Safeguarding Transactions

The retail industry has been in the spotlight with data breach after data breach. With the holiday season fast approaching, companies need to take extra measures to secure transactions. According to Verizon PoS invasions accounted for 31% of the 148 retail breaches in 2013, and these invasions accounted for 75 percent of the 137 accommodation sector breaches. This trend in attacks on payment card systems is only accelerating.

So what protocols can be put in place to secure these transactions, and prevent a major breach? According to Smart Card Alliance, Chip Technology, Encryption, and Tokenization are three technologies that are recommended to be used in combination to ensure secure payments and prevent credit card fraud. The implementation of these three technologies will differ, according to the payments stakeholder’s individual risk, regulations, cost and anticipated needs. More about these three technologies and how they can be implemented together can be found in the white paper.

More on how to safeguard your business from a potential breach to come. So keep an eye out!


Topic Related Links

SecureDoc Enterprise Server
Encryption Key Management
White Paper: Five Pillars of Transparent Data Security

Previous Post
SecTor 2014 – What We Learned
Next Post
NVMe and Self-Encrypting Drives – The Perfect Match

Related Posts

The importance of partners

Go to market strategies for vendors varies in approach whether it’s entirely direct, indirect or an amalgamation of both. WinMagic adheres to a hybrid approach that best matching the requirements of the customer or business practices within a given region.…
Read more

BitLocker Management

The never-ending torrent of high-profile data breaches encourages companies to evaluate security fundamentals. Among them is full-disk encryption (FDE), a security best practice that protects information on servers, laptops and other devices while they are at rest. (more…)
Read more

The “Key” to Playing it Safe

Apple this week rolled out a new version of its operating system running mobile devices such as iPads and iPhones. It also announced it will no longer be able to comply with requests of law enforcement to unlock the encryption…
Read more

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu