SlideShare a Scribd company logo
Copyright© 2018 Sucuri. All Rights Reserved.
Copyright© 2018 Sucuri. All Rights Reserved.
Ecommerce Risks & Threats
Copyright© 2018 Sucuri. All Rights Reserved.
According to Trustwave
research, 90% of data
breaches impacted
small merchants
1. Retail - 45%
2. Food & Beverage - 24%
3. Hospitality - 9%
Top 3 Compromised Industries
Data Breaches
Copyright© 2018 Sucuri. All Rights Reserved.
Average cost of a data
breach for small business
$36K+
Copyright© 2018 Sucuri. All Rights Reserved.
Merchants need to
consider a multi-layered
approach for protecting
sensitive customer data.
Serious data breaches can
happen even you do not
store cardholder data.
Copyright© 2018 Sucuri. All Rights Reserved.
Data BreachCost Factors
Mandatory Forensic
Examination
Notification of Customers Affected Customer Credit
Monitoring
PCI Compliance Fines
Liability for Fraud Charges Credit Card Replacement
Costs
POS System Improvements Reassessment for PCI
Compliance
Copyright© 2018 Sucuri. All Rights Reserved.
Non-monetarydamages are painfultoo
57%
31%
75%
of people lost trust and
confidence in the
organization
of people terminated
their relationship with
the organization
of executives said the
data breach had an
impact on the business’
reputation
Ponemon Institute Study Ponemon Institute Study Ponemon Institute Study
Copyright© 2018 Sucuri. All Rights Reserved.
Non-monetarydamages are painfultoo
Bad Press Loss of Payment
Card Privileges
Your Time
Copyright© 2018 Sucuri. All Rights Reserved.
What is PCI Compliance?
Copyright© 2018 Sucuri. All Rights Reserved.
PCI Compliance
In 2006, American Express, Discover, JCB International, MasterCard and Visa Inc.
founded the Security Standards Council (PCI SSC) in order to maintain a
comprehensive and evolving set of standards to help vendors protect their
payment systems.
PCI = Payment Card Industry
Copyright© 2018 Sucuri. All Rights Reserved.
BuildandMaintaina SecureNetwork
•
•
Copyright© 2018 Sucuri. All Rights Reserved.
Protect Cardholder Data
•
•
Copyright© 2018 Sucuri. All Rights Reserved.
Maintaina VulnerabilityManagement Program
•
•
Copyright© 2018 Sucuri. All Rights Reserved.
Implement Strong Access Control Measures
•
•
•
Copyright© 2018 Sucuri. All Rights Reserved.
RegularlyTest andMonitor Networks
•
•
Copyright© 2018 Sucuri. All Rights Reserved.
Maintainan InfoSecPolicy
•
Copyright© 2018 Sucuri. All Rights Reserved.
Website Security
Copyright© 2018 Sucuri. All Rights Reserved.
How Websites Get Hacked
•
•
•
•
•
•
•
•
Copyright© 2018 Sucuri. All Rights Reserved.
SSL Certificate= Secure?
•
•
•
•
•
Copyright© 2018 Sucuri. All Rights Reserved.
Website ApplicationFirewalls
•
•
•
•
•
•
Copyright© 2018 Sucuri. All Rights Reserved.
Post Breach PCI Protocol
Copyright© 2018 Sucuri. All Rights Reserved.
Mandatory Forensic Examination
• PCI DSS require merchants that are
suspected of having a data breach to have
a mandatory forensic examination.
• According to Verizon Business, a small
business examination may cost between
$20,000 to $50,000.
Copyright© 2018 Sucuri. All Rights Reserved.
Notificationof Customers
• If financial information is suspected of
being compromised, most states require
that customers be notified.
• University of North Carolina at Chapel Hill
said a 2013 data breach of just 6,000
records has cost the school nearly $80,000
in working with affected parties.
Copyright© 2018 Sucuri. All Rights Reserved.
Affected Customer Credit Monitoring
• If you experience a breach you may
be required to produce up to a
year’s worth of credit monitoring
and/or counseling services to
customers affected by your breach.
Copyright© 2018 Sucuri. All Rights Reserved.
PCI ComplianceFines
• In 2011, 96% of the merchants experiencing a
data breach had not complied with the PCI
DSS.
• If the forensic investigation shows that your
business was not in compliance heavy fines
could be levied against you. These fines can
range from $5,000 to $50,000 or more.
Copyright© 2018 Sucuri. All Rights Reserved.
Liability for Fraud Charges
• Many merchants assume they have no
liability after a data breach.
• This is not necessarily the case; lawsuits
may claim liability on merchants for security
breaches.
Copyright© 2018 Sucuri. All Rights Reserved.
Credit Card ReplacementCosts
• Merchants may be required by card issuers to
pay the cost of reissuing cards to customers.
• These fees can range from $3 to $10 per card.
Copyright© 2018 Sucuri. All Rights Reserved.
POS System Improvements
• Depending on the source of the breach, you
may have to invest in upgrading or replacing
your POS system, including servers, software
and/or card swipe devices.
Copyright© 2018 Sucuri. All Rights Reserved.
Reassessment for PCI
Compliance
• In order to qualify to accept cards again,
a complete PCI assessment by an
external Qualified Security Assessor
(QSA) must be performed.
Copyright© 2018 Sucuri. All Rights Reserved.
Thank You!
Alycia Mitchell

