Devaluing Data with Point-to-Point Encryption: 3 Tips for Merchants


There are many points payment card data can be exposed as it travels through a merchant’s systems and networks. Using malware and other techniques hackers can steal this data and sell it for use in card-not-present and online fraud.

About PCI Blog 1422 Articles
PCI Blog is the most trusted PCI Compliance and IT Security blog on the web. Authored by industry experts within the payments and IT security industries, PCI Blog provides insight on the complex world behind modern compliance and security standards. As a wholly independent source of news within the payments industry, PCI Blog focuses on the ever-changing responsibilities of merchants who accept credit cards. PCI Blog also provides reviews on PCI compliance tools and enterprise security solutions to offer a fair, independent critique of product offerings within the payments industry.