SlideShare a Scribd company logo
Don’t Get Hacked!
Know the Risks Associated with Accepting Credit Cards
Maaria Seider, CISA, QSA
314.983.1384
mseider@bswllc.com
Michael Springer, GPEN
314.983.1374
mspringer@bswllc.com
Janet Ramey, CPA
636.754.0231
jramey@bswllc.com

February 20, 2014
Welcome to our quarterly
Non Profit Organization
Speaker Series Event!
Today’s topic:

Understanding the
Risks Associated with
Accepting Credit Cards

2
CPE Credit
In order to receive CPE credit for this session,
please:
• Ensure you signed the sign-in sheet.
• Complete an event evaluation form.
– You may fill out a hard copy and turn it in before
you leave.
– Complete the e-version via email.

© 2014 All Rights Reserved
Brown Smith Wallace LLC

3
Today’s Guest Speakers
Maaria Seider, CISA, QSA
• Maaria is a Manager in the Brown
Smith Wallace Advisory Services
practice.
• She provides consulting and
compliance services related to
client requirements to comply
with payment card industry (PCI)
standards.
• Maaria serves as the awards chair
for the Institute of Internal
Auditors (IIA).

© 2014 All Rights Reserved
Brown Smith Wallace LLC

4
Today’s Guest Speakers
Michael Springer, CEH, GPEN
• Michael is a Senior in the Brown
Smith Wallace Information Security &
Privacy practice.
• He provides consulting and
assessment security services related
to technical reviews and ethical
hacking, as required by PCI.
• He holds industry certifications of
CEH – Certified Ethical Hacker – and
GPEN – GIAC Certified Penetration
Tester.

© 2014 All Rights Reserved
Brown Smith Wallace LLC

5
Trends in NPO
Fundraising

6
Trends in NPO Fundraising
Since 2008, less than 50% of charitable organizations saw an increase in any
form of fundraising/giving, aside from online.

Source: http://causera.org/nonprofit-journal/10-fundraising-lessons-for-2013/
© 2014 All Rights Reserved
Brown Smith Wallace LLC

7
Trends in NPO Fundraising

Source: http://causera.org/nonprofit-journal/10-fundraising-lessons-for-2013/

© 2014 All Rights Reserved
Brown Smith Wallace LLC

8
Trends in NPO Fundraising
Where is the money coming from?
• Online donations
• Events
– Galas
– Trivia Nights
• Contributions & Services Fee Payments
– Cash
– Check
– Credit Card

© 2014 All Rights Reserved
Brown Smith Wallace LLC

9
Trends in NPO Fundraising
How is the money being collected?
Know the risks!
•

Hard copy of credit card data
– Who is handling it?
– Where is it being stored? (paper copy,
excel sheet, etc.)
– Is it secured?
– How is it disposed?

•

•

Organizations should have a clear
understanding of who is handling credit
card data, access to data, and security
Credit card data should be disposed once
it’s no longer needed either by purging
the file or using a crosscut shredder

Image source: http://www.digitaltrends.com/wp-content/uploads/2011/05/Square-iPhone-Credit-Card-Reader.jpg
© 2014 All Rights Reserved
Brown Smith Wallace LLC

10
Trends in NPO Fundraising
How is the money being collected?
Know the risks!
•

Third party processing
– Are you using a secure website to collect donations?
– Are they PCI compliant?

Image source: http://www.digitaltrends.com/wp-content/uploads/2011/05/Square-iPhone-Credit-Card-Reader.jpg
© 2014 All Rights Reserved
Brown Smith Wallace LLC

11
Trends in NPO Fundraising
How is the money being collected?
Know the risks!
•

Portable terminals
– Encryption?
– Secure networks?
– Are you storing credit card information in
spreadsheets?

Image source: http://www.digitaltrends.com/wp-content/uploads/2011/05/Square-iPhone-Credit-Card-Reader.jpg
© 2014 All Rights Reserved
Brown Smith Wallace LLC

12
Trends in NPO Fundraising
How is the money being collected?
• Mobile
– Square
– Text message donations

Image source: http://creditcardforum.com/blog/warning-credit-card-numbers-are-being-stolen-via-text-message/

© 2014 All Rights Reserved
Brown Smith Wallace LLC

13
Trends in NPO Fundraising
How is the money being collected?
• To consider when thinking of mobile:
– Does it prevent data from being intercepted when being swiped,
processed or stored, and transmitted?
– What kind of device is being used?
• Jailbroken, disabled for anything unneeded, device tracking if stolen
• Use the PCI Council website to see if your device is listed as a validated Point-toPoint Encryption (P2PE) solution
• These solutions have been validated that data is encrypted before it enters a
mobile devices
• Solution providers will typically provide a card reader that works with the mobile
device

© 2014 All Rights Reserved
Brown Smith Wallace LLC

14
If they can be hacked…

…so can you!
© 2014 All Rights Reserved
Brown Smith Wallace LLC

Image source: http://cdn.iphonehacks.com/wp-content/uploads/2013/11/Target-logo.gif
http://www.theshelbyreport.com/wp-content/uploads/2013/05/schnucks.jpg
http://www.livefreecoupons.com/uploadfile/logo/neimanmarcus.jpg
15
Global Card Fraud Losses ($Billions)

© 2014 All Rights Reserved
Brown Smith Wallace LLC

16
Compliance Snapshot

© 2014 All Rights Reserved
Brown Smith Wallace LLC

17
What are Payment
Card Industry (PCI)
Data Security
Standards?

18
PCI DSS Definition

The PCI Data Security Standard provides an
actionable framework for developing a robust
payment card data security process -- including
prevention, detection and appropriate reaction
to security incidents.
From the PCI Security Standards Council

© 2014 All Rights Reserved
Brown Smith Wallace LLC

19
Who does PCI apply to?
• All entities involved in payment card processing:
–
–
–
–

Merchants
Processors
Financial institutions
Basically anyone who handles credit card information (store, process,
or transmit)

© 2014 All Rights Reserved Brown
Smith Wallace LLC

20
What are the PCI Data Security Standards?

There are 6 categories of requirements that provide a baseline of
technical and operational requirements to protect cardholder
data:
1. Build and Maintain a Secure Network and Systems
2. Protect Cardholder Data
3. Maintain a Vulnerability Management Program
4. Implement Strong Access Control Measures
5. Regularly Monitor and Test Networks
6. Maintain an Information Security Policy

© 2014 All Rights Reserved Brown
Smith Wallace LLC

21
What are the PCI Data Security Standards?

Cardholder v. Sensitive Authentication Data
Account Data
• Cardholder Data includes:
–
–
–
–

Primary Account Number (PAN)
Cardholder Name
Expiration Date
Service Code

• Sensitive Authentication Data includes:
– Full track data (magnetic-stripe data or equivalent on a chip)
– CAV2/CVC2/CVV2/CID
– PINs/PIN blocks
© 2014 All Rights Reserved
Brown Smith Wallace LLC

22
What are the PCI Data Security Standards?

4 Levels of Merchant Compliance
1.
2.
3.

Any merchant -- regardless of acceptance channel -- processing over
6M transactions per year.
Any merchant -- regardless of acceptance channel -- processing 1M
to 6M transactions per year.
Any merchant processing 20,000 to 1M e-commerce transactions per
year.

© 2014 All Rights Reserved Brown
Smith Wallace LLC

23
What are the PCI Data Security Standards?

4.

Any merchant processing fewer than 20,000 Visa e-commerce
transactions per year, and all other merchants -- regardless of
acceptance channel -- processing up to 1M Visa transactions per
year.
Most of you in this room will fall into this category.

© 2014 All Rights Reserved Brown
Smith Wallace LLC

24
Myths About PCI Compliance

© 2014 All Rights Reserved Brown
Smith Wallace LLC

25
Level 4 Merchant Guidelines
• An annual self-assessment
questionnaire (SAQ)
recommended
• ASV (approved scanning vendor)
quarterly scans if applicable
– Organizations approved by the
PCI Council to perform quarterly
vulnerability scans as it relates to
PCI DSS.

• Compliance is set by merchant
bank
– Your bank sets compliance of
whether they want a SAQ filled
out and scans.
© 2014 All Rights Reserved Brown
Smith Wallace LLC

26
PCI Risks for NPOs

27
Top 5 PCI Risks
1. Credit Card Breach
–

•

•

This can cause an array of
problems for an organization:
bad press, expensive fines,
remediation, loss of donors

Knowing your credit card
environment, where your data is
kept, and vendors are steps in
preventing this
Filling out a SAQ helps keep
organizations aware of where this
data is kept and the guidelines to
secure it

© 2014 All Rights Reserved Brown
Smith Wallace LLC

Image source: http://www.safetynet-inc.com/wp-content/uploads/credit-card-breach.jpg

28
Top 5 PCI Risks
2. Reputation/Brand Damage
–

–

–

No one wants bad press,
especially related to a credit
card breach
With the recent breaches,
consumers are more aware
and more weary of sharing
their credit card information
By ensuring your
employees/volunteers are
trained to securely handle
credit card data and by
adhering to PCI you can help
protect your organization

© 2014 All Rights Reserved Brown
Smith Wallace LLC

Image source: http://www.indianasnewscenter.com/news/top-news/239627491.html

29
Top 5 PCI Risks
3. Donor Loss
–

–

If donors do not feel secure
about the collection method
they are less likely to donate
Bad press/breaches

© 2014 All Rights Reserved Brown
Smith Wallace LLC

30
Top 5 PCI Risks
4. Litigation
Expenses/Recovery
–

Recovering from a data
breach is expensive!
•
•
•
•

Consumers
Payment Brands
Legal /Consulting fees
Governmental
Image source: http://www.stoelrivesworldofemployment.com/amy-joseph-pedersen.html

© 2014 All Rights Reserved Brown
Smith Wallace LLC

31
Top 5 PCI Risks
5. Vendor Management
–
–
–

–

Know your vendors!
Give access only when/as
needed
Have an understanding of
what they have access too on
your systems
If they handle credit cards,
make sure they are PCI
Compliant

