You can find the PCI DSS in its entirety or learn more about the CISP at www.visa.com/cisp. Validate Your PCI Compliance. In addition to adhering to the PCI DSS, your business may also have to validate its compliance with the standard. Validation requirements are determined by a merchant s Visa transaction volume over a 12-month period. Most small businesses are considered a Level 4 category. For more information about validation requirements for small businesses, consult your bank or see www.visa.com/cisp. Prioritize Your Approach to Cardholder Data Security. Consider the risk-prioritized steps on the following pages: 1) eliminate prohibited data, 2) protect stored data and 3) secure the environment in accordance with the PCI DSS. 4

STEP 1 Eliminate Prohibited Data Check Your POS Systems. Small businesses that use commercially available POS systems or payment software should contact their vendors to determine whether the systems they use store prohibited data after transaction authorization. Ask your POS or payment software vendor (or reseller/integrator) to confirm that your software version does not store magnetic stripe data, CVV2, PINs or encrypted PIN blocks. If it does, these data elements must be removed immediately, including any historical data that has been stored in database or log files. Ask your payment software vendor to share a list of files written by the application and a summary of the contents of those files to verify prohibited data is not stored. Confirm with your payment processor that all cardholder data storage is necessary and appropriate for the transaction type. Verify that your POS software version has been validated as compliant with the Visa Payment Application Best Practices (PABP) program. Visa created the PABP program to facilitate compliance with the PCI DSS by establishing minimum standards for payment applications. A list of PABP-compliant applications is available at www.visa.com/pabp. Minimize Data Storage. It is permissible to store the following data from the magnetic stripe: cardholder s name, primary account number, expiration date and service code. These values, which should only be stored if needed, must be protected in accordance with the PCI DSS. Small businesses can limit the damage from a compromise by not storing magnetic stripe data, CVV2 and PIN blocks. Small businesses can also decrease their risk by only storing cardholder data if it is needed to perform business functions. If you don t need it, don t store it! STEP 2 Protect Stored Data Encrypt or Truncate Your Data. Small businesses should evaluate whether they must retain full account numbers after a transaction has been authorized. In many cases, small businesses may be able to fulfill their business requirements on some or all of their systems by retaining only a truncated portion of the account number, such as the first six and last four digits. Small businesses that must electronically store full account numbers for business needs must render the account number unreadable through other means, such as encryption. Additionally, account numbers transmitted over public networks, such as the Internet or wireless, must be encrypted during transmission using technology such as SSL. 5

STEP 3 Secure the Environment Replace Missing or Outdated Security Patches. When it comes to updating security patches, speed is the name of the game. Many vendors now offer automated alert services that provide prompt notification to their clients. Some vendors also provide automated patching mechanisms. If a patch cannot be applied immediately, other controls to reduce this risk should be implemented, and monitoring of all affected systems should be increased. Small businesses should establish software upgrade policies and procedures to ensure patches are reviewed and installed in a timely manner. Check Your Settings and Passwords. Hardware and software products come packaged from vendors with preset passwords and settings. Any default or blank settings and passwords should be changed prior to deployment. Passwords should comply with current industry standards for storing passwords. Any default settings should be modified immediately. Prevent Employee Fraud Scams. Your business policies should be designed to prevent fraud scams involving collusive employees. As part of this, physical access to information, whether it resides in a computer or a file drawer, should be restricted. Only those employees with a business need should be permitted access. Whenever possible, account numbers should be encrypted or scrambled during transaction processing. Unauthorized electronic equipment such as personal laptop computers that can be used to steal or replicate account information should not be allowed in the workplace. 6

PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) BUILD AND MAINTAIN A SECURE NETWORK 1 Install and maintain a firewall configuration to protect data 2 Do not use vendor-supplied defaults for system passwords and other security parameters PROTECT CARDHOLDER DATA 3 Protect stored data 4 Encrypt transmission of cardholder data and sensitive information across public networks MAINTAIN A VULNERABILITY MANAGEMENT PROGRAM 5 Use and regularly update anti-virus software 6 Develop and maintain secure systems and applications IMPLEMENT STRONG ACCESS CONTROL MEASURES 7 Restrict access to data based on business necessity 8 Assign a unique ID to each person with computer access 9 Restrict physical access to cardholder data REGULARLY MONITOR AND TEST NETWORKS 10 Track and monitor all access to network resources and cardholder data 11 Regularly test security systems and processes MAINTAIN AN INFORMATION SECURITY POLICY 12 Maintain a policy that addresses information security 7

HELPFUL RESOURCES While small businesses often lack in-house support for securing their customers private information, there are many online resources available to help. For more information on Visa s Cardholder Information Security Program (CISP) and the Payment Card Industry Data Security Standard (PCI DSS), visit www.visa.com/cisp. The Payment Card Industry Security Standards Council (PCI SSC) provides a global forum for the ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection. To learn more and see how your business can contribute to the effort, visit www.pcisecuritystandards.org. For a list of POS payment applications compliant with Payment Application Best Practices, go to www.visa.com/pabp. Not every small-business owner can be a security expert. Outside vendors can help. See the Resources page at www.pcisecuritystandards.org. To learn more about ways your business can strengthen its data security practices, e-mail Visa at AskVisaUSA@Visa.com. 8

SIMPLE STEPS TO SAFEGUARD CONFIDENTIAL BUSINESS INFORMATION Apply These Simple Steps Today In addition to complying with the card companies data security requirements, small-business owners should take precautions to safeguard all types of sensitive business and customer information: Empty the mailbox. Never leave outgoing or incoming mail in pickup boxes overnight. This is your best defense against possible off-hour mail snoops. Watch the fax. A document sitting on the fax waiting for pickup is an open invitation for prying eyes. Try to stand by the fax machine to receive sensitive information as soon as it comes in. Send e-mail sparingly. When sending sensitive information via e-mail, encrypt it first or don t send it at all. There s always the possibility of interception or an accidental electronic distribution. Make copies carefully. Private matters can go public fast when juicy stuff gets left behind. When making copies of sensitive documents, remember to grab your originals off the copy machine. Use the shredder. Always shred sensitive information before dumping it in the trash bin. If you can t shred, use receptacles designed for sensitive paper disposal. Leave discreet voice-mail messages. You never know who s standing within earshot of someone s work area, so avoid leaving a detailed voice-mail message if it involves sensitive information. Protect your onsite ID. Play it safe with your ID badges, office keys and building-entry codes. Protect them as you would your own credit cards and cash. Keep things private in public. When you re in a public place, think twice before discussing proprietary information or any details about sensitive projects. You never know who s listening. Identify strangers. Don t make it easy for an outsider to pull an inside job. If you see an unfamiliar face roaming around your office, step up and ask if you can assist. Make your presence known. Be careful with your documents. Remove all sensitive materials from your work area when you re not using them or at the end of the day. Be sure to lock them in the appropriate file cabinets, desk drawers, etc. Note what s on your screen. Those account numbers and financial details on your computer screen are intended for your eyes only! To keep it that way, use a glare screen to minimize easy information access. Limit cell phone conversations. Anyone can listen in on your cell phone conversations. All it takes is a good ear and a decent scanner. Avoid sharing any sensitive information over a cell phone. 9