What steps should I take when suspicious of a data compromise? tar and other types of unidentified compressed files containing cardholder data Unknown applications configured to launch automatically upon your system reboot.Antivirus programs malfunctioning or becoming disabled.Unknown files, software and devices installed on your systems.Unexpected network traffic and IP addresses.Staying alert for the following suspicious activities can help identify potential risks: Security breaches can appear in different forms. How do I determine if there is a data compromise? How is a Cardholder Data Compromise identified?Īny suspicion of potential cardholder data compromise is reported to the payment brands (Visa® and MasterCard®) by law enforcement, issuing banks and/or you, the merchant. Merchants must produce an accurate record of events for authorities. When a data compromise occurs, it is critical to contain the damage quickly to protect customer data and immediately identify the root cause of the event. Cardholder data compromise occurs when a merchant’s payment system is breached and cardholder account information is stolen.
0 Comments
Leave a Reply. |