Small Merchant Guide To Safe Payments
Small Merchant Guide To Safe Payments
A PAYMENT TERMINAL is the device used to take ENCRYPTION (or cryptography) makes card data
customer card payments via swipe, dip, insert, tap, or unreadable to people without special information (called
manual entry of the card number. Point-of-sale (or POS) a key). Cryptography can be used on stored data and data
terminal, credit card machine, PDQ terminal, or EMV/chip- transmitted over a network. Payment terminals that are part of a
enabled terminal are also names used to describe these PCI-listed P2PE solution provide merchants the best assurance about
devices. the quality of the encryption. With a PCI-listed P2PE solution, card
data is always entered directly into a PCI-approved payment terminal
An ELECTRONIC CASH REGISTER (or till) registers and with something called “secure reading and exchange of data (SRED)”
calculates transactions, and may print out receipts, but it enabled. This approach minimizes risk to clear-text card data and
does not accept customer card payments. protects merchants against payment-terminal exploits such as
“memory scraping” malware. Any encryption that is not done within a
An INTEGRATED PAYMENT TERMINAL is a payment PCI-listed P2PE should be discussed with your vendor.
terminal and electronic cash register in one, meaning it
takes payments, registers and calculates transactions, and A PAYMENT SYSTEM includes
prints receipts. the entire process for accepting OR
processes credit and/or debit card payments on behalf of your payment system may include
merchants. Acquirer, acquiring bank, and card or payment a payment terminal, an electronic cash register, other devices or systems
processor are also terms for this entity. connected to a payment terminal (for example, Wi-Fi for connectivity or a
PC used for inventory), and the connections out to a merchant bank. It is
important to use only secure payment terminals and solutions to support
your payment system. See page 21 for more information.
CHECKOUT
you with their personal and delivery details. No payment
card data is requested or captured on these pages.
PAY NOW
CHECKOUT
Your PAYMENT PAGE is the web page or form used to An E-COMMERCE PAYMENT SYSTEM encompasses the entire
collect your customer’s payment card data after they process for a customer to select products or services and for
have decided to purchase your product or services. the e-commerce merchant to accept card payments, including a
Handling of card data may be 1) managed exclusively website with shopping pages and a payment page or form, other
PAY NOW
by the merchant using a shopping cart or payment connected devices or systems (for example Wi-Fi or a PC used for
application, 2) partially managed by the merchant with inventory), and connections to the merchant bank (also called a
the support of a third party using a variety of methods, payment service provider or payment gateway). Depending on
or 3) wholly outsourced to a third party. Most times, the merchant’s e-commerce payment scenario, an e-commerce
using a wholly outsourced third party is your the safest payment system is either wholly outsourced to a third party,
option - and it is important to make sure they are a PCI partially managed by the merchant with support from a third party,
DSS validated third party. or managed exclusively by the merchant.
Payments sent via phone line Payment terminal connects to electronic cash
9 register, with additional connected equipment. HIGHER
Your security risks vary greatly depending on the complexity of your payment system, whether face-to-face or online.
PAYMENT TERMINAL
Merchant might also use Wi-Fi
capability in addition to wired
CAMERAS networking, and/or may offer Wi-Fi for
customer use
PAY NOW
CHECKOUT
Use strong passwords Protect your card data Inspect payment Use trusted business Install patches from Protect in-house
and change default and only store what terminals for partners and know your vendors access to your
ones you need tampering how to contact them card data
Don’t give hackers Use anti-virus Scan for vulnerabilities Use secure payment Protect your business For the best protection,
easy access to your software and fix issues terminals and from the Internet make your data useless
systems solutions to criminals
These security basics are organized from easiest and least costly to implement to those that are more complex and costly to implement. The amount of risk
reduction that each provides to small merchants is also indicated in the “Risk Mitigation” column.
Your passwords are vital for computer CHANGE YOUR PASSWORDS REGULARLY. Treat your passwords TYPICAL DEFAULT
and card data security. Just like a lock like a toothbrush. Don’t let anyone else use them and get new ones PASSWORDS THAT
on your door protects physical property, every three months. MUST BE CHANGED:
a password helps protect your business [none]
data. Also be aware that computer TALK TO YOUR SERVICE PROVIDERS. Ask your vendors or service [name of product/
equipment and software out of the box providers about default passwords and how to change them. vendor]
(including your payment terminal) often Then do it! Also, if your service provider manages passwords for
1234 or 4321
come with default (preset) passwords your systems, ask them if they’ve changed those vendor default
such as “password” or “admin,” which passwords. access
are commonly known by hackers and admin
are a frequent source of small merchant MAKE THEM HARD TO GUESS. The most common passwords are
anonymous
breaches. “password” and “123456.” Hackers try easily-guessed passwords
because they’re used by half of all people. A strong password has company name
seven or more characters and a combination of upper and lower database
case letters, numbers, and symbols (like !@#$&*). A phrase can
guest
also be a strong password (and may be easier to remember), like
“B1gMac&frieS.” manager
pass
DON’T SHARE. Insist on each employee having their own login IDs
password
and passwords – never share!
root
sa
For more about password security, see these resources on the
PCI Council website: secret
65% of SMBs that have a password
policy do not strictly enforce it INFOGRAPHIC VIDEO sysadmin
It’s Time to Change Learn Password Security in 2 user
Ponemon Institute Your Password Minutes
Protect card data and only store what you need Ease
Risk Mitigation
It’s impossible to protect card data ASK AN EXPERT. Ask your payment terminal vendor, service ENCRYPTION PRIMER
if you don’t know where it is. provider, or merchant bank where (or if) your systems store data Cryptography uses a
and if you can simplify how you process payments. Also ask mathematical formula
What can you do? how to conduct specific transactions (for example, for recurring to render plaintext
unreadable to people
payments) without storing the card’s security code.
without special
knowledge (called a key).
OUTSOURCE. The best way to protect against data breaches
Cryptography is applied
is not to store card data at all. Consider outsourcing your to stored data as well as
card processing to a PCI DSS compliant service provider. See data transmitted over a
Resources on page 25 for lists of compliant service providers. network.
Another place to consider whether you are storing payment ENCRYPTION changes
IF YOU DON’T NEED CARD DATA, DON’T STORE IT. plaintext into cyphertext.
data is in emails. If you receive card details via email, you
can still process the transaction, but delete the email Securely destroy/shred card data you don’t need. If you need to
keep paper with sensitive card data, mark through the data with DECRYPTION changes
immediately and then let the sender know how you prefer
cyphertext back into
to receive cardholder data (and that email is not the best a thick, black marker until it is unreadable and secure the paper
plaintext.
way to send it). Do not simply reply using the original email in a locked drawer or safe that only a few people have access to.
from your customer. Instead delete the card details from For example:
the reply email, otherwise you are further exposing the card LIMIT RISK. Rather than accepting payment details via email, ask
data via storing the original email, the sent email, etc.
customers to provide it via phone, fax, or regular mail.
ENCRYPTION KEY
Tokenization has a similar goal to encryption but works
TOKENIZE OR ENCRYPT. Ask your merchant bank
differently. It substitutes card data with meaningless data
(a “token”) that has no value to a hacker. Merchants can if you REALLY need to store that card data. If you do,
use tokens to submit subsequent transactions, process a ask your merchant bank or service provider about
SEE DECRYPTION KEY
refund, etc. without needing to store the actual payment encryption or tokenization technologies that make PAGE 23
card details. The token is used by your payment processor card data useless even if stolen.
to look up the card details, which they store instead of you.
You use outside providers for KNOW WHO TO CALL. Who is your merchant bank? Who else COMMON VENDORS
payment-related services, devices and helps you process payments? Who did you buy your payment Refer to the table
applications. You may also have service device/software from and who installed it for you? Who are your in the Questions to ask your
providers that you share card data with, service providers? Vendors for more details
that support or manage your payment about these common
systems, or that you give access to card KEEP A LIST. Now that you know who to call, keep company and vendors:
data. You may call them processors, contact names, phone numbers, website addresses, and other • Payment terminal
vendors, third parties, or service contact details where you can easily find them in an emergency. vendors
providers. All of these impact your ability • Payment application
to protect your card data, so it’s critical CONFIRM THE SECURITY OF YOUR SERVICE PROVIDERS. vendors
you know who they are and what security Is your service provider adhering to PCI DSS requirements? For
e-commerce merchants, it is important that your payment service • Payment system installers
questions to ask them. (called Integrators/
provider is PCI DSS compliant too! See Resources on page 25 for Resellers)
lists of compliant service providers.
• Service providers that
ASK QUESTIONS. Once you know who your outside providers perform payment
processing, or
are and what they do for you, talk to them to understand how they
e-commerce hosting or
protect card data. Use Questions to ask your Vendors to help you processing
know what to ask.
