Risk
11/5/2012
03:17 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Survey: Half Of Small Biz Not Familiar With PCI Compliance

New research from ControlScan and Merchant Warehouse underscores need to better educate and support Level 4 merchants' PCI compliance efforts

ATLANTA and BOSTON, Nov. 1, 2012 - The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the Payment Card Industry Data Security Standard (PCI DSS), a newly released research report reveals. The report, "A Tale of Two Merchants: The Fourth Annual Survey of Level 4 Merchant PCI Compliance Trends," is co-sponsored by ControlScan and Merchant Warehouse to continue the annual study of Level 4 merchants' progression in understanding, achieving and maintaining PCI compliance.

The 2012 study uncovers a stubborn, multi-year trend of minimal growth in data security awareness and overall indifference in small merchants' perceived risk of breach. For brick-and-mortar merchants the trend is even more disturbing, because their levels of awareness and concern fall well below those of the survey's ecommerce merchant respondents.

"Just under half of this year's respondents indicated they are unaware of the PCI DSS," said Joan Herbig, CEO of ControlScan. "That finding, combined with the fact that 79% of respondents think their business has little-to-no risk of breach, indicates a serious disconnect between Level 4 merchants and the ISOs and acquiring banks serving them."

More than 600 merchants responded to this year's survey, providing continuing insight into their perceptions and attitudes toward PCI compliance and data security best practices. Overall, most respondents familiar with the PCI DSS rank security as "medium" or "high" among their organization's overall priorities; however, only 50% have actually validated their PCI compliance. Ecommerce merchant respondents are above the average at a 70% completion rate, while brick-and-mortar merchants are below the average at 45%. When all 603 survey respondents are included in the calculation, the overall PCI compliance rate for these Level 4 merchants drops to 30%.

"The four years' worth of data now in place show that Level 4 merchants have an urgent need for education and hands-on support to effectively protect their businesses from data thieves," said David McSweeney, Executive Vice President, Operations, Merchant Warehouse. "Small merchants require more personalized outreach and scalable solutions that make sense and are affordable for their business."

The survey research report discusses the concerns raised by the ongoing complacency of Level 4 merchants in general, as well as the security risks Level 4 brick-and-mortar merchants face if the awareness-and-action gap persists between them and their ecommerce counterparts. ISOs and acquirers will benefit from the report's insights and merchant commentary, as well as the practical action steps ControlScan and Merchant Warehouse recommend.

To access a copy of the survey research report, please click on the following link: https://www.controlscan.com/whitepapers/merchant_study_2012.php.

ControlScan and Merchant Warehouse are hosting a joint Webinar to be held on November 15, 2012 to present the study's findings. Click here for more information and to register.

###

About the Survey

The ControlScan/Merchant Warehouse Fourth Annual Level 4 Merchant Survey was completed in August 2012 by 603 Level 4 merchants who represent a mix of ecommerce, retail stores and mail order/telephone order businesses.

About PCI Compliance and Security Provider, ControlScan

Headquartered in Atlanta, Georgia, ControlScan is an expert provider of Payment Card Industry (PCI) Compliance and Security services designed to meet the unique needs of small to mid-sized merchants and the acquirers that serve them. The company's flexible solutions, easy-to-use online tools and personalized support significantly simplify PCI and security for its clients. In addition, as an Approved Scanning Vendor and a Qualified Security Assessor, ControlScan is positioned to help merchants meet compliance requirements and maintain secure business environments for their customers. For more information about ControlScan and its cloud-based solutions visit www.controlscan.com or call

1-800-825-3301.

About Merchant Warehouse

Merchant Warehouse is a recognized leader in payment and program acceptance solutions and merchant services. The company enables merchants, agents, POS developers and VARs to achieve strategic business advantage through the delivery of current and emerging payment, offer and program solutions and merchant services that dramatically enhance the merchant-customer experience. Merchant Warehouse is one of the fastest growing innovators of payment solutions in North America. For more information about Merchant Warehouse, please visit merchantwarehouse.com or follow the company on Twitter @MWarehouse.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.