More Related Content

What's hot

Stop wire fraud aug 2016
Stop wire fraud aug 2016Stop wire fraud aug 2016
Stop wire fraud aug 2016
Laurent Pacalin
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
Guardian Analytics
 
Trends in AML Compliance
Trends in AML ComplianceTrends in AML Compliance
Trends in AML Compliance
Amazon Web Services
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Guardian Analytics
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
Laurent Pacalin
 
Same Day ACH: The Face of Faster Payment
Same Day ACH: The Face of Faster PaymentSame Day ACH: The Face of Faster Payment
Same Day ACH: The Face of Faster Payment
Quatrro Processing Services (QPS)
 
Blockchain and it’s importance on Insurance Industry
Blockchain and it’s importance on Insurance IndustryBlockchain and it’s importance on Insurance Industry
Blockchain and it’s importance on Insurance Industry
Artivatic.ai
 
IBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcareIBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcare
IBM India Smarter Computing
 
How to fight chargebacks. part 1
How to fight chargebacks. part 1How to fight chargebacks. part 1
How to fight chargebacks. part 1
Ikajo International
 
Intelligent underwriting workbench
Intelligent underwriting workbenchIntelligent underwriting workbench
Intelligent underwriting workbench
Artivatic.ai
 
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsPreventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Capgemini
 
Adoption of Technologies for Claims Management in the Health Insurance Sector.
Adoption of Technologies for Claims Management in the Health Insurance Sector.Adoption of Technologies for Claims Management in the Health Insurance Sector.
Adoption of Technologies for Claims Management in the Health Insurance Sector.
Artivatic.ai
 
IBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insuranceIBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insurance
IBM India Smarter Computing
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
TransUnion
 
Case study Big Data Insurance
Case study Big Data InsuranceCase study Big Data Insurance
Case study Big Data Insurance
Rajnish Goswami
 
Big Data in Insurance Industry
Big Data in Insurance IndustryBig Data in Insurance Industry
Big Data in Insurance Industry
Suyati Technologies
 
Preventing Tax Evasion & Combating Fraud through Predictive Analytics
Preventing Tax Evasion & Combating Fraud through Predictive AnalyticsPreventing Tax Evasion & Combating Fraud through Predictive Analytics
Preventing Tax Evasion & Combating Fraud through Predictive Analytics
Capgemini
 
KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)
EY
 
Accenture Insurance Data Capture
Accenture Insurance Data Capture Accenture Insurance Data Capture
Accenture Insurance Data Capture
Accenture Insurance
 
Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Søren Ilsøe
 

What's hot (20)

Stop wire fraud aug 2016
Stop wire fraud aug 2016Stop wire fraud aug 2016
Stop wire fraud aug 2016
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Trends in AML Compliance
Trends in AML ComplianceTrends in AML Compliance
Trends in AML Compliance
 
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
Preventing Business Email Compromise Fraud with Guardian Analytics Real-Time ...
 
ISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email CompromiseISMG - Fighting Business Email Compromise
ISMG - Fighting Business Email Compromise
 
Same Day ACH: The Face of Faster Payment
Same Day ACH: The Face of Faster PaymentSame Day ACH: The Face of Faster Payment
Same Day ACH: The Face of Faster Payment
 
Blockchain and it’s importance on Insurance Industry
Blockchain and it’s importance on Insurance IndustryBlockchain and it’s importance on Insurance Industry
Blockchain and it’s importance on Insurance Industry
 
IBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcareIBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcare
 
How to fight chargebacks. part 1
How to fight chargebacks. part 1How to fight chargebacks. part 1
How to fight chargebacks. part 1
 
Intelligent underwriting workbench
Intelligent underwriting workbenchIntelligent underwriting workbench
Intelligent underwriting workbench
 
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive AnalyticsPreventing Tax Evasion & Benefits Fraud Through Predictive Analytics
Preventing Tax Evasion & Benefits Fraud Through Predictive Analytics
 
Adoption of Technologies for Claims Management in the Health Insurance Sector.
Adoption of Technologies for Claims Management in the Health Insurance Sector.Adoption of Technologies for Claims Management in the Health Insurance Sector.
Adoption of Technologies for Claims Management in the Health Insurance Sector.
 
IBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insuranceIBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insurance
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Case study Big Data Insurance
Case study Big Data InsuranceCase study Big Data Insurance
Case study Big Data Insurance
 
Big Data in Insurance Industry
Big Data in Insurance IndustryBig Data in Insurance Industry
Big Data in Insurance Industry
 
Preventing Tax Evasion & Combating Fraud through Predictive Analytics
Preventing Tax Evasion & Combating Fraud through Predictive AnalyticsPreventing Tax Evasion & Combating Fraud through Predictive Analytics
Preventing Tax Evasion & Combating Fraud through Predictive Analytics
 
KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)
 
Accenture Insurance Data Capture
Accenture Insurance Data Capture Accenture Insurance Data Capture
Accenture Insurance Data Capture
 
Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...
 

Similar to Ecommerce Website Security

Payment gateway
Payment gatewayPayment gateway
Payment gateway
HananBahy
 
Treasury in a Time of Crisis
Treasury in a Time of CrisisTreasury in a Time of Crisis
Treasury in a Time of Crisis
Kyriba Corporation
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
Strategic Treasurer
 
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
TransUnion
 
RPA case study for claims processing
RPA case study for claims processingRPA case study for claims processing
RPA case study for claims processing
NikhilChawda2
 
Protecting Against Payment Fraud in SAP S/4HANA
Protecting Against Payment Fraud in SAP S/4HANAProtecting Against Payment Fraud in SAP S/4HANA
Protecting Against Payment Fraud in SAP S/4HANA
Kyriba Corporation
 
Fast- Track Data Processing with Automation in Claims Processing
Fast- Track Data Processing with Automation in Claims ProcessingFast- Track Data Processing with Automation in Claims Processing
Fast- Track Data Processing with Automation in Claims Processing
AutomationEdge Technologies
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
TransUnion
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
Cloudera, Inc.
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
Sarah Fane
 
How Credit Card Processing Works
How Credit Card Processing WorksHow Credit Card Processing Works
How Credit Card Processing Works
Business.com
 
AI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue AnalyticsAI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue Analytics
Virtue Analytics
 
Securter Systems
Securter Systems Securter Systems
Securter Systems
KimberleyLau4
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
European Merchant Services
 
Digital Transformation in Insurance Operations
Digital Transformation in Insurance OperationsDigital Transformation in Insurance Operations
Digital Transformation in Insurance Operations
10xDS - Exponential Digital Solutions
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
FinTechLabs.io
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management systemsflynn073
 
PCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePayPCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePay
BluePayProcessing
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci compliance
SysCloud
 
CSI-globalVCard-Whitepaper-Whats-holding-your-business-back
CSI-globalVCard-Whitepaper-Whats-holding-your-business-backCSI-globalVCard-Whitepaper-Whats-holding-your-business-back
CSI-globalVCard-Whitepaper-Whats-holding-your-business-backDavid Disque
 

Similar to Ecommerce Website Security (20)

Payment gateway
Payment gatewayPayment gateway
Payment gateway
 
Treasury in a Time of Crisis
Treasury in a Time of CrisisTreasury in a Time of Crisis
Treasury in a Time of Crisis
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
RPA case study for claims processing
RPA case study for claims processingRPA case study for claims processing
RPA case study for claims processing
 
Protecting Against Payment Fraud in SAP S/4HANA
Protecting Against Payment Fraud in SAP S/4HANAProtecting Against Payment Fraud in SAP S/4HANA
Protecting Against Payment Fraud in SAP S/4HANA
 
Fast- Track Data Processing with Automation in Claims Processing
Fast- Track Data Processing with Automation in Claims ProcessingFast- Track Data Processing with Automation in Claims Processing
Fast- Track Data Processing with Automation in Claims Processing
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
How Credit Card Processing Works
How Credit Card Processing WorksHow Credit Card Processing Works
How Credit Card Processing Works
 
AI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue AnalyticsAI in Banking - What it can do & its benefits | Virtue Analytics
AI in Banking - What it can do & its benefits | Virtue Analytics
 
Securter Systems
Securter Systems Securter Systems
Securter Systems
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
 
Digital Transformation in Insurance Operations
Digital Transformation in Insurance OperationsDigital Transformation in Insurance Operations
Digital Transformation in Insurance Operations
 
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
Trust Frameworks and Open Banking #fapisum - Japan/UK Open Banking and APIs S...
 
Ibm odm fraud detection & management system
Ibm odm   fraud detection & management systemIbm odm   fraud detection & management system
Ibm odm fraud detection & management system
 
PCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePayPCI FAQs and Myths - BluePay
PCI FAQs and Myths - BluePay
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci compliance
 
CSI-globalVCard-Whitepaper-Whats-holding-your-business-back
CSI-globalVCard-Whitepaper-Whats-holding-your-business-backCSI-globalVCard-Whitepaper-Whats-holding-your-business-back
CSI-globalVCard-Whitepaper-Whats-holding-your-business-back
 

More from Sucuri

Logs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress SiteLogs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress Site
Sucuri
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri Security
Sucuri
 
Why Do Hackers Hack?
Why Do Hackers Hack?Why Do Hackers Hack?
Why Do Hackers Hack?
Sucuri
 
What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?
Sucuri
 
Steps to Keep Your Site Clean
Steps to Keep Your Site CleanSteps to Keep Your Site Clean
Steps to Keep Your Site Clean
Sucuri
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website Trends
Sucuri
 
Sucuri Webinar: What is SEO Spam and How to Fight It
Sucuri Webinar: What is SEO Spam and How to Fight ItSucuri Webinar: What is SEO Spam and How to Fight It
Sucuri Webinar: What is SEO Spam and How to Fight It
Sucuri
 
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri
 
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's API
Sucuri
 
Sucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital MarketersSucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital Marketers
Sucuri
 
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri
 
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website SpeedSucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri
 
Sucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online StoreSucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri
 
Sucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with Sucuri
Sucuri
 
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri
 
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
Sucuri
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
Sucuri
 

More from Sucuri (20)

Logs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress SiteLogs: Understanding Them to Better Manage Your WordPress Site
Logs: Understanding Them to Better Manage Your WordPress Site
 
Webinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri SecurityWebinar: Personal Online Privacy - Sucuri Security
Webinar: Personal Online Privacy - Sucuri Security
 
Why Do Hackers Hack?
Why Do Hackers Hack?Why Do Hackers Hack?
Why Do Hackers Hack?
 