© 2014 All Rights Reserved Brown
Smith Wallace LLC

32
PCI in the Future: Chip and Pin
• Credit and debit cards will be
embedded with a “chip” that
stores card information
(name, number, expiration)
• Point of sales machines read the chips vs. swiping and signing
using the magnetic strip
• Currently in use in Europe and Canada
• October 2015- MasterCard and Visa set deadline after which
they will no longer accept liability for fraudulent activity using
the magnetic strip, which means…
© 2014 All Rights Reserved
Brown Smith Wallace LLC

33
YOU ARE RESPONSIBLE!

© 2014 All Rights Reserved
Brown Smith Wallace LLC

34
Chip and Pin Readiness
• Investing in upgrading point of sales terminals to accept chip
and pin ($200-$2,000)
• Make sure third-party processors are compliant

© 2014 All Rights Reserved
Brown Smith Wallace LLC

35
Questions?

36
If you enjoyed today…
Keep an eye on your email for
information on our next
NPO Speaker Series.
The event will be held in the next
few months.
© 2014 All Rights Reserved
Brown Smith Wallace LLC

37
Connect

Visit our website, follow Brown Smith Wallace on LinkedIn and
Twitter or Like us on Facebook!

6 CityPlace Drive, Suite 900│ St. Louis, Missouri 63141 │ 314.983.1200
1520 S. Fifth St., Suite 309 │ St. Charles, Missouri 63303 │ 636.255.3000
2220 S. State Route 157, Ste. 300 │ Glen Carbon, Illinois 62034 │ 618.659.7231
1.888.279.2792 │ www.bswllc.com

© 2014 All Rights Reserved
Brown Smith Wallace LLC

38

More Related Content

What's hot

PCI FAQs and Myths
PCI FAQs and MythsPCI FAQs and Myths
PCI FAQs and Myths
BluePayProcessing
 
2015 Payments Law Update
2015 Payments Law Update2015 Payments Law Update
2015 Payments Law Update
Jonathan Wegner
 
Tripwire pci basics_wp
Tripwire pci basics_wpTripwire pci basics_wp
Tripwire pci basics_wp
Edward Lam
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
Resilient Systems
 
Data Security: A field guide for franchisors
Data Security: A field guide for franchisorsData Security: A field guide for franchisors
Data Security: A field guide for franchisors
Grant Thornton LLP
 
Business Identity Theft Kit
Business Identity Theft KitBusiness Identity Theft Kit
Business Identity Theft Kit
- Mark - Fullbright
 
Information for Businesses - ca
Information for Businesses - caInformation for Businesses - ca
Information for Businesses - ca
- Mark - Fullbright
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
Melanie Beam
 
Card fraud and compliance training
Card fraud and compliance trainingCard fraud and compliance training
Card fraud and compliance training
ethnos
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
Shaun O'keeffe
 
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
amadhireddy
 
May newsletter 2017
May newsletter 2017May newsletter 2017
May newsletter 2017
KAW Management Services Ltd.
 
Requirement of PCI DSS in India.
Requirement of PCI DSS in India.Requirement of PCI DSS in India.
Requirement of PCI DSS in India.
CA Priyadarshan Behera
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
Kelly Giambra
 
Payment Card Industry Adjudication Process
Payment Card Industry Adjudication ProcessPayment Card Industry Adjudication Process
Payment Card Industry Adjudication Process
HB Litigation Conferences
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for Dummies
Liberteks
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
amiable_indian
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
Tom Cooley
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
mherr_riskconsult
 
A practical guides to PCI compliance
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI compliance
Jisc
 

What's hot (20)

PCI FAQs and Myths
PCI FAQs and MythsPCI FAQs and Myths
PCI FAQs and Myths
 
2015 Payments Law Update
2015 Payments Law Update2015 Payments Law Update
2015 Payments Law Update
 
Tripwire pci basics_wp
Tripwire pci basics_wpTripwire pci basics_wp
Tripwire pci basics_wp
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
 
Data Security: A field guide for franchisors
Data Security: A field guide for franchisorsData Security: A field guide for franchisors
Data Security: A field guide for franchisors
 
Business Identity Theft Kit
Business Identity Theft KitBusiness Identity Theft Kit
Business Identity Theft Kit
 
Information for Businesses - ca
Information for Businesses - caInformation for Businesses - ca
Information for Businesses - ca
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 
Card fraud and compliance training
Card fraud and compliance trainingCard fraud and compliance training
Card fraud and compliance training
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
 
May newsletter 2017
May newsletter 2017May newsletter 2017
May newsletter 2017
 
Requirement of PCI DSS in India.
Requirement of PCI DSS in India.Requirement of PCI DSS in India.
Requirement of PCI DSS in India.
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
 
Payment Card Industry Adjudication Process
Payment Card Industry Adjudication ProcessPayment Card Industry Adjudication Process
Payment Card Industry Adjudication Process
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for Dummies
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 
A practical guides to PCI compliance
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI compliance
 

Similar to Don't Get Hacked! Know the Risks of Accepting Credit Cards

pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdfpci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
ssuserbcc088
 
Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010
Donald E. Hester
 
PCI DSS Training compliance training for companies
PCI DSS Training compliance training for companiesPCI DSS Training compliance training for companies
PCI DSS Training compliance training for companies
gealehegn
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
okrantz
 
What Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSSWhat Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSS
London School of Cyber Security
 
Pci compliance overview earth link business
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link business
Mike Shelah
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
PCI Compliance Process
PCI Compliance ProcessPCI Compliance Process
PCI Compliance Process
BluePayProcessing
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
Saumya Vishnoi
 
Symbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewSymbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance Overview
Rosy Kaur
 
Evolution Pci For Pod1
Evolution Pci For Pod1Evolution Pci For Pod1
Evolution Pci For Pod1
Amanda Squires@Pod1
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
eCommerce Merchants
 
From Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data BreachFrom Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data Breach
Paymetric, Inc.
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
Resilient Systems
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
lgcdcpas
 
PCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should carePCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should care
Sean D. Goodwin
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web Site
Donny Shimamoto
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
Shanmugavel Sankaran
 
PCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profitsPCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profits
NetSquared Vancouver
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
achintya354
 

Similar to Don't Get Hacked! Know the Risks of Accepting Credit Cards (20)

pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdfpci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
 
Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010
 
PCI DSS Training compliance training for companies
PCI DSS Training compliance training for companiesPCI DSS Training compliance training for companies
PCI DSS Training compliance training for companies
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
What Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSSWhat Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSS
 
Pci compliance overview earth link business
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link business
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
PCI Compliance Process
PCI Compliance ProcessPCI Compliance Process
PCI Compliance Process
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
 
Symbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance OverviewSymbiotic Consulting Group LLC - PCI Compliance Overview
Symbiotic Consulting Group LLC - PCI Compliance Overview
 
Evolution Pci For Pod1
Evolution Pci For Pod1Evolution Pci For Pod1
Evolution Pci For Pod1
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
From Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data BreachFrom Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data Breach
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
PCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should carePCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should care
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web Site
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
PCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profitsPCI compliance and fraud prevention for non profits
PCI compliance and fraud prevention for non profits
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 

More from Brown Smith Wallace

Retail Industry Advisory Services
Retail Industry Advisory ServicesRetail Industry Advisory Services
Retail Industry Advisory Services
Brown Smith Wallace
 
Cost Segregation
Cost SegregationCost Segregation
Cost Segregation
Brown Smith Wallace
 
Paying Income Taxes Can Reduce Estate Taxes
Paying Income Taxes Can Reduce Estate TaxesPaying Income Taxes Can Reduce Estate Taxes
Paying Income Taxes Can Reduce Estate Taxes
Brown Smith Wallace
 
Key New Requirements Added to PCI DSS 3.0
Key New Requirements Added to PCI DSS 3.0Key New Requirements Added to PCI DSS 3.0
Key New Requirements Added to PCI DSS 3.0
Brown Smith Wallace
 
Connect the Dots to Create Value
Connect the Dots to Create ValueConnect the Dots to Create Value
Connect the Dots to Create Value
Brown Smith Wallace
 
Estate Planning
Estate PlanningEstate Planning
Estate Planning
Brown Smith Wallace
 
BSW Family of Services
BSW Family of Services BSW Family of Services
BSW Family of Services
Brown Smith Wallace
 
Employer and Employee Costs for Various Health Plan Types
Employer and Employee Costs for Various Health Plan TypesEmployer and Employee Costs for Various Health Plan Types
Employer and Employee Costs for Various Health Plan Types
Brown Smith Wallace
 
Value Stream Mapping: How to Identify and Reduce Waste
Value Stream Mapping: How to Identify and Reduce WasteValue Stream Mapping: How to Identify and Reduce Waste
Value Stream Mapping: How to Identify and Reduce Waste
Brown Smith Wallace
 
The 6 Must-Haves for Your Cyber Security Policy
The 6 Must-Haves for Your Cyber Security PolicyThe 6 Must-Haves for Your Cyber Security Policy
The 6 Must-Haves for Your Cyber Security Policy
Brown Smith Wallace
 
Phishing Statistics
Phishing StatisticsPhishing Statistics
Phishing Statistics
Brown Smith Wallace
 
Brown Smith Wallace Cyber Security Infographic
Brown Smith Wallace Cyber Security InfographicBrown Smith Wallace Cyber Security Infographic
Brown Smith Wallace Cyber Security Infographic
Brown Smith Wallace
 
Overcoming Tax Challenges
Overcoming Tax ChallengesOvercoming Tax Challenges
Overcoming Tax Challenges
Brown Smith Wallace
 
Financial Fitness February 2016
Financial Fitness February 2016Financial Fitness February 2016
Financial Fitness February 2016
Brown Smith Wallace
 
Financial fitness oct 2015
Financial fitness oct 2015Financial fitness oct 2015
Financial fitness oct 2015
Brown Smith Wallace
 
Financial Fitness August 2015
Financial Fitness August 2015Financial Fitness August 2015
Financial Fitness August 2015
Brown Smith Wallace
 
