Call Us Today! 636-557-7777   security@omegaatc.com  |  Get started now! |       STAY RESILIENT®

Are you equipped to deal with the compliance mandates of PCI 3.2?

In mid-2015 when the buzz was at its peak on EMV (Europay, MasterCard and Visa), the push for retailers to adopt the technology began. The idea behind is to protect consumers from transaction fraud and lower their expenses from charge backs. Chip information stolen cannot be duplicated because the transaction number cannot be recreated and will not work on a new transaction. However, the little chip on your card cannot prevent data breaches.

Does EMV reduce PCI requirements?

It does not. Merchants cannot ignore PCI and it does not reduce data fraud. Here is an explanation from PCIcomplianceguide.org:

What EMV is not

It is not card data protection – EMV does not encrypt the Primary Account Number (PAN) and therefore the card data must still be protected according to PCI guidelines.

The short and right answer is PCI is just not going away. EMV has nothing to do with PCI compliance or store data security. Self-assessment questionnaires (SAQ) and Qualified Security Assessor (QSA) audits will continue. Besides, the compliance requirements of PCI 3.2 have increased. Merchants from Level 1 through Level 4 have to show proof of compliance every year.

This means continuing the pain points of:Managed Security Services for PCI 3.2

  1. What to secure?
  2. What to monitor, log, scan, alert…?
  3. What to document?
  4. What evidence to collect?
  5. How to follow requirements?
  6. What procedures to write?
  7. How to stay continually compliant?

There is a lot more to do and merchants cannot be worried about spending time on compliance when they have a business to run.

Help is just a phone call or a few keystrokes away. Get started now.

Omega provides security and management solutions to address the data security and compliance void in your retail environments.

  • Guide – Provide the right guidance and execute the following:
    1. Risk assessment and risk management
    2. Employee training and awareness
    3. Information security policies and procedures
    4. PCI compliance evidence collection
    5. Card data flow chart and network diagrams
  • Protect – Execute processes and technologies for the following:
    1. Access management, access control
    2. Enterprise data protection
    3. End point security
    4. Log collection and retention for 365 days
    5. Patch management
  • Monitor – Provide monitoring capabilities to protect and detect activity
    1. System logging
    2. Security information and event management (SIEM)
    3. Threat monitoring
    4. Vulnerability management
    5. Intrusion detection
  • Response / Recovery plan and execution
    1. Incident response plan
    2. Execute solutions and services for securing data

Are you satisfied with the security of data within your organization?
If no, visit our website to understand what is involved to become secure and compliant. Listen to these interesting customer stories and testimonials. Get Omega’s help

Contact security@omegasecure.com, or call Peter Guidi at 636-557-7777 x2451 to secure your retail environment.