Risk
11/5/2012
03:17 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Survey: Half Of Small Biz Not Familiar With PCI Compliance

New research from ControlScan and Merchant Warehouse underscores need to better educate and support Level 4 merchants' PCI compliance efforts

ATLANTA and BOSTON, Nov. 1, 2012 - The last four years have been marked by continued growth in small business data compromise, yet small business owners are still missing the point of the Payment Card Industry Data Security Standard (PCI DSS), a newly released research report reveals. The report, "A Tale of Two Merchants: The Fourth Annual Survey of Level 4 Merchant PCI Compliance Trends," is co-sponsored by ControlScan and Merchant Warehouse to continue the annual study of Level 4 merchants' progression in understanding, achieving and maintaining PCI compliance.

The 2012 study uncovers a stubborn, multi-year trend of minimal growth in data security awareness and overall indifference in small merchants' perceived risk of breach. For brick-and-mortar merchants the trend is even more disturbing, because their levels of awareness and concern fall well below those of the survey's ecommerce merchant respondents.

"Just under half of this year's respondents indicated they are unaware of the PCI DSS," said Joan Herbig, CEO of ControlScan. "That finding, combined with the fact that 79% of respondents think their business has little-to-no risk of breach, indicates a serious disconnect between Level 4 merchants and the ISOs and acquiring banks serving them."

More than 600 merchants responded to this year's survey, providing continuing insight into their perceptions and attitudes toward PCI compliance and data security best practices. Overall, most respondents familiar with the PCI DSS rank security as "medium" or "high" among their organization's overall priorities; however, only 50% have actually validated their PCI compliance. Ecommerce merchant respondents are above the average at a 70% completion rate, while brick-and-mortar merchants are below the average at 45%. When all 603 survey respondents are included in the calculation, the overall PCI compliance rate for these Level 4 merchants drops to 30%.

"The four years' worth of data now in place show that Level 4 merchants have an urgent need for education and hands-on support to effectively protect their businesses from data thieves," said David McSweeney, Executive Vice President, Operations, Merchant Warehouse. "Small merchants require more personalized outreach and scalable solutions that make sense and are affordable for their business."

The survey research report discusses the concerns raised by the ongoing complacency of Level 4 merchants in general, as well as the security risks Level 4 brick-and-mortar merchants face if the awareness-and-action gap persists between them and their ecommerce counterparts. ISOs and acquirers will benefit from the report's insights and merchant commentary, as well as the practical action steps ControlScan and Merchant Warehouse recommend.

To access a copy of the survey research report, please click on the following link: https://www.controlscan.com/whitepapers/merchant_study_2012.php.

ControlScan and Merchant Warehouse are hosting a joint Webinar to be held on November 15, 2012 to present the study's findings. Click here for more information and to register.

###

About the Survey

The ControlScan/Merchant Warehouse Fourth Annual Level 4 Merchant Survey was completed in August 2012 by 603 Level 4 merchants who represent a mix of ecommerce, retail stores and mail order/telephone order businesses.

About PCI Compliance and Security Provider, ControlScan

Headquartered in Atlanta, Georgia, ControlScan is an expert provider of Payment Card Industry (PCI) Compliance and Security services designed to meet the unique needs of small to mid-sized merchants and the acquirers that serve them. The company's flexible solutions, easy-to-use online tools and personalized support significantly simplify PCI and security for its clients. In addition, as an Approved Scanning Vendor and a Qualified Security Assessor, ControlScan is positioned to help merchants meet compliance requirements and maintain secure business environments for their customers. For more information about ControlScan and its cloud-based solutions visit www.controlscan.com or call

1-800-825-3301.

About Merchant Warehouse

Merchant Warehouse is a recognized leader in payment and program acceptance solutions and merchant services. The company enables merchants, agents, POS developers and VARs to achieve strategic business advantage through the delivery of current and emerging payment, offer and program solutions and merchant services that dramatically enhance the merchant-customer experience. Merchant Warehouse is one of the fastest growing innovators of payment solutions in North America. For more information about Merchant Warehouse, please visit merchantwarehouse.com or follow the company on Twitter @MWarehouse.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3587
Published: 2014-08-22
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists bec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.