01:05 PM
Dark Reading
Dark Reading
Products and Releases

PCI SSC Announces Changes to Qualified Integrators and Resellers Program

The changes are designed to improve payment data security and reduce merchants' risk.

WAKEFIELDMass., 14 March 2018 — Today the PCI Security Standards Council (PCI SSC) announced new changes to the PCI Qualified Integrators and Resellers (QIR) Program in response to industry feedback and data breach report findings. The program changes are designed to increase the number of QIRs and equip them to help merchants reduce risk by mitigating the leading causes of payment data breaches.

The PCI SSC QIR program offers specialized data security training and certification to individuals that install, configure and/or support payment systems. PCI SSC maintains a listing of PCI QIRs on its website for merchants to use in identifying and selecting trusted partners. Since the program was established in 2012, breach reports highlight that smaller merchants are increasingly under attack, and that the majority of merchant payment data breaches could be prevented by addressing three critical issues: insecure remote access, weak password practices and outdated and unpatched software.

“Based on industry feedback and data breach reports, we are evolving the QIR program to make it more accessible to integrators and resellers and to address the specific risk areas that are leading to the majority of merchant payment data breaches,” said PCI SSC Chief Operating Officer Mauro Lance. “The changes are designed to increase the number of trained integrators and resellers available to merchants, and to ensure that these integrators and resellers are trained specifically on how to thwart the three most common causes of data breaches.”

The updated QIR program will introduce new training course content on how to address insecure remote access, weak password practices and outdated and unpatched software during payment system installation. Additional changes are designed to make it easier for smaller integrators and resellers to become QIRs in order to increase the program’s reach to small businesses. These include reducing the cost of the program to $100 USD per person, making the QIR certification an individual certification, rather than a company one, and simplifying the QIR implementation statement.

“We are very pleased with the changes that the PCI SSC is making to the QIR program. The revised program will lead to more integrators and resellers being able to help merchants significantly reduce their payment security risk,” said John Kirk President and CEO of the Retail Solutions Providers Association (RSPA). “So many breaches are caused by entirely preventable attacks. With greater access to training, the PCI SSC is empowering smaller integrators and resellers to join the program which will greatly benefit the merchant community. We applaud the PCI SSC for listening to our industry and acting on our feedback.”

Interested applicants can register for the QIR program here. Merchants looking to hire a QIR can search the listing here. Learn more about the changes to the program by reading the PCI Perspectives blog post Q&A and QIR Program Changes FAQ.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
The Case for Integrating Physical Security & Cybersecurity
Paul Kurtz, CEO & Cofounder, TruSTAR Technology,  3/20/2018
A Look at Cybercrime's Banal Nature
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/20/2018
City of Atlanta Hit with Ransomware Attack
Dark Reading Staff 3/23/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.