• Service providers that
UNDERSTAND COMMON VENDORS. Review the sidebar to the help you meet PCI DSS
requirement(s) (for
right to understand common types of vendors or service providers
example, providing
you may work with. firewall or antivirus
services)
• Providers of Software as
a Service
Software can have flaws that are ASK your vendor or service provider how it notifies you of new
discovered after release, caused by security patches, and make sure you receive and read these
mistakes made by programmers when notices.
they wrote the code. These flaws are
also called security holes, bugs or WHICH VENDORS SEND YOU PATCHES? You may get patches
vulnerabilities. Hackers exploit these from vendors of your payment terminal, payment applications,
mistakes to break into your computer and other payment systems (tills, cash registers, PCs, etc.), operating
steal account data. Protect your systems systems (Android, Windows, iOS, etc.), application software
by applying vendor-supplied “patches” (including your web browser), and business software.
to fix coding errors. Timely installation of
security patches is crucial! MAKE SURE your vendors update your payment terminals,
operating systems, etc. so they can support the latest security
It is important that you know how your patches. Ask them.
software is being regularly updated
with patches and who is responsible E-COMMERCE MERCHANTS. Installing patches as soon as
(it could be you!). Also, some patches possible is very important for you too. Also look out for patches
install automatically when they become from your payment service provider. Ask your e-commerce hosting
available. If you’re not sure how patches provider whether they patch your system (and how often). Make
get added or who is responsible, make it sure they update the operating system, e-commerce platform and/
a point to ask your vendor/ supplier. or web application so it can support the latest patches.
Privilege abuse means a person using... ACCESS CONTROL IS ALL IMPORTANT. Set up your system to Consider giving
grant access only based on a “business need-to-know.” As the employees access to
Someone else’s information and details owner, you have access to everything. But most employees can take payments but not
to gain access to systems or data do their job with access only to a subset of data, applications, and
to process refunds, or
that person is not authorized to have to take new bookings/
functions. orders but not to
access to.
access payment card
LIMIT ACCESS to payment systems and unencrypted card data data related to existing
25% OF BREACHES INVOLVE
to only those employees that need access, and only to the data, booking/orders. Some
INTERNAL ACTORS.
applications and functions they need to do their jobs. employees should
have no access at all.
KEEP A LOG. Track all “behind the counter” visitors in your
establishment. Include name, reason for visit, and name of
25% employee that authorized visitor’s access. Keep the log for at least
a year.
MAKE USER IDS UNIQUE for each person with access to your
payment system whenever possible. This will help you keep track of
who logs in and when, and any changes they make.
HACKERS = THREATS FIND OUT. Ask your payment system vendor or service provider if If your vendor supports
they use remote access to support or access your business systems. or troubleshoots your
One of the easiest ways for hackers to payment system from
get into your system is through people ASK HOW TO LIMIT USE OF REMOTE ACCESS. Many remote their office (and not
you trust. You need to know how your access programs are always on, or always available by default, from your location)
vendors are accessing your system to meaning the vendor can access your systems remotely all the time they are using the
Internet and remote
make sure it’s not opening up any holes (this also means that hackers can access your systems too since access software to do
for hackers. many vendors use commonly-known passwords for remote access). this.
Reduce your risk – ask your vendor how to disable remote access
Examples of products
when not needed, and how to enable it when your vendor or
your vendor may install
service provider specifically requests it. on your terminal and
use to support you
DISABLE IT WHEN DONE. To protect your business, it’s important
remotely include VNC
that you take a part in managing how and when your vendors can & LogMeIn.
access your systems.
USE STRONG AUTHENTICATION. If you must allow remote
access, require multi-factor authentication and strong cryptography.
ENSURE SERVICE PROVIDERS USE UNIQUE CREDENTIALS. Each
one must use remote access credentials that are unique to your
Multi-factor authentication uses a username business and that are not the same ones used for other customers.
and password plus at least one other factor (like
a smart card, dongle*, or one-time passcode). ASK FOR HELP. Ask your vendor or service provider for
*a handy device that connects to a computer to allow help disabling remote access, or (if your vendor or service
access to wireless, software features, etc. provider needs remote access) for help setting up multi-factor
authentication. See Questions to ask your Vendors to help you
know exactly what to ask them.
