Safeguarding Transactions

The retail industry has been in the spotlight with data breach after data breach. With the holiday season fast approaching, companies need to take extra measures to secure transactions. According to Verizon PoS invasions accounted for 31% of the 148 retail breaches in 2013, and these invasions accounted for 75 percent of the 137 accommodation sector breaches. This trend in attacks on payment card systems is only accelerating.

So what protocols can be put in place to secure these transactions, and prevent a major breach? According to Smart Card Alliance, Chip Technology, Encryption, and Tokenization are three technologies that are recommended to be used in combination to ensure secure payments and prevent credit card fraud. The implementation of these three technologies will differ, according to the payments stakeholder’s individual risk, regulations, cost and anticipated needs. More about these three technologies and how they can be implemented together can be found in the white paper.

More on how to safeguard your business from a potential breach to come. So keep an eye out!


Topic Related Links

SecureDoc Enterprise Server
Encryption Key Management
White Paper: Five Pillars of Transparent Data Security

Previous Post
SecTor 2014 – What We Learned
Next Post
NVMe and Self-Encrypting Drives – The Perfect Match

Related Posts

Nothing is ever ‘free’

Last week I attended SC Congress in New York and did a presentation talking about the results of our study with the Ponemon Institute and the cost of data encryption solutions. It was a good event, well attended and there…
Read more

Florida Gets Serious With Data Privacy

July 1st was a big day in Florida if you’re a follower of info security news. That was the day Florida’s new Florida Information Protection Act (FIPA) came into effect and had immediate consequences for anyone that does business in…
Read more

Security Measures to Think About

Everyone is weary of hackers and the damages that they can cause, as seen with the Heartbleed Bug and Shellshock Bash. But hacking attacks can also mean physical security breaches, as hackers do not always have to resort to intricate…

A new year, same mistakes

It’s 2013 and everything old is new again. It’s 10 days into the year and so far we’ve heard about at least two key data thefts and a summary penalty for exposing personal health info in the U.S. (more…)
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu