advertisement
advertisement

This is page 2 of:

PCI’s Potential Black Friday Nightmare

January 30th, 2013

This increased rigor is good, and it should benefit merchants. It may also result in validation logjams involving software vendors and their PA-QSAs if there are delays beginning their revalidations, and then further logjams if a pile of ROVs all show up on the PCI SSC’s doorstep in mid-October.

Memo to application vendors: You may want to think about scheduling your PA-QSA’s time now (if you have not already), and be sure to allow adequate time for the PCI SSC review process in your planning, too. Vendors need to remember they won’t be the only one in the PCI SSC’s queue. I know that PA-QSA firms will be gearing up for the expected rush in ROV renewals, and I’m pretty sure they also hope the application vendors will similarly plan ahead.

As the PCI SSC notes, vendors should anticipate changes in “pricing and process” that can affect the timing and, possibly, the cost of their new ROV. Your PA-QSA will be aware of the October deadline. I am sure they, too, have read the part of the FAQ that states: “Assessors are expected to perform a fresh assessment each time, as the results from previous assessments are not necessarily relevant for a current assessment.”

The message for merchants is to stay on top of developments with your payment application vendor. If you have a payment application with a PA-DSS expiry of October, contact your vendor and find out when you can expect the updated version. Visa and MasterCard have not changed their mandates that merchants use PA-DSS validated applications. That means merchants also must budget the time and resources to upgrade their payment applications this summer (if you are lucky) or autumn.

What if a merchant’s payment application vendor is late and misses the Oct. 28, 2013, expiry or the merchant cannot install the application in time? If merchants have a properly installed (per the vendor’s PA-DSS Implementation Guide) and validated application, they should still be in compliance with the Visa and MasterCard mandates—at least for now. However, those merchants could end up with an application that is no longer maintained by the vendor or that will no longer receive security patches or updates and, therefore, may increase their vulnerability to a data breach with each passing day.

Although the October 28 sunset for PA-DSS primarily affects payment application vendors, merchants will also be impacted. Merchants must plan now for a summer/autumn payment application upgrade. Otherwise, they will need to plan on supporting an expired application that—although possibly still secure—is approaching its end-of-life. Spinning through the list of PA-DSS validated applications, quite a number appear to be facing the October 28 validation deadline. I suggest merchants check their own applications on the PCI SSC’s list and assess their upgrade strategy.

What do you think? I’d like to hear your thoughts. Either leave a comment or E-mail me.


advertisement

Comments are closed.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.