If you are going to do business online, secure payment
processing is a must. We just completed a three part series posted on the ERP
Software Blog about payment gateways, obtaining PCI Compliance and encryption
methods.
In part one, the key players of secure payment processing
online are discussed. These include the merchant, the cardholder and payment
gateways. Different merchant levels are also provided in details. Then in part
two of the series, obtaining PCI Compliance is the focus. There are 12 steps in
this process that are separated into six categories: build and maintain a
secure network, protect cardholder data, maintain a vulnerability management
program, implement strong access control measures, regularly monitor and test
networks and maintain an information security policy. These were taken directly
from the PCI DSS website. How to get started on these steps is also highlighted
in part two of the series. And finally, part three details the two ways to
handle sensitive data securely: tokenization and encryption. Encryption has
been around for years and while tokenization is a newer technology, when it
comes to secure payment processing, it is the clear winner.
To read these articles in more detail, visit our page on the
ERP Software Blog.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.