Safeguarding Transactions

The retail industry has been in the spotlight with data breach after data breach. With the holiday season fast approaching, companies need to take extra measures to secure transactions. According to Verizon PoS invasions accounted for 31% of the 148 retail breaches in 2013, and these invasions accounted for 75 percent of the 137 accommodation sector breaches. This trend in attacks on payment card systems is only accelerating.

So what protocols can be put in place to secure these transactions, and prevent a major breach? According to Smart Card Alliance, Chip Technology, Encryption, and Tokenization are three technologies that are recommended to be used in combination to ensure secure payments and prevent credit card fraud. The implementation of these three technologies will differ, according to the payments stakeholder’s individual risk, regulations, cost and anticipated needs. More about these three technologies and how they can be implemented together can be found in the white paper.

More on how to safeguard your business from a potential breach to come. So keep an eye out!


Topic Related Links

SecureDoc Enterprise Server
Encryption Key Management
White Paper: Five Pillars of Transparent Data Security

Previous Post
SecTor 2014 – What We Learned
Next Post
NVMe and Self-Encrypting Drives – The Perfect Match

Related Posts

The “Key” to Playing it Safe

Apple this week rolled out a new version of its operating system running mobile devices such as iPads and iPhones. It also announced it will no longer be able to comply with requests of law enforcement to unlock the encryption…
Read more

Last Day Exhibiting At Interop

Today is the last day we will be exhibiting at Interop – New York. Come by and visit Booth #548 to learn about the latest in our data encryption solutions. We have specialists on hand who can answer any of…
When virtual environments get too heavy

When Virtual Environments Get Too Heavy

As an encryption security vendor that is working its way into Mobile Device Management (MDM), I’m fascinated and constantly looking at new ways to secure mobile devices and company information. As someone with a background in virtualized environments, I’m even…
Read more

The Dark Side of Encryption

I know it’s very tedious these days to use a Star Wars metaphor, but as everyone’s doing it so will I. Encryption techniques have been used for some time to secure communications and protect personal or intellectual property. (more…)

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Menu