Risk

3/14/2018
01:05 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

PCI SSC Announces Changes to Qualified Integrators and Resellers Program

The changes are designed to improve payment data security and reduce merchants' risk.

WAKEFIELDMass., 14 March 2018 — Today the PCI Security Standards Council (PCI SSC) announced new changes to the PCI Qualified Integrators and Resellers (QIR) Program in response to industry feedback and data breach report findings. The program changes are designed to increase the number of QIRs and equip them to help merchants reduce risk by mitigating the leading causes of payment data breaches.

The PCI SSC QIR program offers specialized data security training and certification to individuals that install, configure and/or support payment systems. PCI SSC maintains a listing of PCI QIRs on its website for merchants to use in identifying and selecting trusted partners. Since the program was established in 2012, breach reports highlight that smaller merchants are increasingly under attack, and that the majority of merchant payment data breaches could be prevented by addressing three critical issues: insecure remote access, weak password practices and outdated and unpatched software.

“Based on industry feedback and data breach reports, we are evolving the QIR program to make it more accessible to integrators and resellers and to address the specific risk areas that are leading to the majority of merchant payment data breaches,” said PCI SSC Chief Operating Officer Mauro Lance. “The changes are designed to increase the number of trained integrators and resellers available to merchants, and to ensure that these integrators and resellers are trained specifically on how to thwart the three most common causes of data breaches.”

The updated QIR program will introduce new training course content on how to address insecure remote access, weak password practices and outdated and unpatched software during payment system installation. Additional changes are designed to make it easier for smaller integrators and resellers to become QIRs in order to increase the program’s reach to small businesses. These include reducing the cost of the program to $100 USD per person, making the QIR certification an individual certification, rather than a company one, and simplifying the QIR implementation statement.

“We are very pleased with the changes that the PCI SSC is making to the QIR program. The revised program will lead to more integrators and resellers being able to help merchants significantly reduce their payment security risk,” said John Kirk President and CEO of the Retail Solutions Providers Association (RSPA). “So many breaches are caused by entirely preventable attacks. With greater access to training, the PCI SSC is empowering smaller integrators and resellers to join the program which will greatly benefit the merchant community. We applaud the PCI SSC for listening to our industry and acting on our feedback.”

Interested applicants can register for the QIR program here. Merchants looking to hire a QIR can search the listing here. Learn more about the changes to the program by reading the PCI Perspectives blog post Q&A and QIR Program Changes FAQ.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
4 Ways to Fight the Email Security Threat
Asaf Cidon, Vice President, Content Security Services, at Barracuda Networks,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.