Four reasons why some big retailers are still not PCI-compliant
The deadline for compliance was Oct. 1
Computerworld - Starting today, big retailers accepting payment card transactions face fines ranging from $5,000 to $25,000 a month if they don't comply with the Payment Card Industry (PCI) data security standard mandated by the major credit card companies.
Under the PCI standard, all companies accepting payment cards are required to implement a set of 12 security controls for protecting card holder data. The controls include ones related to access control and authentication, data encryption, and transaction logging.
About 325 Tier 1 merchants, those defined as processing more than 6 million card transactions a year, had until Sept. 30 to show they had implemented all of the required controls. But according to estimates from analyst firm Gartner Inc. and observers in the payment industry, a good half of them are unlikely to have made the deadline for a variety of reasons.
Here are four of the likeliest reasons:
The time and money required to implement PCI controls on legacy systems
Large companies with highly distributed, older computing environments are having an especially hard time applying the security controls mandated by PCI, said Amer Deeba, chief marketing officer and vice president of product marketing at Qualys Inc., a Redwood Shores, Calif.-based vendor of IT security systems. "Many of the big [retailers] are handling credit card information from all around the world and storing it in legacy systems that are no longer being supported or updated" by software vendors, he said.
Applying the needed security updates and patches in such an environment without breaking functionality can be a huge challenge -- especially given the near continuous uptime requirements of such systems, said Sean Smith, technology director at Steak N Shake Co., an Indianapolis-based restaurant chain. Steak N Shake, a Tier 1 vendor, has turned in its compliance reports "with all areas being marked as sufficient" for compliance, Smith said. But getting to that point involved a large-scale, yearlong effort that included adding new security controls such as file integrity monitoring and event log capturing to a "very legacy environment," he said.
A proper security upgrade in distributed legacy environments would require millions of dollars in system upgrades and months of dedicated manpower, said Avivah Litan, an analyst at Gartner Inc. "As a result, retailers in these positions are basically being forced to apply Band-Aids to patch the problems while having to juggle lots of priorities and competing interests as they do so," she said. "The effort is far from straightforward."
Differing interpretations of compliance by auditors
A company may think it has implemented all of the recommended controls under the PCI standard and discover that it is still not compliant when assessed because of the way different auditors assess compliance, said Jay White, global information protection architect at Chevron Corp. "The biggest challenge with PCI is that you are at the mercy of the auditors and their skill set," White said. With some auditors, he said, "everything becomes black and white. It's either on or it's off," whereas what might be needed is a more nuanced view of the controls a company has in place.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
NSA: Riding on Facebook's horse tail.
The U.S. National Security Agency (NSA) is once again close to denying reports that it is indiscriminately monitoring every computer on planet Earth. This time, the freshest, newest, most recent report of NSA mass-surreptitiousness (courtesy Edward Snowden -- ta) alleges the sneaky agency infects computers with malware via a fake Facebook (NASDAQ:FB) login page.
In IT Blogwatch, bloggers play keep-away with the man-in-the-middle.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Gartner 2013 Magic Quadrant for Enterprise Backup/Recovery Software
- See why CommVault was positioned as the #1 leader in Gartner's 2013 Magic Quadrant for Enterprise Backup/Recovery software for the 3rd year in...
- Forrester Report: CommVault is a Leader in Enterprise Backup and Recovery
- In this report, Forrester takes a deep dive into the evaluation criteria, how CommVault is positioned and the features and functionality that make...
- Forrester Wave for Enterprise Backup and Recovery
- Read this report to see how CommVault continues to outpace its competitors and why Forrester positioned CommVault Simpana as the top backup and...
- Architecting the Network of the Future
- Networks need to change, as does the way IT thinks about and manages them. In addition to reliability, IT must now add higher... All Government IT White Papers
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them.
On-Demand Webcast: 7 Reasons to Choose VoIP
Thinking about a new phone system for your business?
Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA...
- Top 8 Communications Tools for Small Businesses Powerful technology is available to help your small business improve its communications with customers, employees and suppliers. View this free On-Demand Webcast produced...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- All Government IT Webcasts