NATIONAL
TRANSACTION
CORPORATION
PCI Compliance
Data Security and
CyberSecurity
Presented by Mark Fravel
Founder and CEO
of National Transaction Corp
2018 ASTA Global Convention
Washington DC
A little about me: (Time to Brag)
I am a proven executive with a complete understanding of the back office operations in the Electronic
Payment Processing Business Including Credit , Underwriting, Loss Prevention ,Data Security, and
Customer Service. I have Managed a portfolio with over 100,0000 merchants contributing 1000 new sales
per month and a Consistent record of high achievements including several top ten finishes .
CEO and Founder: National Transaction.com January 1997 - Present
Electronic Payment Service Provider processing for travel, mail order, e-commerce, and mobile
environments. Provider of loans, currency conversion, electronic check, gift cards and more. NTC is
supported by ASTA, as well as several other Travel Associations. We are the electronic payment experts
in the Travel industry and support all aspects of travel including Travel Agencies, Tour Operators, Airlines,
and Hotels. NationalTransaction.Com provides the service after the sale, and that service sets NTC apart.
VP First Data at First Data Corporation 1991 - 1997
General Manager of the FDC / Barnett Bank Alliance
I was responsible for blending the CES,Nabanco, Harbridge Merchant services, and Barnett Bank sales
teams under one umbrella .That team was responsible for submitting approximately 1000 new accounts
per month and a portfolio with over 100,000 live merchants in the state of Florida.
Honors and Awards:
An Elected Member, to the Elavon MSP Advisory Committee
1994 # 2 V P, First Data / CES. 1995 # 1 V P, First Data / CES . 1996 # 2 V P, First Data. 2000 # 9 MSP
Nova Information Systems 2001 # 7 MSP Nova Information Systems 2002 # 2 MSP Nova Information
Systems 2006 # 3 MSP Nova Information Systems.
Mark Fravel
CEO at NationalTransaction.com
mark.fravel@nationaltransaction.com
AT A GLANCE
PCI DSS MYTHS
Ten Common Myths of PCI DSS
The Payment Card Industry Data Security Standard (PCI DSS) secures cardholder data that is
stored, processed or transmitted by merchants and processors. PCI DSS specifies 12
requirements entailing many security technologies and business processes, and reflects most of
the usual best practices for securing sensitive information. The resulting scope is comprehensive
and may seem daunting especially for smaller merchants who have no existing security
processes or IT professionals who help guide them through what is required and what is not. To
complicate matters, some vendors who sell security products or services market their products in
a broader context than just the PCI DSS requirements. As a result, retailers who are new to
security may harbor myths about the PCI DSS.
The PCI Security Standards Council presents ten common myths about PCI DSS to help your
business optimize protection of cardholder data and ensure compliance with the standard.
Goals of PCI DSS
Build and maintain a secure network
Protect cardholder data
Maintain a vulnerability management program
Implement strong access control measures
Regularly monitor and test networks
Maintain an information security policy
Myth 1
One vendor and product will make us compliant
Many vendors offer an array of software and services for PCI compliance. No single vendor or product, however, fully addresses all 12
requirements of PCI DSS. When marketing focuses on one product’s capabilities and excludes positioning these with other requirements of PCI
DSS, the resulting perception of a “silver bullet” might lead some to believe that the point product provides compliance,” when it’s really
implementing just one or a few pieces of the standard.
The PCI Security Standards Council urges merchants and processors to avoid focusing on point products for PCI security and compliance.
Instead of relying on a single product or vendor, you should implement a holistic security strategy that focuses on the “big picture” related to the
intent of PCI DSS requirements.
Myth 2
Outsourcing card processing makes us compliant
Outsourcing simplifies payment card processing but does not provide automatic compliance. Don’t forget to
address policies and procedures for cardholder transactions and data processing. Your business must protect
cardholder data when you receive it, and process charge backs and refunds. You must also ensure that providers’
applications and card payment terminals comply with respective PCI standards and do not store sensitive
cardholder data. You should request a certificate of compliance annually from providers.