What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?What Are the Most Common Types of Hacks?
What Are the Most Common Types of Hacks?
 
Steps to Keep Your Site Clean
Steps to Keep Your Site CleanSteps to Keep Your Site Clean
Steps to Keep Your Site Clean
 
2018 Hacked Website Trends
2018 Hacked Website Trends2018 Hacked Website Trends
2018 Hacked Website Trends
 
Sucuri Webinar: What is SEO Spam and How to Fight It
Sucuri Webinar: What is SEO Spam and How to Fight ItSucuri Webinar: What is SEO Spam and How to Fight It
Sucuri Webinar: What is SEO Spam and How to Fight It
 
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A PluginSucuri Webinar: How To Know For Sure You Can Trust A Plugin
Sucuri Webinar: How To Know For Sure You Can Trust A Plugin
 
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
Sucuri Webinar: Tis the Season for Credit Card Scraping and Malware Trends
 
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit GuideSucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
Sucuri Webinar: WAF (Firewall) and CDN Feature Benefit Guide
 
Sucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's APISucuri Webinar: Leveraging Sucuri's API
Sucuri Webinar: Leveraging Sucuri's API
 
Sucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital MarketersSucuri Webinar: Website Security Primer for Digital Marketers
Sucuri Webinar: Website Security Primer for Digital Marketers
 
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement DepartmentSucuri Webinar: Sucuri Introduces the Sales Enablement Department
Sucuri Webinar: Sucuri Introduces the Sales Enablement Department
 
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website SpeedSucuri Webinar: How Caching Options Can Impact Your Website Speed
Sucuri Webinar: How Caching Options Can Impact Your Website Speed
 
Sucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online StoreSucuri Webinar: Simple Steps To Secure Your Online Store
Sucuri Webinar: Simple Steps To Secure Your Online Store
 
Sucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with SucuriSucuri Webinar: Getting Started with Sucuri
Sucuri Webinar: Getting Started with Sucuri
 
Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?Sucuri Webinar: Is SSL enough to secure your website?
Sucuri Webinar: Is SSL enough to secure your website?
 
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for BeginnersSucuri Webinar: Preventing Cross-Site Contamination for Beginners
Sucuri Webinar: Preventing Cross-Site Contamination for Beginners
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
 
Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 

Ecommerce Website Security

  • 1. Copyright© 2018 Sucuri. All Rights Reserved.
  • 2. Copyright© 2018 Sucuri. All Rights Reserved. Ecommerce Risks & Threats
  • 3. Copyright© 2018 Sucuri. All Rights Reserved. According to Trustwave research, 90% of data breaches impacted small merchants 1. Retail - 45% 2. Food & Beverage - 24% 3. Hospitality - 9% Top 3 Compromised Industries Data Breaches
  • 4. Copyright© 2018 Sucuri. All Rights Reserved. Average cost of a data breach for small business $36K+
  • 5. Copyright© 2018 Sucuri. All Rights Reserved. Merchants need to consider a multi-layered approach for protecting sensitive customer data. Serious data breaches can happen even you do not store cardholder data.
  • 6. Copyright© 2018 Sucuri. All Rights Reserved. Data BreachCost Factors Mandatory Forensic Examination Notification of Customers Affected Customer Credit Monitoring PCI Compliance Fines Liability for Fraud Charges Credit Card Replacement Costs POS System Improvements Reassessment for PCI Compliance
  • 7. Copyright© 2018 Sucuri. All Rights Reserved. Non-monetarydamages are painfultoo 57% 31% 75% of people lost trust and confidence in the organization of people terminated their relationship with the organization of executives said the data breach had an impact on the business’ reputation Ponemon Institute Study Ponemon Institute Study Ponemon Institute Study
  • 8. Copyright© 2018 Sucuri. All Rights Reserved. Non-monetarydamages are painfultoo Bad Press Loss of Payment Card Privileges Your Time
  • 9. Copyright© 2018 Sucuri. All Rights Reserved. What is PCI Compliance?
  • 10. Copyright© 2018 Sucuri. All Rights Reserved. PCI Compliance In 2006, American Express, Discover, JCB International, MasterCard and Visa Inc. founded the Security Standards Council (PCI SSC) in order to maintain a comprehensive and evolving set of standards to help vendors protect their payment systems. PCI = Payment Card Industry
  • 11. Copyright© 2018 Sucuri. All Rights Reserved. BuildandMaintaina SecureNetwork • •
  • 12. Copyright© 2018 Sucuri. All Rights Reserved. Protect Cardholder Data • •
  • 13. Copyright© 2018 Sucuri. All Rights Reserved. Maintaina VulnerabilityManagement Program • •
  • 14. Copyright© 2018 Sucuri. All Rights Reserved. Implement Strong Access Control Measures • • •
  • 15. Copyright© 2018 Sucuri. All Rights Reserved. RegularlyTest andMonitor Networks • •
  • 16. Copyright© 2018 Sucuri. All Rights Reserved. Maintainan InfoSecPolicy •
  • 17. Copyright© 2018 Sucuri. All Rights Reserved. Website Security
  • 18. Copyright© 2018 Sucuri. All Rights Reserved. How Websites Get Hacked • • • • • • • •
  • 19. Copyright© 2018 Sucuri. All Rights Reserved. SSL Certificate= Secure? • • • • •
  • 20. Copyright© 2018 Sucuri. All Rights Reserved. Website ApplicationFirewalls • • • • • •
  • 21. Copyright© 2018 Sucuri. All Rights Reserved. Post Breach PCI Protocol
  • 22. Copyright© 2018 Sucuri. All Rights Reserved. Mandatory Forensic Examination • PCI DSS require merchants that are suspected of having a data breach to have a mandatory forensic examination. • According to Verizon Business, a small business examination may cost between $20,000 to $50,000.
  • 23. Copyright© 2018 Sucuri. All Rights Reserved. Notificationof Customers • If financial information is suspected of being compromised, most states require that customers be notified. • University of North Carolina at Chapel Hill said a 2013 data breach of just 6,000 records has cost the school nearly $80,000 in working with affected parties.
  • 24. Copyright© 2018 Sucuri. All Rights Reserved. Affected Customer Credit Monitoring • If you experience a breach you may be required to produce up to a year’s worth of credit monitoring and/or counseling services to customers affected by your breach.
  • 25. Copyright© 2018 Sucuri. All Rights Reserved. PCI ComplianceFines • In 2011, 96% of the merchants experiencing a data breach had not complied with the PCI DSS. • If the forensic investigation shows that your business was not in compliance heavy fines could be levied against you. These fines can range from $5,000 to $50,000 or more.
  • 26. Copyright© 2018 Sucuri. All Rights Reserved. Liability for Fraud Charges • Many merchants assume they have no liability after a data breach. • This is not necessarily the case; lawsuits may claim liability on merchants for security breaches.
  • 27. Copyright© 2018 Sucuri. All Rights Reserved. Credit Card ReplacementCosts • Merchants may be required by card issuers to pay the cost of reissuing cards to customers. • These fees can range from $3 to $10 per card.
  • 28. Copyright© 2018 Sucuri. All Rights Reserved. POS System Improvements • Depending on the source of the breach, you may have to invest in upgrading or replacing your POS system, including servers, software and/or card swipe devices.
  • 29. Copyright© 2018 Sucuri. All Rights Reserved. Reassessment for PCI Compliance • In order to qualify to accept cards again, a complete PCI assessment by an external Qualified Security Assessor (QSA) must be performed.
  • 30. Copyright© 2018 Sucuri. All Rights Reserved. Thank You! Alycia Mitchell