Hackers write viruses and other malicious INSTALL ANTI-VIRUS SOFTWARE TO PROTECT YOUR PAYMENT
code to exploit software features and SYSTEM. It is easy to install and can be obtained from your local
coding mistakes, so they can break into office supply shop or IT retailer.
your systems and steal card data. Using
up-to-date anti-virus (also called anti- SET THE SOFTWARE TO “AUTOMATIC UPDATE” so you always
malware) software helps to protect your get the most recent protection available.
systems.
GET ADVICE. Ask your IT retailer about products they recommend
for anti-virus/anti-malware protection.
New vulnerabilities, security holes, GET ADVICE. Ask your merchant bank if they have partnerships
and bugs are being discovered daily. with any PCI Approved Scanning Vendors (ASVs). Ask your vendors
It’s vital to have your Internet-facing and service providers too.
systems tested regularly to identify these
new risks and address them as soon as TALK TO A PCI ASV. These vendors can help you with tools that
possible. Your Internet-facing systems automatically identify vulnerabilities and misconfigurations in your
(like many payment systems) are the Internet-facing payment systems, e-commerce website, and/or
most vulnerable because they can be networks and provide you with a report if, for example, you need to
easily exploited by criminals, allowing apply a patch. The PCI Council’s list (referenced to the left) can help
them to sneak into your systems. you find a scanning vendor.
A sure way to better protect your USE SECURE PAYMENT TERMINALS AND PIN ENTRY DEVICES. Your customers
business is to use secure payment The PCI Council approves payment terminals that protect PIN enter their personal
solutions and trained professionals to data. Make sure your payment terminal or device is on the List of identification
numbers (PINs) for
help you. Here’s how to choose safe PCI Approved PTS Devices for equipment that provides the best their payment cards
products and make sure they are set up security, and supports “EMV chip.” into your payment
securely. terminal or PIN entry
USE SECURE SOFTWARE. Make sure your payment software is on
device. It is important
the List of PCI Validated Payment Applications.
to use secure devices
USE QUALIFIED PROFESSIONALS. Make sure the person to protect your
installing your payment system does it correctly and securely. customers’ PIN data.
Choose from the List of PCI QIRs to help you. Ask your merchant
bank to help you make the selection.
USE SECURE E-COMMERCE PAYMENT SERVICE PROVIDERS.
If you don’t already, consider using a PCI DSS complaint service
provider to help you securely process your e-commerce payment
transactions, and/or to manage your e-commerce website.
LOOK FOR PCI DSS COMPLIANT SERVICE PROVIDERS. Make
sure your payment service provider is compliant with PCI DSS.
Check Mastercard’s and Visa’s lists to confirm that they are listed:
For PCI payment terminals and
secure card readers that encrypt
MasterCard’s List of Compliant Service Providers
card data, see page 23. Visa’s Global Registry of Service Providers
Visa Europe’s Registered Agents
REFER TO THIS LIST OF VENDOR QUESTIONS. Use Questions to
ask your Vendors to help you know what to ask your vendors and
service providers.
The Internet is the main highway used ISOLATE USAGE. Don’t use the device or system you take For simple tips on
by data thieves to attack and steal your payments with for anything else. For example, don’t surf the web configuring your
customers’ card data. For this reason, if or check emails or social media from the same device or computer firewall, see PCI
Firewall Basics
your business is on the Internet, anything that you use for payment transactions. When necessary for business
you use for card payments needs extra (for example, updating your business’s social media page), use
protection. another computer and not your payment device for these updates.
A firewall is equipment or software that PROTECT YOUR “VIRTUAL TERMINAL.” If you enter customer
sits between your payment system and payments via a virtual terminal (a web page you access with a
the Internet. It acts as a barrier to keep computer or a tablet), minimize your risk - don’t attach an external
traffic out of your network and systems card reader to it.
that you don’t want and didn’t authorize.
Firewalls are configured (in hardware, PROTECT WI-FI. If your shop offers free Wi-Fi for your customers,
software, or both) with specific criteria to make sure you use another network for your payment system (this is
block or prevent unauthorized access to called “network segmentation”). Ask your network installer for help
a network. Firewalls are often included with safely configuring Wi-Fi.
in the router “box” provided by your
Internet provider. USE A FIREWALL. A properly configured firewall acts as a buffer to
keep hackers and malicious software from getting access to your
payment systems, your e-commerce website, and/or your card
data. Check with your payment terminal vendor or service provider
to make sure you have one and ask them for help configuring it
correctly.