Brown Smith Wallace IC-DISC
Brown Smith Wallace IC-DISCBrown Smith Wallace IC-DISC
Brown Smith Wallace IC-DISC
Brown Smith Wallace
 
Brown Smith Wallace Selling Your Business
Brown Smith Wallace Selling Your BusinessBrown Smith Wallace Selling Your Business
Brown Smith Wallace Selling Your Business
Brown Smith Wallace
 
Brown Smith Wallace Company Exports
Brown Smith Wallace Company Exports Brown Smith Wallace Company Exports
Brown Smith Wallace Company Exports
Brown Smith Wallace
 
Brown Smith Wallace Occupational Fraud
Brown Smith Wallace Occupational FraudBrown Smith Wallace Occupational Fraud
Brown Smith Wallace Occupational Fraud
Brown Smith Wallace
 

More from Brown Smith Wallace (20)

Retail Industry Advisory Services
Retail Industry Advisory ServicesRetail Industry Advisory Services
Retail Industry Advisory Services
 
Cost Segregation
Cost SegregationCost Segregation
Cost Segregation
 
Paying Income Taxes Can Reduce Estate Taxes
Paying Income Taxes Can Reduce Estate TaxesPaying Income Taxes Can Reduce Estate Taxes
Paying Income Taxes Can Reduce Estate Taxes
 
Key New Requirements Added to PCI DSS 3.0
Key New Requirements Added to PCI DSS 3.0Key New Requirements Added to PCI DSS 3.0
Key New Requirements Added to PCI DSS 3.0
 
Connect the Dots to Create Value
Connect the Dots to Create ValueConnect the Dots to Create Value
Connect the Dots to Create Value
 
Estate Planning
Estate PlanningEstate Planning
Estate Planning
 
BSW Family of Services
BSW Family of Services BSW Family of Services
BSW Family of Services
 
Employer and Employee Costs for Various Health Plan Types
Employer and Employee Costs for Various Health Plan TypesEmployer and Employee Costs for Various Health Plan Types
Employer and Employee Costs for Various Health Plan Types
 
Value Stream Mapping: How to Identify and Reduce Waste
Value Stream Mapping: How to Identify and Reduce WasteValue Stream Mapping: How to Identify and Reduce Waste
Value Stream Mapping: How to Identify and Reduce Waste
 
The 6 Must-Haves for Your Cyber Security Policy
The 6 Must-Haves for Your Cyber Security PolicyThe 6 Must-Haves for Your Cyber Security Policy
The 6 Must-Haves for Your Cyber Security Policy
 
Phishing Statistics
Phishing StatisticsPhishing Statistics
Phishing Statistics
 
Brown Smith Wallace Cyber Security Infographic
Brown Smith Wallace Cyber Security InfographicBrown Smith Wallace Cyber Security Infographic
Brown Smith Wallace Cyber Security Infographic
 
Overcoming Tax Challenges
Overcoming Tax ChallengesOvercoming Tax Challenges
Overcoming Tax Challenges
 
Financial Fitness February 2016
Financial Fitness February 2016Financial Fitness February 2016
Financial Fitness February 2016
 
Financial fitness oct 2015
Financial fitness oct 2015Financial fitness oct 2015
Financial fitness oct 2015
 
Financial Fitness August 2015
Financial Fitness August 2015Financial Fitness August 2015
Financial Fitness August 2015
 
Brown Smith Wallace IC-DISC
Brown Smith Wallace IC-DISCBrown Smith Wallace IC-DISC
Brown Smith Wallace IC-DISC
 
Brown Smith Wallace Selling Your Business
Brown Smith Wallace Selling Your BusinessBrown Smith Wallace Selling Your Business
Brown Smith Wallace Selling Your Business
 
Brown Smith Wallace Company Exports
Brown Smith Wallace Company Exports Brown Smith Wallace Company Exports
Brown Smith Wallace Company Exports
 
Brown Smith Wallace Occupational Fraud
Brown Smith Wallace Occupational FraudBrown Smith Wallace Occupational Fraud
Brown Smith Wallace Occupational Fraud
 

Recently uploaded

Using Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trendsUsing Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trends
Labour Market Information Council | Conseil de l’information sur le marché du travail
 
Ending stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across ScotlandEnding stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across Scotland
ResolutionFoundation
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
asukqco
 
Fabular Frames and the Four Ratio Problem
Fabular Frames and the Four Ratio ProblemFabular Frames and the Four Ratio Problem
Fabular Frames and the Four Ratio Problem
Majid Iqbal
 
The state of welfare Resolution Foundation Event
The state of welfare Resolution Foundation EventThe state of welfare Resolution Foundation Event
The state of welfare Resolution Foundation Event
ResolutionFoundation
 
FCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptxFCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptx
nalamynandan
 
University of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma TranscriptUniversity of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma Transcript
tscdzuip
 
Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!
FinTech Belgium
 
Mutual Fund Taxation – How Mutual Funds Are Taxed
Mutual Fund Taxation – How Mutual Funds Are TaxedMutual Fund Taxation – How Mutual Funds Are Taxed
Mutual Fund Taxation – How Mutual Funds Are Taxed
dhvikdiva
 
