Click me
Transcribed

Is Risky Data Lurking In Your Business Systems?

THE MERCHANT APPLICATION PROCESS: IS RISKY DATA LURKING IN YOUR BUSINESS SYSTEMS? Merchants' applications for payment processing services contain a large quantity and variety of personally identfiable information (PI). Your organization's methods for receiving, storing, processing and transmitting this sensitive data are very important, due to the potential risk of exposure to cybercriminals and data thieves. This ControlScan infographic identifies the many places sensitive merchant information could be hiding in your onganization. Do you know where your merchants' sensitive infomation is stored? FIELD/TELE SALES PARTNER/AGENT MERCHANT Merchant Application Sources FAX EMAIL SNAIL MAIL EFAX WEB PORTA DIGITAL UPLOAD Hardcopy Dete Stornge/Destrection efax Provider I • Hosted Emal Previder • Qutsoorced IT Suppert • Outsouw ced Hesting Outsorced Application Development Petential Storage and Transmission Mechanisms Removable Medio Potential Service Providers Servers Whreless Access Points Employee PCs Mabile Phones ISO/Acquirer Office Printer/Fax Copler/Scanner File Cabinets FAX/EFAX EMAIL WEB PORTAL VPN/PRIVATE CONNECTION PROCESSORIS) & PROCESSOR SYSTEMS PDF VIA HTTPS UPLOAD Remove the risk associated with sensitive merchant application data. Contoct us today at 1-800-825-3301 x 4 to learm more. Contro Scan PCI & Security That's ight For You. O 2013 Contoboen. Al rights ved

Is Risky Data Lurking In Your Business Systems?

shared by ControlScan1 on May 31
142 views
0 shares
0 comments
Improperly handling PII as part of the merchant application process can put an ISO/acquirer at risk. Please view and share our risky PII data infographic for identifying the many places sensitive data...

Publisher

ControlScan

Category

Computers
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size