Compass IT Compliance Blog / PCI Compliance (2)

PCI, Service Providers, and You

A man holds a credit card in his hand while scrolling on a laptop

As merchants increasingly utilize trusted partners to maintain and manage critical pieces of their business, information technology, and security infrastructure, it becomes necessary to build a program to manage these vendors.

Read Story

Grocery Stores – A Hidden Gem for Cyber Criminals?

Grocery Stores – A Hidden Gem for Cyber Criminals?

Following the recent closures of many public-facing businesses in the United States (and across the globe) in response to the spread of Coronavirus (COVID-19), this week’s blog post will discuss some of the cybersecurity challenges and vulnerabilities facing one of the only industries …

Read Story

Deciphering the PCI Testing Requirements of PCI-DSS Requirement 11

wallet-2125548_1920

PCI-DSS Requirement 11: Regularly test security systems and processes As a Qualified Security Assessor (QSA) organization and a security analyst, we receive many questions about meeting the various testing controls outlined within the Payment Card Industry Data Security Standard (PCI- …

Read Story

New PCI Software Security Framework Published

money-256319_1920

The PCI Security Standards Council published its new Software Security framework on Wednesday January 16th, 2019. The council has stated that the existing standards will be officially retired in 2022.

Read Story

PCI Requirement 12 - People, Policies, and Processes Time!

internet-3484137

This is the twelfth blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, click on the appropriate links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 …

Read Story

PCI Requirement 11 - Testing, Testing, 1, 2, 3!

camera-3376230_1920

This is the eleventh blog in a 12-part series addressing each PCI DSS Requirement and the challenges faced by companies going through this process. To view the previous posts in this series, click on the appropriate links below: PCI Requirement 1 - Defending the Wall PCI Requirement 2 …

Read Story

Subscribe by email