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
Neil Day
 
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptxExploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
cosmo-soil
 
Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]
Commonwealth
 
Dr. Alyce Su Cover Story - China's Investment Leader
Dr. Alyce Su Cover Story - China's Investment LeaderDr. Alyce Su Cover Story - China's Investment Leader
Dr. Alyce Su Cover Story - China's Investment Leader
msthrill
 
Initial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.pptInitial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.ppt
ribhi87
 
How to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete GuideHow to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete Guide
Daniel
 
International Sustainability Standards Board
International Sustainability Standards BoardInternational Sustainability Standards Board
International Sustainability Standards Board
Kumar Ramaiah
 
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck mari...
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck mari...TEST BANK Principles of cost accounting 17th edition edward j vanderbeck mari...
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck mari...
Donc Test
 
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
k4ncd0z
 
真实可查(nwu毕业证书)美国西北大学毕业证学位证书范本原版一模一样
真实可查(nwu毕业证书)美国西北大学毕业证学位证书范本原版一模一样真实可查(nwu毕业证书)美国西北大学毕业证学位证书范本原版一模一样
真实可查(nwu毕业证书)美国西北大学毕业证学位证书范本原版一模一样
28xo7hf
 
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
brunasordi905
 

Recently uploaded (20)

Using Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trendsUsing Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trends
 
Ending stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across ScotlandEnding stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across Scotland
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
 
Fabular Frames and the Four Ratio Problem
Fabular Frames and the Four Ratio ProblemFabular Frames and the Four Ratio Problem
Fabular Frames and the Four Ratio Problem
 
The state of welfare Resolution Foundation Event
The state of welfare Resolution Foundation EventThe state of welfare Resolution Foundation Event
The state of welfare Resolution Foundation Event
 
FCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptxFCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptx
 
University of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma TranscriptUniversity of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma Transcript
 
Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!Money20/20 and EU Networking Event of 20/24!
Money20/20 and EU Networking Event of 20/24!
 
Mutual Fund Taxation – How Mutual Funds Are Taxed
Mutual Fund Taxation – How Mutual Funds Are TaxedMutual Fund Taxation – How Mutual Funds Are Taxed
Mutual Fund Taxation – How Mutual Funds Are Taxed
 
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
BIHC Briefing June 2024 from Bank+Insurance Hybrid Capital in association wit...
 
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptxExploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
Exploring-Madhya-Pradesh-Culture-Heritage-and-Land-Records.pptx
 
Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]Economic Risk Factor Update: June 2024 [SlideShare]
Economic Risk Factor Update: June 2024 [SlideShare]
 
Dr. Alyce Su Cover Story - China's Investment Leader
Dr. Alyce Su Cover Story - China's Investment LeaderDr. Alyce Su Cover Story - China's Investment Leader
Dr. Alyce Su Cover Story - China's Investment Leader
 
Initial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.pptInitial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.ppt
 
How to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete GuideHow to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete Guide
 
International Sustainability Standards Board
International Sustainability Standards BoardInternational Sustainability Standards Board
International Sustainability Standards Board
 
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck mari...
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck mari...TEST BANK Principles of cost accounting 17th edition edward j vanderbeck mari...
TEST BANK Principles of cost accounting 17th edition edward j vanderbeck mari...
 
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证)皇家墨尔本理工大学毕业证如何办理
 
真实可查(nwu毕业证书)美国西北大学毕业证学位证书范本原版一模一样
真实可查(nwu毕业证书)美国西北大学毕业证学位证书范本原版一模一样真实可查(nwu毕业证书)美国西北大学毕业证学位证书范本原版一模一样
真实可查(nwu毕业证书)美国西北大学毕业证学位证书范本原版一模一样
 
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
欧洲杯投注-欧洲杯投注买球-欧洲杯投注买球网|【​网址​🎉ac22.net🎉​】
 

