b'PAYMENT PROCESSING SECURITYIt makes Sense and Cents for your OrganizationBy Natalie Dunlevey President, Enterprise PCII ts a beautiful Monday morning andphone or tablet and have the functionality to take you are a business owner or an executivepayments anywhere.Typically a cloud-based app is director of a non-profit or a cityavailable with the solution as wellmanager of a mid-sized city and the firstRecurring PaymentsCustomers enter their card phone call that you take when you arriveinformation into a data base and agree to monthly, at the office is one of the card companies informing youquarterly or annual payments.Similar to a subscription that your payment processing solution has been breached. service.Customers, donors and tax payers financial data are now on the Dark Web for sale to the highest bidder.Do you thinkWith the many types of payment options available to that your business is worth more or less than it was beforemerchants, implementation of a robust security solution the breach?Do you think that you will have more or lessabsolutely has to occur because the referenced applications donations to your non-profit?Do you think the breach willcut across many mediums.In addition to a well-maintained sit well with tax payers?Do you wish you had taken securityfirewall and tightly monitored policy and procedure program measures with respect to your payment processing morewith respect to handling of the publics card information, seriously? the minimum security solutions must be employed:EMV protocolsEuropay-MasterCard-VISA Unfortunately, many organizations come to securitycompliance which is typically referred to as the chip maturity in the worst possible waya breach of theircard.This technology employs a microprocessor chip in customers data.Breaches can occur with all types of dataplace of utilization of the magnetized strip on the back within an organization and most security measures includeof a debit or credit cardstrengthening firewalls and updating passwords frequently.Payment Processingthe acceptance of credit, debit,PCI compliancePayment Card Industry compliance prepaid and purchase cardsrequires its own unique, multi- which outlines protocols for card acceptance and an layered security and compliance solution. annual survey which is completed depending on the eCommercePerformed via an online payment portal. manner in which a card is processed by the merchantOrganizations now have the ability to take payments in a myriad of methods including: P2P Encryption and TokenizationTruncating of card numbers and assigning specific tokens to each Sometimes referred to as a virtual terminal transaction provides an exceptionally secure transaction Point of Sale SystemTodays version of a cash register. that even if compromised is deemed worthless by a Typically utilized with a cash drawer and separatecyber thiefprinter Finally, even with scrupulous attention to payment TerminalTypically a counter- or desk-top device thatprocessing security, breaches may occur.Implementing a accepts card payments at the point of purchase.Thepayment processing security program does not insure that a printer is embedded within the device and producesbreach doesnt occur but it DOES make your organization merchant and customer copies.Some have attachedmuch less of a target.Cyber criminals are by-and-large lazy.pin pads for EMV card acceptance; others have theThey are on the hunt for the lowest hanging fruit to steal EMV slot within the device.Certain pin pads also haveand convert into easy money. Once your system is identified NFC (Near Field Communication) to accept Apple Pay,as having implemented a highly secure payment processing Google Wallet, Android Pay and other virtual cards. solution, these thieves will move on to a less secure victim.Dont let your organization be an easy target!Mobile PaymentsCard readers are attached to a smart www.mrca.orgMidwest Roofer 35'