Protecting consumer data with a fraud and risk assessment policy

Ask the Expert

Protecting consumer data with a fraud and risk assessment policy

What should be the fraud and risk assessment policy at consumer banking cards' sales end?

Continue Reading This Article

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor

Fraud mitigation and risk assessment are different things. I am interpreting this question to ask about policies that retailers and other merchants should be implementing relative to consumer banking cards. Many of the requirements for protecting cardholder information are specified in the Payment Card Industry Data Security Standard, commonly known as PCI DSS.

PCI DSS specifies 12 different requirements to secure cardholder data and requires a qualified assessor to examine a merchant's environment to ensure compliance. Penalties for non-compliance range from small fines to the inability to use a specific type of credit or debit card.

Specific to risk assessment, the PCI DSS standard requires that "security controls, limitations, network connections and restrictions" are tested at least annually. It also mandates quarterly use of a wireless analyzer to see if your Wi-Fi networks are vulnerable. Additionally, the regulation requires quarterly vulnerability scans to ensure that no known vulnerabilities put cardholder data at risk.

I strongly recommend that organizations also conduct a more formal penetration test, ideally performed by outside resources, at least once a year, and also use automated pen testing tools internally more often. Why? Because the bad guys are testing your network and applications every day. They are performing risk assessments all the time, trying to figure out how to compromise your systems, so you should use their same tools and techniques to find and remediate problems.

For more information:

  • In this tip, contributor Khalid Kark defines the framework that makes organizational risk management work in your enterprise.
  • In this expert response, Joel Dubin discusses whether or not tokenization can meet PCI DSS standards for storing credit card data.
  • This was first published in October 2007