Don't Get Hacked! Know the Risks of Accepting Credit Cards

  • 1. Don’t Get Hacked! Know the Risks Associated with Accepting Credit Cards Maaria Seider, CISA, QSA 314.983.1384 mseider@bswllc.com Michael Springer, GPEN 314.983.1374 mspringer@bswllc.com Janet Ramey, CPA 636.754.0231 jramey@bswllc.com February 20, 2014
  • 2. Welcome to our quarterly Non Profit Organization Speaker Series Event! Today’s topic: Understanding the Risks Associated with Accepting Credit Cards 2
  • 3. CPE Credit In order to receive CPE credit for this session, please: • Ensure you signed the sign-in sheet. • Complete an event evaluation form. – You may fill out a hard copy and turn it in before you leave. – Complete the e-version via email. © 2014 All Rights Reserved Brown Smith Wallace LLC 3
  • 4. Today’s Guest Speakers Maaria Seider, CISA, QSA • Maaria is a Manager in the Brown Smith Wallace Advisory Services practice. • She provides consulting and compliance services related to client requirements to comply with payment card industry (PCI) standards. • Maaria serves as the awards chair for the Institute of Internal Auditors (IIA). © 2014 All Rights Reserved Brown Smith Wallace LLC 4
  • 5. Today’s Guest Speakers Michael Springer, CEH, GPEN • Michael is a Senior in the Brown Smith Wallace Information Security & Privacy practice. • He provides consulting and assessment security services related to technical reviews and ethical hacking, as required by PCI. • He holds industry certifications of CEH – Certified Ethical Hacker – and GPEN – GIAC Certified Penetration Tester. © 2014 All Rights Reserved Brown Smith Wallace LLC 5
  • 7. Trends in NPO Fundraising Since 2008, less than 50% of charitable organizations saw an increase in any form of fundraising/giving, aside from online. Source: http://causera.org/nonprofit-journal/10-fundraising-lessons-for-2013/ © 2014 All Rights Reserved Brown Smith Wallace LLC 7
  • 8. Trends in NPO Fundraising Source: http://causera.org/nonprofit-journal/10-fundraising-lessons-for-2013/ © 2014 All Rights Reserved Brown Smith Wallace LLC 8
  • 9. Trends in NPO Fundraising Where is the money coming from? • Online donations • Events – Galas – Trivia Nights • Contributions & Services Fee Payments – Cash – Check – Credit Card © 2014 All Rights Reserved Brown Smith Wallace LLC 9
  • 10. Trends in NPO Fundraising How is the money being collected? Know the risks! • Hard copy of credit card data – Who is handling it? – Where is it being stored? (paper copy, excel sheet, etc.) – Is it secured? – How is it disposed? • • Organizations should have a clear understanding of who is handling credit card data, access to data, and security Credit card data should be disposed once it’s no longer needed either by purging the file or using a crosscut shredder Image source: http://www.digitaltrends.com/wp-content/uploads/2011/05/Square-iPhone-Credit-Card-Reader.jpg © 2014 All Rights Reserved Brown Smith Wallace LLC 10
  • 11. Trends in NPO Fundraising How is the money being collected? Know the risks! • Third party processing – Are you using a secure website to collect donations? – Are they PCI compliant? Image source: http://www.digitaltrends.com/wp-content/uploads/2011/05/Square-iPhone-Credit-Card-Reader.jpg © 2014 All Rights Reserved Brown Smith Wallace LLC 11
  • 12. Trends in NPO Fundraising How is the money being collected? Know the risks! • Portable terminals – Encryption? – Secure networks? – Are you storing credit card information in spreadsheets? Image source: http://www.digitaltrends.com/wp-content/uploads/2011/05/Square-iPhone-Credit-Card-Reader.jpg © 2014 All Rights Reserved Brown Smith Wallace LLC 12
  • 13. Trends in NPO Fundraising How is the money being collected? • Mobile – Square – Text message donations Image source: http://creditcardforum.com/blog/warning-credit-card-numbers-are-being-stolen-via-text-message/ © 2014 All Rights Reserved Brown Smith Wallace LLC 13
  • 14. Trends in NPO Fundraising How is the money being collected? • To consider when thinking of mobile: – Does it prevent data from being intercepted when being swiped, processed or stored, and transmitted? – What kind of device is being used? • Jailbroken, disabled for anything unneeded, device tracking if stolen • Use the PCI Council website to see if your device is listed as a validated Point-toPoint Encryption (P2PE) solution • These solutions have been validated that data is encrypted before it enters a mobile devices • Solution providers will typically provide a card reader that works with the mobile device © 2014 All Rights Reserved Brown Smith Wallace LLC 14
  • 15. If they can be hacked… …so can you! © 2014 All Rights Reserved Brown Smith Wallace LLC Image source: http://cdn.iphonehacks.com/wp-content/uploads/2013/11/Target-logo.gif http://www.theshelbyreport.com/wp-content/uploads/2013/05/schnucks.jpg http://www.livefreecoupons.com/uploadfile/logo/neimanmarcus.jpg 15
  • 16. Global Card Fraud Losses ($Billions) © 2014 All Rights Reserved Brown Smith Wallace LLC 16
  • 17. Compliance Snapshot © 2014 All Rights Reserved Brown Smith Wallace LLC 17
  • 18. What are Payment Card Industry (PCI) Data Security Standards? 18
  • 19. PCI DSS Definition The PCI Data Security Standard provides an actionable framework for developing a robust payment card data security process -- including prevention, detection and appropriate reaction to security incidents. From the PCI Security Standards Council © 2014 All Rights Reserved Brown Smith Wallace LLC 19
