b'I ts a beautiful Monday morning Payment Processing SecurityIt makes Sense and Cents for your Organizationby Natalie Dunlevey President, Enterprise PCIand you are a business owner or an executive director of a non-profit or a city manager of a mid-sized city and the first phone call that you take when you arrive at the office is one of the card companies informing you that your payment processing solution has been breached.Customers, donors and tax payers financial data are now on the Dark Web for sale to the highest bidder.Do you think that your business is worth more or less than it was before the breach?Do you think that you will have more or less donations to your non-profit?Do you think the breach will sit well with tax payers?Do you wish you had taken security measures with respect to your payment processing more seriously?With the many types of payment options availableUnfortunately, many organizations come to securityto merchants, implementation of a robust security maturity in the worst possible waya breach of theirsolution absolutely has to occur because the referenced customers data.Breaches can occur with all types ofapplications cut across many mediums.In addition to data within an organization and most security measuresa well-maintained firewall and tightly monitored policy include strengthening firewalls and updating passwordsand procedure program with respect to handling of frequently.Payment Processingthe acceptance ofthe publics card information, the minimum security credit, debit, prepaid and purchase cardsrequiressolutions must be employed:its own unique, multi-layered security and complianceEMV protocolsEuropay-MasterCard-VISA solution. compliance which is typically referred to asOrganizations now have the ability to take payments inthe chip card.This technology employs a a myriad of methods including: microprocessor chip in place of utilization of the eCommercePerformed via an online paymentmagnetized strip on the back of a debit or credit portal.Sometimes referred to as a virtual terminal cardPoint of Sale SystemTodays version of a cashPCI compliancePayment Card Industry compliance register.Typically utilized with a cash drawer andwhich outlines protocols for card acceptance and separate printer an annual survey which is completed depending on the manner in which a card is processed by the TerminalTypically a counter- or desk-top devicemerchantthat accepts card payments at the point of purchase. P2P Encryption and TokenizationTruncating The printer is embedded within the device andof card numbers and assigning specific tokens to produces merchant and customer copies.Some haveeach transaction provides an exceptionally secure attached pin pads for EMV card acceptance; otherstransaction that even if compromised is deemed have the EMV slot within the device.Certain pinworthless by a cyber thiefpads also have NFC (Near Field Communication) to Finally, even with scrupulous attention to payment accept Apple Pay, Google Wallet, Android Pay andprocessing security, breaches may occur.Implementing other virtual cards. a payment processing security program does not insure Mobile PaymentsCard readers are attached to athat a breach doesnt occur but it DOES make your smart phone or tablet and have the functionality toorganization much less of a target.Cyber criminals are take payments anywhere.Typically a cloud-basedby-and-large lazy.They are on the hunt for the laowest app is available with the solution as well hanging fruit to steal and convert into easy money. Once Recurring PaymentsCustomers enter theiryour system is identified as having implemented a highly card information into a data base and agree tosecure payment processing solution, these thieves will monthly, quarterly or annual payments.Similar to amove on to a less secure victim.subscription service.Dont let your organization be an easy target!36 www.mrca.orgMidwest Roofer'