SlideShare ist ein Scribd-Unternehmen logo
1 von 9
5 TYPES OF DATA
BREACHES CAUSED BY
   LACK OF PCI
   COMPLIANCE
Top Patch delivers information
                                  security products that reduce risk,
                                  increase data security and ensure
                                  compliance.

                                  • Remediation Vault™: first peer-to-
                                    peer patch distribution product.
                                  • Vulnerabilities patched before
                                    hackers can exploit them.
                                  • Unix, Linux, BSD, OSX and
                                    Windows OS protected with
                                    newest security patches.
                                              www.toppatch.com
                                   Email: alex@toppatch.com • Twitter: @toppatch
©TopPatch • All Rights Reserved     349 Fifth Avenue, New York NY 10016, (646)
5 Types of Data Breaches Caused
                          by Lack of PCI Compliance



Overview

  •   Four merchant levels based on transaction
      volume over one year.

  •   Aggregated number of transactions across all
      merchant DBAs and across all cards.

  •   Vulnerability assessment: merchant systems
      checked by an approved vendor to determine
      level of susceptibility to data security
      breaches.

  •   If merchant stores cardholder data post-
      authorization and if the processing systems
      have internet connectivity, a quarterly scan by
      approved PCI scanning vendor is required.
5 Types of Data Breaches Caused
                         by Lack of PCI Compliance



Data breach #1: magnetic stripe data storage

  • Most common type

  • Merchant or service provider store highly
  sensitive information encoded on magnetic stripe:
  direct violation of PCI Data Security Standards.

  • POS may store these data without merchant’s
  knowledge.
5 Types of Data Breaches Caused
                           by Lack of PCI Compliance



Data breach #2: Missing/outdated security
patches


   • Involves some form of hacking

    • Hacker exploits merchant’s failure to install
    security patches and enters into the system.
5 Types of Data Breaches Caused
                         by Lack of PCI Compliance



Data breach #3: using vendor-supplied default
passwords and settings

  • Merchants get POS software and hardware from
  vendors.

  • Vendors install these at merchants’ premises
  using default passwords and settings.

  • Merchants do not change passwords and
  settings.
5 Types of Data Breaches Caused
                         by Lack of PCI Compliance



Data breach #4: SQL injection


 • Technique used by hackers to exploit
weaknesses
 
 in the coding of web-based applications.

   • Used to attack merchants’ internet
   applications, often involving shopping carts.
5 Types of Data Breaches Caused
                          by Lack of PCI Compliance



Data breach #5: Use of vulnerable services
on merchants’ servers

   • Servers used by merchants are often shipped
   with vulnerable services and applications that
   enabled by default.

   • Merchants not aware: since most services are
   not required by merchant, security upgrades are
   ignored.


 • Technique used by hackers to exploit
weaknesses

 in the coding of web-based applications.

 
 • Used to attack merchants’ internet
applications, often 
 involving shopping carts.
Top Patch delivers
     information security
  products that reduce risk,
  increase data security and
      ensure compliance

     Request a free trial of
     the Remediation Vault
              for
      Best-In-Class Patch
          Management
Alex
Email: alex@toppatch.com
(646) 664-4265
349 Fifth Avenue, New York, NY 10016
www.toppatch.com
Twitter: @toppatch

Weitere ähnliche Inhalte

Andere mochten auch

Natalie Archer VP RCDSO Resignation Letter
Natalie Archer VP RCDSO Resignation LetterNatalie Archer VP RCDSO Resignation Letter
Natalie Archer VP RCDSO Resignation Letternatalie_archer
 
Prevalence of Missing Lateral Incisor Agenesis in an Or¬thodontic Arabs Popul...
Prevalence of Missing Lateral Incisor Agenesis in an Or¬thodontic Arabs Popul...Prevalence of Missing Lateral Incisor Agenesis in an Or¬thodontic Arabs Popul...
Prevalence of Missing Lateral Incisor Agenesis in an Or¬thodontic Arabs Popul...Abu-Hussein Muhamad
 
Renueva tu vida familiar, hablemos
Renueva tu vida familiar, hablemosRenueva tu vida familiar, hablemos
Renueva tu vida familiar, hablemosAlexander Dorado
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processingAshish Kumar
 
Image pre processing
Image pre processingImage pre processing
Image pre processingAshish Kumar
 
Ppt on remote sensing system
Ppt on remote sensing systemPpt on remote sensing system
Ppt on remote sensing systemAlisha Korpal
 
REMOTE SENSING
REMOTE SENSINGREMOTE SENSING
REMOTE SENSINGKANNAN
 
Intro to GIS and Remote Sensing
Intro to GIS and Remote SensingIntro to GIS and Remote Sensing
Intro to GIS and Remote SensingJohn Reiser
 
GIS presentation
GIS presentationGIS presentation
GIS presentationarniontech
 
Remote sensing ppt
Remote sensing pptRemote sensing ppt
Remote sensing pptcoolmridul92
 

Andere mochten auch (15)

Neil Gajjar
Neil GajjarNeil Gajjar
Neil Gajjar
 
Natalie Archer VP RCDSO Resignation Letter
Natalie Archer VP RCDSO Resignation LetterNatalie Archer VP RCDSO Resignation Letter
Natalie Archer VP RCDSO Resignation Letter
 
Prevalence of Missing Lateral Incisor Agenesis in an Or¬thodontic Arabs Popul...
Prevalence of Missing Lateral Incisor Agenesis in an Or¬thodontic Arabs Popul...Prevalence of Missing Lateral Incisor Agenesis in an Or¬thodontic Arabs Popul...
Prevalence of Missing Lateral Incisor Agenesis in an Or¬thodontic Arabs Popul...
 