Myth 3
PCI compliance is an IT project
The IT staff implements technical and operational aspects of PCI-related systems, but compliance to the
payment brand’s programs is much more than a “projectwith a beginning and end it’s an ongoing process
of assessment, remediation and reporting. PCI compliance is a business issue that is best addressed by a
multi-disciplinary team. The risks of compromise are financial and reputational, so they affect the whole
organization. Be sure your business addresses policies and procedures as they apply to the entire card
payment acceptance and processing workflow.
My 4
PCI will make us secure
Successful completion of a system scan or assesssment for PCI is but a snapshot in time. Security exploits
are non-stop and get stronger every day, which is why PCI compliance efforts must be a continuous process
of assessment and remediation to ensure safety of cardholder data.
Myth 5
PCI is unreasonable; it requires too much
Most aspects of the PCI DSS are already a common best practice for security. The standard also permits the option
using compensating controls to meet some requirements. The standard provides significant detail, which benefits
merchants and processors by not leaving them to wonder, “Where do I go from here?” This scope and flexibility leads
some to view PCI DSS as an effective standard for securing all sensitive information.
Myth 6
PCI requires us to hire a Qualified Security Assessor
Because most large merchants have complex IT environments, many hire a QSA to glean their specialized value for
on-site security assessments required by PCI DSS. The QSA also makes it easier to develop and get approval for a
compensating control. However, PCI DSS provides the option of doing an internal assessment with an officer sign-off if
your acquirer and/or merchant bank agrees. Mid-sized and smaller merchants may use the Self-Assessment
Questionnaire found on the PCI SSC Web site to assess themselves.
Myth 7
We don’t take enough credit cards to be compliant
PCI compliance is required for any business that accepts payment cards even if the quantity of transactions is just one.
Myth 8
We completed a SAQ so we’re compliant
Technically, this is true for merchants who are not required to do on-site assessments for PCI DSS compliance for that
particular moment in time when the Self-Assessment Questionnaire and associated vulnerability scan (if applicable) is
completed. After that moment, only a post- breach forensic analysis can prove PCI compliance. But a bad system change
can make you non-compliant in an instant. True security of cardholder data requires non-stop assessment and
remediation to ensure that likelihood of a breach is kept as low as possible.
Myth 9
PCI makes us store cardholder data
Both PCI DSS and the payment card brands strongly discourage storage of cardholder data by merchants and
processors. There is no need, nor is it allowed, to store data from the magnetic stripe on the back of a payment card. If
merchants or processors have a business reason to store front-card information, such as name and account number, PCI
DSS requires this data to be encrypted or made otherwise unreadable.
Myth 10
PCI is too hard
Understanding and implementing the 12 requirements of PCI DSS can seem daunting, especially for merchants without
security or a large IT department. However, PCI DSS mostly calls for good, basic security. Even if there was no requirement
for PCI compliance, the best practices for security contained in the standard are steps that every business would want to
take anyway to protect sensitive data and continuity of operations. There are many products and services available to help
meet the requirements for security and PCI compliance.
When people say PCI is too hard, many really mean to say compliance is not cheap. The business risks and ultimate costs of
non-compliance, however, can vastly exceed implementing PCI DSS such as fines, legal fees, decreases in stock equity, and
especially lost business.
Implementing PCI DSS should be part of a sound, basic enterprise security strategy, which requires making this activity part
of your ongoing business plan and budget.
PCI aT-a-GlanCe
(visit www.pcisecuritystandards.org for more information)
Overview
Getting Started with PCI DSS 10 Common Myths of PCI DSS
Data Security Do’s and Don’ts Getting Started with Pa-DSS
Getting Started with PCI PeD
© 2008 PCI Security Standards Council LLC. The intent of this document is to provide supplemental information,
which does not replace or supersede PCI SSC Security Standards or their supporting documents.
6/08
Courtesy of Elavon US
Good Cyber Security Practice
PCI DSS
What is it and who does it apply to
PCI Security Standards are technical and operational requirements set by the PCI Security
Standards Council (SSC) to protect cardholder data
The PCI SSC was formed by Visa, Mastercard, Discover, JCB and American Express
The PCI Data Security Standard (PCI DSS) provides the minimum baseline requirements for
protecting Cardholder Data and Sensitive Authentication Data.
PCI DSS applies:
To all entities involved in payment card processing e.g. merchants, processors, acquirers, issuers, and service
providers.