  • 20. Who does PCI apply to? • All entities involved in payment card processing: – – – – Merchants Processors Financial institutions Basically anyone who handles credit card information (store, process, or transmit) © 2014 All Rights Reserved Brown Smith Wallace LLC 20
  • 21. What are the PCI Data Security Standards? There are 6 categories of requirements that provide a baseline of technical and operational requirements to protect cardholder data: 1. Build and Maintain a Secure Network and Systems 2. Protect Cardholder Data 3. Maintain a Vulnerability Management Program 4. Implement Strong Access Control Measures 5. Regularly Monitor and Test Networks 6. Maintain an Information Security Policy © 2014 All Rights Reserved Brown Smith Wallace LLC 21
  • 22. What are the PCI Data Security Standards? Cardholder v. Sensitive Authentication Data Account Data • Cardholder Data includes: – – – – Primary Account Number (PAN) Cardholder Name Expiration Date Service Code • Sensitive Authentication Data includes: – Full track data (magnetic-stripe data or equivalent on a chip) – CAV2/CVC2/CVV2/CID – PINs/PIN blocks © 2014 All Rights Reserved Brown Smith Wallace LLC 22
  • 23. What are the PCI Data Security Standards? 4 Levels of Merchant Compliance 1. 2. 3. Any merchant -- regardless of acceptance channel -- processing over 6M transactions per year. Any merchant -- regardless of acceptance channel -- processing 1M to 6M transactions per year. Any merchant processing 20,000 to 1M e-commerce transactions per year. © 2014 All Rights Reserved Brown Smith Wallace LLC 23
  • 24. What are the PCI Data Security Standards? 4. Any merchant processing fewer than 20,000 Visa e-commerce transactions per year, and all other merchants -- regardless of acceptance channel -- processing up to 1M Visa transactions per year. Most of you in this room will fall into this category. © 2014 All Rights Reserved Brown Smith Wallace LLC 24
  • 25. Myths About PCI Compliance © 2014 All Rights Reserved Brown Smith Wallace LLC 25
  • 26. Level 4 Merchant Guidelines • An annual self-assessment questionnaire (SAQ) recommended • ASV (approved scanning vendor) quarterly scans if applicable – Organizations approved by the PCI Council to perform quarterly vulnerability scans as it relates to PCI DSS. • Compliance is set by merchant bank – Your bank sets compliance of whether they want a SAQ filled out and scans. © 2014 All Rights Reserved Brown Smith Wallace LLC 26
  • 27. PCI Risks for NPOs 27
  • 28. Top 5 PCI Risks 1. Credit Card Breach – • • This can cause an array of problems for an organization: bad press, expensive fines, remediation, loss of donors Knowing your credit card environment, where your data is kept, and vendors are steps in preventing this Filling out a SAQ helps keep organizations aware of where this data is kept and the guidelines to secure it © 2014 All Rights Reserved Brown Smith Wallace LLC Image source: http://www.safetynet-inc.com/wp-content/uploads/credit-card-breach.jpg 28
  • 29. Top 5 PCI Risks 2. Reputation/Brand Damage – – – No one wants bad press, especially related to a credit card breach With the recent breaches, consumers are more aware and more weary of sharing their credit card information By ensuring your employees/volunteers are trained to securely handle credit card data and by adhering to PCI you can help protect your organization © 2014 All Rights Reserved Brown Smith Wallace LLC Image source: http://www.indianasnewscenter.com/news/top-news/239627491.html 29
  • 30. Top 5 PCI Risks 3. Donor Loss – – If donors do not feel secure about the collection method they are less likely to donate Bad press/breaches © 2014 All Rights Reserved Brown Smith Wallace LLC 30
  • 31. Top 5 PCI Risks 4. Litigation Expenses/Recovery – Recovering from a data breach is expensive! • • • • Consumers Payment Brands Legal /Consulting fees Governmental Image source: http://www.stoelrivesworldofemployment.com/amy-joseph-pedersen.html © 2014 All Rights Reserved Brown Smith Wallace LLC 31
  • 32. Top 5 PCI Risks 5. Vendor Management – – – – Know your vendors! Give access only when/as needed Have an understanding of what they have access too on your systems If they handle credit cards, make sure they are PCI Compliant © 2014 All Rights Reserved Brown Smith Wallace LLC 32
  • 33. PCI in the Future: Chip and Pin • Credit and debit cards will be embedded with a “chip” that stores card information (name, number, expiration) • Point of sales machines read the chips vs. swiping and signing using the magnetic strip • Currently in use in Europe and Canada • October 2015- MasterCard and Visa set deadline after which they will no longer accept liability for fraudulent activity using the magnetic strip, which means… © 2014 All Rights Reserved Brown Smith Wallace LLC 33
  • 34. YOU ARE RESPONSIBLE! © 2014 All Rights Reserved Brown Smith Wallace LLC 34
  • 35. Chip and Pin Readiness • Investing in upgrading point of sales terminals to accept chip and pin ($200-$2,000) • Make sure third-party processors are compliant © 2014 All Rights Reserved Brown Smith Wallace LLC 35
  • 37. If you enjoyed today… Keep an eye on your email for information on our next NPO Speaker Series. The event will be held in the next few months. © 2014 All Rights Reserved Brown Smith Wallace LLC 37
  • 38. Connect Visit our website, follow Brown Smith Wallace on LinkedIn and Twitter or Like us on Facebook! 6 CityPlace Drive, Suite 900│ St. Louis, Missouri 63141 │ 314.983.1200 1520 S. Fifth St., Suite 309 │ St. Charles, Missouri 63303 │ 636.255.3000 2220 S. State Route 157, Ste. 300 │ Glen Carbon, Illinois 62034 │ 618.659.7231 1.888.279.2792 │ www.bswllc.com © 2014 All Rights Reserved Brown Smith Wallace LLC 38