Renueva tu vida familiar, hablemos
Renueva tu vida familiar, hablemosRenueva tu vida familiar, hablemos
Renueva tu vida familiar, hablemos
 
WHAT IS IMAGE INTERPRETATION?
WHAT IS IMAGE INTERPRETATION?WHAT IS IMAGE INTERPRETATION?
WHAT IS IMAGE INTERPRETATION?
 
Image pre processing - local processing
Image pre processing - local processingImage pre processing - local processing
Image pre processing - local processing
 
Congenitally missing teeth
Congenitally missing teethCongenitally missing teeth
Congenitally missing teeth
 
Image pre processing
Image pre processingImage pre processing
Image pre processing
 
Spm unit 3
Spm unit 3Spm unit 3
Spm unit 3
 
remote sensing
remote sensingremote sensing
remote sensing
 
Ppt on remote sensing system
Ppt on remote sensing systemPpt on remote sensing system
Ppt on remote sensing system
 
REMOTE SENSING
REMOTE SENSINGREMOTE SENSING
REMOTE SENSING
 
Intro to GIS and Remote Sensing
Intro to GIS and Remote SensingIntro to GIS and Remote Sensing
Intro to GIS and Remote Sensing
 
GIS presentation
GIS presentationGIS presentation
GIS presentation
 
Remote sensing ppt
Remote sensing pptRemote sensing ppt
Remote sensing ppt
 

Kürzlich hochgeladen

How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 

Kürzlich hochgeladen (20)

How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 

5 Types of Data Breaches Caused by Lack of PCI Compliance

  • 1. 5 TYPES OF DATA BREACHES CAUSED BY LACK OF PCI COMPLIANCE
  • 2. Top Patch delivers information security products that reduce risk, increase data security and ensure compliance. • Remediation Vault™: first peer-to- peer patch distribution product. • Vulnerabilities patched before hackers can exploit them. • Unix, Linux, BSD, OSX and Windows OS protected with newest security patches. www.toppatch.com Email: alex@toppatch.com • Twitter: @toppatch ©TopPatch • All Rights Reserved 349 Fifth Avenue, New York NY 10016, (646)
  • 3. 5 Types of Data Breaches Caused by Lack of PCI Compliance Overview • Four merchant levels based on transaction volume over one year. • Aggregated number of transactions across all merchant DBAs and across all cards. • Vulnerability assessment: merchant systems checked by an approved vendor to determine level of susceptibility to data security breaches. • If merchant stores cardholder data post- authorization and if the processing systems have internet connectivity, a quarterly scan by approved PCI scanning vendor is required.
  • 4. 5 Types of Data Breaches Caused by Lack of PCI Compliance Data breach #1: magnetic stripe data storage • Most common type • Merchant or service provider store highly sensitive information encoded on magnetic stripe: direct violation of PCI Data Security Standards. • POS may store these data without merchant’s knowledge.
  • 5. 5 Types of Data Breaches Caused by Lack of PCI Compliance Data breach #2: Missing/outdated security patches • Involves some form of hacking • Hacker exploits merchant’s failure to install security patches and enters into the system.
  • 6. 5 Types of Data Breaches Caused by Lack of PCI Compliance Data breach #3: using vendor-supplied default passwords and settings • Merchants get POS software and hardware from vendors. • Vendors install these at merchants’ premises using default passwords and settings. • Merchants do not change passwords and settings.
  • 7. 5 Types of Data Breaches Caused by Lack of PCI Compliance Data breach #4: SQL injection • Technique used by hackers to exploit weaknesses in the coding of web-based applications. • Used to attack merchants’ internet applications, often involving shopping carts.
  • 8. 5 Types of Data Breaches Caused by Lack of PCI Compliance Data breach #5: Use of vulnerable services on merchants’ servers • Servers used by merchants are often shipped with vulnerable services and applications that enabled by default. • Merchants not aware: since most services are not required by merchant, security upgrades are ignored. • Technique used by hackers to exploit weaknesses in the coding of web-based applications. • Used to attack merchants’ internet applications, often involving shopping carts.
  • 9. Top Patch delivers information security products that reduce risk, increase data security and ensure compliance Request a free trial of the Remediation Vault for Best-In-Class Patch Management Alex Email: alex@toppatch.com (646) 664-4265 349 Fifth Avenue, New York, NY 10016 www.toppatch.com Twitter: @toppatch

Hinweis der Redaktion

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n