Your data is vulnerable when it travels to WORK WITH YOUR PAYMENT SYSTEMS VENDOR OR SERVICE PCI-approved secure
your merchant bank, and when it’s kept PROVIDER. You should encrypt all card data you store or send. card readers and
or stored on your computers and devices. Make sure your payment system is using encryption and/or payment terminals that
encrypt card data do
The best way to keep it safe is to make it tokenization technology. If you are not sure, ask them. it using technology
useless even if it’s stolen by encrypting called “Secure
it whenever you store it or send it, and USE PCI DEVICES THAT ENCRYPT CARD DATA. The Reading and Exchange
removing it altogether when it’s not PCI Council approves payment terminals that protect of Data (SRED)” - ask
needed. While this can be more complex PIN data and payment terminals and “secure card your vendor if your
SEE
to put in place, in the long run, it can readers” that additionally encrypt card data. See the List payment terminal
PAGE 21 encrypts card data
make security much easier to manage. of PCI Approved PTS Devices.
with SRED.
USE SECURE PCI ENCRYPTION SOLUTIONS. Ask whether your E-commerce websites
payment terminal encryption is done via a Point-to-Point Encryption must encrypt card data
solution and is on the PCI Council’s List of PCI P2PE Validated that is sent over the
Solutions. Internet, for example,
using something
ARE YOU A MERCHANT NOW MOVING TO EMV CHIP called transport-layer
security (TLS). Ask your
TERMINALS? This is a great opportunity to make an investment in a
service provider how
terminal that supports EMV and also provides the added security of they encrypt your card
encryption and tokenization. data.
PCI Data Security Essentials for Small Merchants and Related Guidance
Resource URL
Common Payment Systems https://www.pcisecuritystandards.org/pdfs/Small_Merchant_Common_Payment_Systems.pdf
Small Merchant Questions for Vendors https://www.pcisecuritystandards.org/pdfs/Small_Merchant_Questions_To_Ask_Your_Vendors.pdf
Small Merchant Glossary https://www.pcisecuritystandards.org/pdfs/Small_Merchant_Glossary_of_Payment_and_Information_Security_
Terms.pdf
Infographic: PCI Firewall Basics https://www.pcisecuritystandards.org/pdfs/Small-Merchant-Firewall-Basics.pdf
Evaluation Tool: Acquirer Overview https://www.pcisecuritystandards.org/pdfs/PCI-DSE-Overview-for-Acquirers.pdf
Evaluation Tool: Small Merchant Overview https://www.pcisecuritystandards.org/pdfs/PCI-DSE-Overview-for-Small-Merchants.pdf
Dept for Culture Media and Sport – Cyber security breaches survey 2017
Ponemon Institute – 2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)
(Sponsored by Keeper Security), June 2016
National Cyber Security Centre – Cyber Security Small Business Guide, 2017
Beaming UK – Cyber security breaches cost British Businesses almost £30 billion in 2016, March 2017
The PCI Security Standards Council is a global forum for the industry to come together to PCI SSC FOUNDERS
develop, enhance, disseminate and assist with the understanding of security standards
for payment account security. Read more about PCI SSC’s Global Payment Security
Engagement Initiative at www.pcisecuritystandards.org/pdfs/PCI_SSC_Partnering_for_
Global_Payment_Security.pdf
The Council maintains, evolves, and promotes the Payment Card Industry Security
Standards. It also provides critical tools needed for implementation of the standards such
as assessment and scanning qualifications, self-assessment questionnaires, training and
education, and product certification programs.
The Council’s founding members, American Express, Discover Financial Services, JCB
International, MasterCard, and Visa Inc., have agreed to incorporate the PCI Data Security
Standard (PCI DSS) as part of the technical requirements for each of their data security
compliance programs. Each founding member also recognizes the Qualified Security
Assessors and Approved Scanning Vendors qualified by the PCI Security Standards
Council.
All five payment brands, along with Strategic Members, share equally in the Council’s
governance, have equal input into the PCI Security Standards Council and share
responsibility for carrying out the work of the organization. Other industry stakeholders
are encouraged to join the Council as Strategic or Affiliate members and Participating
Organizations to review proposed additions or modifications to the standards. Participating PARTICIPATING
Organizations may include merchants, banks, processors, hardware and software ORGANIZATIONS
developers, and point-of-sale vendors. Merchants, Banks, Processors,
Hardware and Software Developers
This Guide provides supplemental information that does not replace or supersede and Point-of-Sale Vendors
PCI SSC Security Standards or their supporting documents.