trends

PCI DSS Compliance for Paysites

PCI DSS stands for Payment Card Industry Data Security Standard. PCI DSS is a Compliance standard developed in late 2004 by the main credit card companies as a method of preventing credit card fraud, hacking and security threats and vulnerabilities.

In September, 2006, the PCI DSS standard was updated to version 1.1 from 1.0 to provide some minor revisions to the original version. The next revision of PCI DSS compliance is scheduled for late 2008.

PCI DSS Compliance is not an option and is required on any site which accepts credit cards as a form of payment. Any site accepting credit cards must comply with particular standards which are based primarily on the way in which a domain is secured. Non PCI DSS compliant issues may include; open ports on a server, firewall holes, non-standard applications or applications which have not been upgraded to their latest and most secure versions.

In order for a site to be PCI DSS compliant, it must provide a report if audited by a Qualified Security Assessor (QSA) whenever requested. If the owner of site which accepts credit cards cannot prove that it meets the PCI DSS requirements, they may lose their ability to process credit cards on their sites and thereby their ability to process credit card transactions.

The amount of times a PCI DSS scan is required in order to be PCI DSS compliant depends upon the total number of transactions completed each year by that domain.

Sites and payment card service providers must validate their compliance periodically. This periodic validation is conducted by auditors who are the PCI DSS Qualified Security Assessors (QSAs). Site owners who are processing less than 80,000 transactions per year are allowed to perform a self-assessment questionnaire. Sites that process larger amounts of transactions can only be approved as compliant by a qualified QSA on behalf of the PCI DSS council.

It does not matter if you use a shopping cart, membership or VOD site, and it does not matter if you host the payment pages where the customer puts in their credit card information or if you use a gateway processor like Netbilling or DHDmedia who hosts those pages for you. You must still conform to keeping all data that is collected safe and meets the guidelines of the PCI Security Standards Council; otherwise you may be liable for huge fines. Sites that process, store or even transmit payment card data must be PCI DSS compliant or risk losing their ability to process credit card payments and risk being audited or fined. PCI DSS fines can be as high as $500,000 per incident.

A prime example of what could happen if you fail to implement or adhere to the PCI DSS compliance can be found in the March, 2007, case of a company called TJX Companies, Inc., — the owner of T.J Maxx and Marshall's department stores, which faced more than a dozen class action lawsuits in Alabama, California, Massachusetts, Puerto Rico and six Canadian provinces, for what has been called the single largest data breach in U.S history.

TJX revealed in 2007 that hackers compromised at least 45.7 million credit and debit cards from the period of July, 2005, until the discovery was made in December, 2006. In a regulatory filing made with the Securities and Exchange Commission (SEC) after the violation, TJX stated that its computer systems were first hacked in July, 2005, by one or more intruders, but did not find out about the breach until much later. TJX recently estimated that the breach will cost them about $118 million. The estimate after legal fees and regulatory fines put the costs at over $1.35 billion.

So how can you keep yourself PCI DSS Compliant? The simplest method of making sure your site meets the PCI DSS compliance requirements is to use a PCI DSS scanning company like McAfee Secure. McAfee Secure has a program which costs around $319 a year for four devices and can scan your servers to make sure they meet the PCI DSS requirements and provide the report you need in case your site ever gets audited by the PCI DSS council.

Remember, that any server which has anything to do with your payment process must be PCI DSS compliant. This may include your NATs server if you are sending information to a gateway; your payment pages (where customers put in their card information on a secure page); your server if it sends out payment information to another server (in the case of cross selling).

When you have your domains scanned for PCI DSS compliance, they are scanning the servers, checking to see what kind of information they can obtain from that server similar to what a hacker might do. (One of the things worth mentioning here is that when you employ a PCI DSS scanning company to scan your server, it may cause your website statistics to become erratic and inaccurate as the PCI DSS scanner will hit pages randomly, every day. It may also increase the amount of 404's or 'page not found' errors in your reports. If you can find a way to purge their scanning servers from your statistics it will eliminate possible stat confusion.)

Another item of note is to make sure that you have total control over your servers. I would never recommend putting your pay pages or any part of your payment process on any server which you do not have root access to. In order words, any server which is either co-located (owned by you) or dedicated would be fine. I have seen many instances where servers have been comprised by scripts (such as CGI scripts or mail forms) running on an unsecured shared server.

Another item to keep in mind is that if you are running a program like NATS, which hosts a pre-payment form asking the client to put in their name, country and email, it may be prudent to secure that server as well. Since your NATS server hosts the this pre-payment form and this form passes over this information to a payment gateway, a hacker could use vulnerabilities in your server to get this information and get the rest from a gateway which is not secure and both of you could be liable.

In my opinion is always best to protect yourself by making sure that any server which accepts any information in the payment process be secured. Adding a Hacker Safe logo can also help customers feel more at ease with your payment process and thereby may be more willing to fill in your pre-payment page or self-hosted payment pages.

If you are curious if your payment gateway is PCI DSS compliant, you can go to Visa's compliant list of service providers. Some of the processors which are PCI DSS compliant include Linkpoint; CCBill; DHD Media; Epoch; eProcessing Network; Jettis; Netbilling; and Rocketgate.

PCI DSS compliance is a necessary part of processing credit cards online and cannot be taken likely. Hackers are always looking for vulnerabilities to exploit. I recently spoke to someone on the VISA council which estimated that only about 40 percent of all sites are currently PCI DSS compliant.

Make sure your payment process is PCI DSS compliant and protect your business. If you have any questions on how to get your site PCI DSS compliant, please don't hesitate to contact me at cs@integrationmind.com.

Related:  

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Why Cyber Insurance Is Crucial for Adult Businesses

From streaming services and interactive platforms to ecommerce and virtual reality experiences, the adult industry has long stood at the forefront of online innovation. However, the same technology-forward approach that has enabled adult businesses to deliver unique and personalized content to consumers worldwide also exposes them to myriad risks.

Corey D. Silverstein ·
opinion

Best Practices for Payment Gateway Security

Securing digital payment transactions is critical for all businesses, but especially those in high-risk industries. Payment gateways are a core component of the digital payment ecosystem, and therefore must follow best practices to keep customer data safe.

Jonathan Corona ·
opinion

Ready for New Visa Acquirer Changes?

Next spring, Visa will roll out the U.S. version of its new Visa Acquirer Monitoring Program (VAMP), which goes into effect April 1, 2025. This follows Visa Europe, which rolled out VAMP back in June. VAMP charts a new path for acquirers to manage fraud and chargeback ratios.

Cathy Beardsley ·
opinion

How to Halt Hackers as Fraud Attacks Rise

For hackers, it’s often a game of trial and error. Bad actors will perform enumeration and account testing, repeating the same test on a system to look for vulnerabilities — and if you are not equipped with the proper tools, your merchant account could be the next target.

Cathy Beardsley ·
profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
opinion

Creating Payment Redundancies to Maximize Payout Uptime

During the global CrowdStrike outage that took place toward the end of July, a flawed software update brought air travel and electronic commerce to a grinding halt worldwide. This dramatically underscores the importance of having a backup plan in place for critical infrastructure.

Jonathan Corona ·
Show More