To all other entities that store, process or transmit (or could impact the security of) cardholder data and/or
sensitive authentication data
PCI DSS
Top 9 Common PCI control failures
Analysis of compromises has shown that common security weaknesses which are addressed by PCI DSS
controls are often exploited because the controls were not in place or poorly implemented.
Storage of SAD.
Inadequate access
controls.
Unnecessary and
insecure services.
Default system
settings and
passwords.
Poorly coded web
apps.
Missing and outdated
security patches.
Lack of logging.
Lack of monitoring.
Poor scoping
decisions i.e.
excluding from scope.
Source: PCI SAQ instructions & Guidelines v 3.2
An analysis of bad practice within a UK travel agency
PCI PTS Version 1.0 devices were still in use and should’ve been replaced by the latest PTS version
SSL and early TLS still in use
Receipts showing the full PAN
Storage of the above receipts for longer than necessary and secured inappropriately
Chargeback letters containing the full Primary Account Number (PAN)
Electronic scans of chargeback letters containing the full PAN
Call recordings containing Sensitive Authentication Data (SAD) after authorization
Manual pause and resume was not 100% effective
Card details were sometimes written down
Little control over what remote workers were doing when taking telephone payments
Type of Data Compromised by Industry (Travel section)
Source: 2017 Trustwave Global Security Report
Protecting Your Business
Basic PCI DSS Good Practice
Use strong passwords change regularly and make them hard to guess
Protect card and personal data and only store what you need. If you must store it, protect it!
Inspect payment terminals for tampering, has a skimmer been plugged in to it?
Install software patches from vendors in a timely manner
Don’t give the bad guys easy access to your systems, change vendor defaults
Use anti-virus software keep it up to date and scan regularly
Regularly scan for vulnerabilities across your networks and fix them. Seek advice from an ASV
Make data useless to the bad guys be encrypting it or tokenizing it
Protect in house access to your data, allow access to only those that need-to-know
Use secure payment terminals and solutions installed by PCI QIRs
Protect your business from the internet, use firewalls and security devices, limit remote access
Use trusted business partners (service providers) and know how to contact them
Check service provider status:
MasterCards List of Compliant Service Providers
Visa’s Global Registry of Service Providers
Visa Europe’s Registered Member Agents
Basic Cybersecurity Good Practice
Take regular backups - test that that they can be restored and keep them off site/cloud
Prevent malware damage use anti-virus software, patch software and hardware regularly, prevent access to
removable media and use a firewall
Make sure all devices (laptops, tablets etc.) are password protected, use two factor authentication or password
managers so that users don’t write them down
Keep devices safe – configure them so if they are lost or stolen they can be tracked, don’t send sensitive data
when connected to public wifi and keep devices up to date with vendor patches, replacing those which are no
longer supported
Avoid phishing attacks train staff to check for poor spelling and grammar, blurry logos and to check the domain an
email has come from and not to follow links or browse to websites from and account with admin privileges.
www.iata.org/
www.pcisecuritystandards.org/
www.dhs.gov/publication/cyber-security-division
www.us-cert.gov
www.ncsc.gov.uk/smallbusiness
www.cyberaware.gov.uk
www.getsafeonline.org
www.cyberessentials.ncsc.gov.uk
Useful resources
National Transaction Corp was Founded 1997
Registered with US Bank Minneapolis, MN
Mark Fravel, owner of NTC has over 25 years of Bankcard History
Formerly VP of First Data, and General Manager of the Barnett Bank Alliance
Hours of Operation for NTC are M-F / 9-5 EST providing you with Live Customer Service Support
and with automatic phone forwarding to Elavon after hours for 24/7 support
Redundant Internet and Phone Systems with multiple Hardware, Software, and Siptrunk
connections.
Copper and Fiber circuits @ both facilities to provide redundancy, and Generators that are capable
of running all critical systems in the event of Hurricanes, or extended power outages
NTC Underwriting, Credit Operations, and Customer Service guidelines follows Elavon's/ US Bank’s
criteria
Who We Are:
Connect with us today
http://ntctravel.net
www.nationaltransaction.com
www.ntcepay.com
https://www.facebook.com/NationalTransaction
https://twitter.com/nattrans
https://www.linkedin.com/in/markfravel


© 2021