Risk
11/5/2012
03:17 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Survey: Half Of Small Biz Not Familiar With PCI Compliance

New research from ControlScan and Merchant Warehouse underscores need to better educate and support Level 4 merchants' PCI compliance efforts

ATLANTA and BOSTON, Nov. 1, 2012 - The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the Payment Card Industry Data Security Standard (PCI DSS), a newly released research report reveals. The report, "A Tale of Two Merchants: The Fourth Annual Survey of Level 4 Merchant PCI Compliance Trends," is co-sponsored by ControlScan and Merchant Warehouse to continue the annual study of Level 4 merchants' progression in understanding, achieving and maintaining PCI compliance.

The 2012 study uncovers a stubborn, multi-year trend of minimal growth in data security awareness and overall indifference in small merchants' perceived risk of breach. For brick-and-mortar merchants the trend is even more disturbing, because their levels of awareness and concern fall well below those of the survey's ecommerce merchant respondents.

"Just under half of this year's respondents indicated they are unaware of the PCI DSS," said Joan Herbig, CEO of ControlScan. "That finding, combined with the fact that 79% of respondents think their business has little-to-no risk of breach, indicates a serious disconnect between Level 4 merchants and the ISOs and acquiring banks serving them."

More than 600 merchants responded to this year's survey, providing continuing insight into their perceptions and attitudes toward PCI compliance and data security best practices. Overall, most respondents familiar with the PCI DSS rank security as "medium" or "high" among their organization's overall priorities; however, only 50% have actually validated their PCI compliance. Ecommerce merchant respondents are above the average at a 70% completion rate, while brick-and-mortar merchants are below the average at 45%. When all 603 survey respondents are included in the calculation, the overall PCI compliance rate for these Level 4 merchants drops to 30%.

"The four years' worth of data now in place show that Level 4 merchants have an urgent need for education and hands-on support to effectively protect their businesses from data thieves," said David McSweeney, Executive Vice President, Operations, Merchant Warehouse. "Small merchants require more personalized outreach and scalable solutions that make sense and are affordable for their business."

The survey research report discusses the concerns raised by the ongoing complacency of Level 4 merchants in general, as well as the security risks Level 4 brick-and-mortar merchants face if the awareness-and-action gap persists between them and their ecommerce counterparts. ISOs and acquirers will benefit from the report's insights and merchant commentary, as well as the practical action steps ControlScan and Merchant Warehouse recommend.

To access a copy of the survey research report, please click on the following link: https://www.controlscan.com/whitepapers/merchant_study_2012.php.

ControlScan and Merchant Warehouse are hosting a joint Webinar to be held on November 15, 2012 to present the study's findings. Click here for more information and to register.

###

About the Survey

The ControlScan/Merchant Warehouse Fourth Annual Level 4 Merchant Survey was completed in August 2012 by 603 Level 4 merchants who represent a mix of ecommerce, retail stores and mail order/telephone order businesses.

About PCI Compliance and Security Provider, ControlScan

Headquartered in Atlanta, Georgia, ControlScan is an expert provider of Payment Card Industry (PCI) Compliance and Security services designed to meet the unique needs of small to mid-sized merchants and the acquirers that serve them. The company's flexible solutions, easy-to-use online tools and personalized support significantly simplify PCI and security for its clients. In addition, as an Approved Scanning Vendor and a Qualified Security Assessor, ControlScan is positioned to help merchants meet compliance requirements and maintain secure business environments for their customers. For more information about ControlScan and its cloud-based solutions visit www.controlscan.com or call

1-800-825-3301.

About Merchant Warehouse

Merchant Warehouse is a recognized leader in payment and program acceptance solutions and merchant services. The company enables merchants, agents, POS developers and VARs to achieve strategic business advantage through the delivery of current and emerging payment, offer and program solutions and merchant services that dramatically enhance the merchant-customer experience. Merchant Warehouse is one of the fastest growing innovators of payment solutions in North America. For more information about Merchant Warehouse, please visit merchantwarehouse.com or follow the company on Twitter @MWarehouse.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio