• Skip to primary navigation
  • Skip to content
  • Skip to footer

Retriever, Advantage Merchant Services

Orlando Office: 321-251-6693 · Memphis Office: 901-271-6641
Orlando Office: 321-251-6693 · Memphis Office: 901-271-6641
  • Meet your team
  • Our Process
  • Hardware & Software
    • Simple POS System
    • Custom Built Solutions
    • Desktop Credit Card Terminal
    • Shopping Cart Solutions
    • Virtual Point of Sale
    • Mobile Payment Apps
    • Full Functioning POS
    • Wireless Terminal
  • Processing Solutions
    • Restaurants
    • Retail
    • Professional Business
    • On the Go Merchants
    • e-Commerce
    • Point of Sale
  • Financial Institutions
  • Locations
    • Memphis
    • Orlando
  • News
    • Articles
    • Blog
    • Press Releases
  • Testimonials
  • Contact

Why Is Compliance with PCI DSS Important?

The members of PCI Security Standards Council (American Express, Discover, JCB, MasterCard, and Visa) continually monitor cases of account data compromise. These compromises cover the full spectrum of organizations, from the very small to very large merchants and service providers.

A security breach and subsequent compromise of payment card data has far-reaching consequences for affected organizations, including:

  1. Regulatory notification requirements,
  2. Loss of reputation,
  3. Loss of customers,
  4. Potential financial liabilities (for example, regulatory and other fees and fines), and
  5. Litigation.

Post-mortem compromise analysis has shown common security weaknesses that are addressed by PCI DSS, but were not in place in the organizations when the compromises occurred. PCI DSS was designed and includes detailed requirements for exactly this reason—to minimize the chance of compromise and the effects if a compromise does occur.

Investigations after compromises consistently show common PCI DSS violations, including but not limited to:

  • Storage of magnetic stripe data (Requirement 3.2). It is important to note that many compromised entities are unaware that their systems are storing this data.
  • Inadequate access controls due to improperly installed merchant POS systems, allowing malicious users in via paths intended for POS vendors (Requirements 7.1, 7.2, 8.2 and 8.3)
  • Default system settings and passwords not changed when system was set up (Requirement 2.1)
  • Unnecessary and insecure services not removed or secured when system was set up (Requirements 2.2.2 and 2.2.4)
  • Poorly coded web applications resulting in SQL injection and other vulnerabilities, which allow access to the database storing cardholder data directly from the web site (Requirement 6.5)
  • Missing and outdated security patches (Requirement 6.1)
  • Lack of logging (Requirement 10)
  • Lack of monitoring (via log reviews, intrusion detection/prevention, quarterly vulnerability scans, and file integrity monitoring systems) (Requirements 10.6, 11.2, 11.4 and 11.5)
  • Poorly implemented network segmentation resulting in the cardholder data environment being unknowingly exposed to weaknesses in other parts of the network that have not been secured according to PCI DSS (for example, from unsecured wireless access points and vulnerabilities introduced via employee e-mail and web browsing) (Requirements 1.2, 1.3 and 1.4)

General Contact

Orlando Office: 321-251-6693
Memphis Office: 901-271-6641

Connect With Us

Copyright © 2021 Retriever, Advantage Merchant Services and boomtime , All Rights Reserved. • Email