advertisement
advertisement

This is page 2 of:

PCI Talk is Cheap: Even Small Merchants Can Afford It

August 13th, 2009

They get to fill out PCI DSS Self-Assessment Questionnaire (SAQ) A. Only 11 questions and they’re done. But many small businesses don’t have it so easy. They have multiple locations, multiple (usually older) POS systems, a flat network, systems with default passwords, unsecured system configurations, and lots of employees who have access to confidential data they don’t need.

They are small businesses, with big business security problems. But they feel they are not vulnerable because they don’t have “lots” of credit card data. The problem is that the bad folks typically use automated attacks to find unsecured servers, websites and can insert malware. Another popular method of compromise is that malware is uploaded by unsuspecting employees who visit social networking websites and download “member generated content” from any of the millions of bogus accounts that hackers can create automatically on some sites.

Although larger (Level 1 and 2) organizations typically have tools in place to prevent this or isolate its impact, many small businesses do not, and are therefore much more vulnerable than they believe.

  • Filling Out Forms Is Cheaper Than Buying Security Controls
    One of the by-products of making it easy for small businesses to report their PCI compliance through the use of the 4 SAQs is that companies often fill them out without actually doing all the things they should be doing. Wow, what a shock! To try to detect how prevalent these “false positive” self-assessments are, we asked the small businesses whether they would have the documentation to back up their SAQ findings. As we expected, 23 percent said they did not have the documentation, and another 22 percent were unsure they could prove that they are compliant if asked to do so.

    The point is: merchants are often “liberal” (which, in this case, is bad) in how they answer their SAQs. This finding of companies taking liberties with their SAQs may be one of the reasons why MasterCard recently decided to force both Level 1 and Level 2 merchants to use outside QSAs. The point here is that security and payment professionals who want to help small businesses improve their data security must come to grips with the fact that even though 86 percent of small businesses say they are aware of the PCI standards, and 65 percent say that data security is a high priority, there continue to be fundamental factors, such as a low sense of risk, other spending priorities, and a simple-to-fudge SAQ process that will continue to hinder efforts to get small businesses to take the actions that will materially reduce their IT security risks.

  • The Bottom Line
    Although I realize it’s possible to read the PCI and Small Business report and get a really positive sense that small business managers are starting to care about security and PCI compliance, I believe that contrasting supportive comments with actions taken is a reasonable, if cynical, analysis of the findings. If you’d like to learn more about our research on PCI and small business, or any other topic, please visit the PCI Knowledge Base, and our “Contact us” page, or if you want to have a personal discussion about PCI and small business issues, just send me an E-Mail at David.Taylor@KnowPCI.com.


  • advertisement

    4 Comments | Read PCI Talk is Cheap: Even Small Merchants Can Afford It

    1. Bryan Johnson Says:

      I agree with you David. Opinion does not always translate into action when it comes to merchants taking the necessary steps to achieve compliance and secure credit card data. At the same time, I think that service providers in the payment processing industry are getting much better at developing solutions that lessen PCI Compliance scope and secure sensitive data for merchants – which will help move things along faster.

    2. Dave Taylor Says:

      Hi, Bryan,
      Good point. I really ought to write more about the use of service providers & outsourcing. It keeps coming up in our interviews with merchants. If you or anyone else reading this has suggestions for an “angle” for the piece, let me know. Remember, Evan always wants the topic to have a fresh approach. So, suggestions anyone?
      thx, Dave T.

    3. Zsavonne Says:

      David you bring up some great points. Small businesses are targets for credit card hackers. In fact, a recent Visa review of fraud cases found that small businesses account for the vast majority of credit and debit card data breaches.

    4. FedupwithPCI Says:

      Rubbish,
      The entire drive to PCI compliance is more driven by PCI committee members greed (many of which are involved in the network scanning and on-site consulting review business) than it has anything to do with any real steps toward reforming the overall card processing industry. Small businesses, like a martial arts school or a bicycle repair shop that just happen to process credit card transactions over an Internet connection are the least of the Industry’s problems. Hackers simply are not interested in spending a few days setting up to crack into a small merchant’s computer on the hopes of intercepting 50 – 100 credit card transactions a month. It just is NOT going to happen. They want the middle to large tier processors where they can be assured of a quantity of data to either resell or use directly.

      What is happening is that small businesses, like the ones I mentioned above, are helping fund hundreds of new PCI compliance businesses with plenty of cash from unnecessary quarterly network scans. It simply results in wasted time from paperwork and trying to understand an industry that is not their core business. PCI DSS at this level, as currently implemented, does little to nothing to provide any more security to the card industry in general.

      I am not bemoaning security standards or best-practices for keeping customer card data safe. I am just pointing out that it is the small businesses that are the absolute least contributors to the overall card industry losses that are paying the biggest price when tallied up. When I approach a new customer interested in accepting credit card payment and mention they will need to tag another $100 – $200 a year for quarterly network scans of their PC that they process credit cards on, in addition to any costs in time and software to GET compliant, they will likely tell me to go jump in a lake.

      In the old days, the hard sell for a merchant account was always an argument of “will you waive the $50 set-up fee, we really can’t afford that as a small business.” Now I have to add these fees into the sales process. All these additional costs for small businesses via PCI DSS are an absolute death knell for anyone trying to sell these services to small businesses or for small businesses themselves.

      If the PCI DSS committee members had focused their energies more on the card processors, gateway providers, and the myriad other middle to top tier providers, developed new standards for secure data transmissions, network compliance, etc., I would venture that some 25% – 75% improvement on losses could be seen by the industry in the next 5 years. Then, they could focus on education services for the small business owners and offer free (yes free) network scans and advice on making a merchant’s data safer for their own peace-of-mind and for the entire industry.

      Let us not forgot the forest for the trees. The small mom-and-pop merchant is not the one making money to accepting credit cards. Indeed the merchant gives away between 2% and 5% of every transaction to Visa/MC/AMEX, etc. on each transaction. Yet it is the merchant having to pay even more to assure that those profits keep flowing to the big providers and their middle-man partners.

    Newsletters

    StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
    advertisement

    Most Recent Comments

    Why Did Gonzales Hackers Like European Cards So Much Better?

    I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
    Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
    A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
    The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
    @David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

    StorefrontBacktalk
    Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.