Blog

Category: Online Data Security

September 20, 2017

Calling In A “Code 10”

code 10

Do you know what a “Code 10” is?  This is perhaps the most underutilized tool for fraud prevention.  You’ve probably taken a phone order before and felt like something just wasn’t quite right.  Or, maybe you are retail merchant and the customer was standing right in front of you.  If it doesn’t feel right, it is considered a “Code 10” or suspicious transaction.  Using a code word allows you to call a special merchant hotline right in front of the customer without alerting the customer to the purpose of your call. What Is A Code 10 Authorization Request? A merchant...Read more


January 12, 2016

Protecting Your Small Business from a Cyber attack

In light of all the major corporations hit by cyber attacks over the past year, there is a misconception that small businesses are out of harm’s way. In reality, small and medium companies are at just as big a risk. The only real difference is that big corporations generate more headline news. According to a 2013 threat report, roughly 31 percent of all targeted attacks were actually aimed at companies with 250 or fewer employees, not giant corporations.   Because of the financial impact of a cyber attack, 60 percent of small businesses in the US have gone out of...Read more


December 7, 2015

How Does Tokenization Work?

To understand how tokenization works, it is important to understand what it is. In simple terms, tokenization when applied to data security is a process in which a sensitive data element is substituted with something non-sensitive known as a “token.” This unique identification symbol retains all of the data’s essential information, but without compromising security. Because tokenization minimizes the amount of data that your business needs to maintain, it has become increasingly more popular for boosting security of e-commerce and credit card transactions while minimizing costs, as well as the compliance complexity associated with government regulations and industry standards. The...Read more


August 26, 2015

The Most Common PCI Compliance Myths You Probably Still Believe

When you own and operate a small business, the last thing you want to spend your time on is understanding all the tiny details about EMV® systems and PCI compliance (Payment Card Industry) regulations. The thing is, the industry of credit card authorization and payment processing systems really wouldn’t be so complicated — if only everyone knew fact from fiction and was confident in their check guarantee companies and credit card merchant processing services! To help you out just a little bit more, here are some of the basic myths surrounding PCI compliance rules, so that you can make better...Read more


July 22, 2015

Are PCI security breaches actually problematic for small businesses?

One of the biggest misconceptions today is that a fatal security breach will only happen to big-name companies; in truth, cyberhackers target businesses of all sizes. In 2013, 60% of businesses and organizations in the U.S. were exposed to payment fraud and they pay, on average, about $580.5 million in debit card losses per year. Approximately 42% of American consumers have experienced credit card fraud at least once in the past five years, and the median amount of money stolen in one fraudulent purchase is nearly $400. How long does it take to meet PCI standards? With the right credit...Read more


July 22, 2015

5 Important Factors to Consider When Choosing a Credit Card Processor

For a company to survive and thrive, leadership has some very specific responsibilities. This includes saving money, handling accounts receivable, and reducing company debt and Days Sales Outstanding (DSO). As means of reducing DSO while boosting cash flow, a lot of companies now accept electronic payments. Top Considerations Common online payment types include credit cards, debit cards, and eChecks (ACH payments). When making the decision to accept online payments or change providers if a credit card processor is currently used, some very important features should be included. Security – In addition to convenient payment technology, companies have to be even more...Read more


July 17, 2015

A Basic Guide To PCI Compliance for Small Business Owners

PCI compliance is one of the most important details factoring into a successful business today, but it’s also one of the most complicated topics for the majority of business owners. Before you can be sure that you’re looking at the right credit card merchant processing services, it’s important to understand the basics of credit card authorization and settlement services, and the requirements set by the Payment Card Industry Data Security Standard (PCI DSS). What is PCI compliance? This refers to a system of requirements that have been designed to protect companies that process, store, and transmit credit card information when...Read more


June 10, 2015

Online Data Security Tips: 3 Ways to Protect Your Financial Information Online

In today’s age, you can never be too careful with your information. That goes not only for shoppers, but also for merchants. In the past year, hackers breached credit card processing systems at major retailers including Target and Home Depot, accessing sensitive customer data. Online identity theft can jeopardize a person’s credit and many cases are never fully resolved. When it comes to financial information and the internet, prevention is the best cure. Here are 3 ways to safeguard your financial data: Watch Out for Wireless Networks It may seem convenient to get your banking done at an airport, coffee...Read more

Recent Posts