Steven Bowles

Recent Posts

Why Validated P2PE Services are a Major Asset for Merchants

In the first six months of 2019 4.1 billion records were compromised in publicly disclosed breaches and with 2020 just beginning, merchants are more aware than ever about customer data security. In the midst of this, Point-to-Point Encryption (P2PE) has emerged as a security solution that assures payment data is as safe as possible. P2PE works to keep payment data secure in transit as well as prevent tampering at the point of sale (POS) devices themselves, as it encrypts card data at the point of interaction - when a card is inserted or swiped. From that point, the data is encrypted until it reaches the gateway so no cybercriminal or third party can access the unencrypted data.

Read More

­­­Why Should Merchants Invest in P2PE?

Cardholder data is a tempting target for hackers, and with at least 19 major consumer companies reporting data breaches since January 2019, many merchants are looking to bolster their payment security strategies. One of the ways they can achieve this is by implementing point-to-point encryption (P2PE).

Read More

You Should Be Using a Semi-integrated Payment Architecture. Here’s Why

In an increasingly complex payment environment, many merchants are seeking a more flexible approach to help streamline their payment process, enhance payment security and manage PCI scope. This is where a semi-integrated payment environment comes into the picture.

Read More

Don’t Underestimate the Importance of Process in Your Balanced Security Approach

Whether you are a big hospitality chain, a quick-service restaurant or a small retail apparel store, payment security is critical to your business and your reputation. Your customers entrust their payment information to you, and they expect you to protect it.

Read More

Your Balanced Security Approach Can (and Must) Include Your Employees

A Balanced security approach is a fundamental best practice when it comes to securing your payment infrastructure. Encryption and tokenization, firewalls for back-office systems or mobile device management (MDM) solutions can play a major role in preventing data theft ⁠— but a purely technology-based strategy isn’t a cure-all. Employees, from high-level executives to in-store associates, are an essential piece of your tiered security strategy.

Read More