PCI

Compliance

PCI Compliance

If you store or process credit card data, PCI is important to you. The Payment Card Industry Data Security Standard is not a law but instead, it is a thorough set of rules put forth by the five major issuers of credit cards.

The PCI Data Security Standard specifies twelve requirements for compliance, organized into six logically related groups called “control objectives.”

These six groups are:PCI - credit card
1. Build and Maintain a Secure Network and Systems
2. Protect Cardholder Data
3. Maintain a Vulnerability Management Program
4. Implement Strong Access Control Measures
5. Regularly Monitor and Test Networks
6. Maintain an Information Security Policy

As Our Customer

For complete compliance, the GDV customer primary environment must be PCI compliant. If an audit or certification program has not been undertaken, we recommend completing the Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance, found here.

GDV customers who are subject to the PCI DSS should notify GDV of this requirement and their intention and plan to comply.

GDV and PCI

GDV layers our compliance with PCI through combining your compliance with our adherence to a thorough list of internal controls and policies.

 

The Case for Office 365 Backup

In the wake of Microsoft's September 4 - September 5 South Central U. S. outage for Office 365 and Azure, it's worth asking, should you be concerned with backup of your Office 365 data? It's your data, and while Microsoft normally does a good job with protecting it,...

Counting down the worst cyber security breaches of 2018 – #4

Fitness apparel manufacturer Under Armour gave us a good example of how companies can try to protect their user’s data but often fail to fully cover everything that needs protecting. The information that was stolen from Under Armour is minor compared to some of the...

Global Data Vault’s Mid-Year Count-Down of the Worst Cybersecurity Breaches

Number 5: VPNFilter More and more, our business environments are connected to the cloud. The transmission of data and the speed to which it can be accessed is critical to business intelligence and competitive advantage. When that data becomes attractive to hackers,...