{"id":1390,"date":"2019-12-30T15:18:54","date_gmt":"2019-12-30T15:18:54","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=1390"},"modified":"2021-04-12T05:27:57","modified_gmt":"2021-04-12T05:27:57","slug":"verizon-payment-security-report","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/","title":{"rendered":"Verizon\u2019s 2019 Payment Security Report: Stop Being Reactive, Get Proactive"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Much like Verizon\u2019s Data Breach Investigations Report (DBIR), the <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/payment-security\/\">Payment Security Report<\/a> (PSR) is a must-read for security professionals. While it focuses on the PCI DSS standard and reviews compliance related to its 12 requirements, it is much more than a review of how companies are faring regarding PCI compliance.<\/p>\n<p>The compliance statistics are informative and show some alarming trends about how well companies are protecting payment card data. Those trends should cause any CISO to look closely at how their organization is handling data protection \u2013 and not just for payment cards. Critical data needs protecting regardless of how it is used. The PCI standard is broadly applicable, and the controls are just as effective for PHI, PII, and other sensitive data.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><strong>Key Findings<\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p><img decoding=\"async\" class=\"wp-image-1391 alignright lazyload\" data-src=\"http:\/\/72.52.228.46\/~itegriti\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-1_PCI-DSS-Compliance_-Blog-Post.png\" alt=\"\" width=\"405\" height=\"327\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-1_PCI-DSS-Compliance_-Blog-Post-177x142.png 177w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-1_PCI-DSS-Compliance_-Blog-Post-200x162.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-1_PCI-DSS-Compliance_-Blog-Post-400x323.png 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-1_PCI-DSS-Compliance_-Blog-Post.png 536w\" data-sizes=\"(max-width: 405px) 100vw, 405px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 405px; --smush-placeholder-aspect-ratio: 405\/327;\" \/><\/p>\n<p>When the PCI SSC published the PCI DSS in 2004, it was expected that organizations would achieve effective and sustainable compliance within about five years. 15 years later and less than half of organizations maintain programs that prevent PCI DSS security controls from falling out of place within a few months after formal compliance validation.<\/p>\n<p>Data protection and compliance present daily challenges. Security professionals must assure that controls remain in place and perform consistently. Despite good intentions, more than half of organizations are still struggling to design, implement and maintain a sustainable compliance program.<\/p>\n<p>One challenge is that many security professionals believe that by following a script in the correct order will result in effective and sustainable data protection. In the real world, things are messy. Organizations might be spending a lot of time and money creating their Data Protection Compliance Programs (DPCP), but many programs are ineffective and fail to advance beyond a program that looks good on paper. Unfortunately, these DPCPs lack the design, implementation, review process and revisions to become effective and sustainable. Additionally, organizations have inadequate or overly complex strategies, which originate from a lack of proficiency in designing, implementing, monitoring and evaluating a DPCP.<\/p>\n<p>Payment card assets and data are under constant threat, and defenders are not always keeping up. Organizations need more robust DPCPs and navigational tools to manage the sustainability of their data protection. The findings of the report are alarming:<\/p>\n<ul>\n<li>Many companies are not effectively addressing data risks. 18% of the surveyed organizations don\u2019t have a defined compliance program. Only 20% of the respondents rate their DPCP maturity as advanced and a stunning 0% rate their program maturity as optimized.<\/li>\n<li>Too few organizations are measuring control and compliance performance. Only 18% measure their PCI DSS controls more frequently than what the standard requires. 32% of the respondents use control effectiveness and operational performance metrics, while only 7% use program impact metrics to measure program performance.<\/li>\n<li>Organizations in the Asia \u2013 Pacific (APAC) region show a stronger ability to maintain full compliance: 69.6% maintained conformance to the security standard. On the other hand, only 20.4% of organizations in the Americas maintained full compliance.<\/li>\n<li>The finance industry has done a tremendous job with raising the bar on full compliance in comparison to peer industries, but it is only 2.4% above the global average. On the other hand, retail is below the global average in maintaining compliance. For all industries, the report sees a significant decrease in the ability to maintain full compliance.<\/li>\n<\/ul>\n<div id=\"attachment_1392\" style=\"width: 610px\" class=\"wp-caption alignnone\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1392\" class=\"size-medium wp-image-1392 lazyload\" data-src=\"http:\/\/72.52.228.46\/~itegriti\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-2_PCI-DSS-Compliance-per-region-and-Industry-600x180.png\" alt=\"\" width=\"600\" height=\"180\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-2_PCI-DSS-Compliance-per-region-and-Industry-200x60.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-2_PCI-DSS-Compliance-per-region-and-Industry-400x120.png 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-2_PCI-DSS-Compliance-per-region-and-Industry-600x180.png 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-2_PCI-DSS-Compliance-per-region-and-Industry-768x230.png 768w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-2_PCI-DSS-Compliance-per-region-and-Industry-800x239.png 800w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-2_PCI-DSS-Compliance-per-region-and-Industry.png 862w\" data-sizes=\"(max-width: 600px) 100vw, 600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 600px; --smush-placeholder-aspect-ratio: 600\/180;\" \/><p id=\"caption-attachment-1392\" class=\"wp-caption-text\"><em>Figure 2: PCI DSS Compliance per region (left) and by industry (right)<\/em><\/p><\/div>\n<\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><strong>The Retail Industry<\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p>Retail has never been more competitive. To succeed, retail organizations must listen to their customers. And more than ever, data and privacy protection matter to retail customers.<\/p>\n<p>According to the 2019 Verizon report \u201c<a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2019\/winning_the_cx_war.pdf\">Winning the CX war: The risks and rewards of next-generation CX<\/a>,\u201d only 7% of customers would continue to use a company if it suffered a data breach, and 69% of customers would avoid a company that has suffered a data breach even if it offers a better deal than competitors. This makes payment card security a crucial differentiator. Consistently maintaining effective security controls to meet the PCI DSS can help retail organizations earn customer trust and win a competitive advantage. But to accomplish this, DPCPs must evolve and mature.<\/p>\n<div id=\"attachment_1393\" style=\"width: 481px\" class=\"wp-caption alignright\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1393\" class=\"size-full wp-image-1393 lazyload\" data-src=\"http:\/\/72.52.228.46\/~itegriti\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-3_-Confirmed-Data-Breaches-per-Industry.png\" alt=\"\" width=\"471\" height=\"294\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-3_-Confirmed-Data-Breaches-per-Industry-200x125.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-3_-Confirmed-Data-Breaches-per-Industry-400x250.png 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-3_-Confirmed-Data-Breaches-per-Industry.png 471w\" data-sizes=\"(max-width: 471px) 100vw, 471px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 471px; --smush-placeholder-aspect-ratio: 471\/294;\" \/><p id=\"caption-attachment-1393\" class=\"wp-caption-text\"><em>Figure 3: Confirmed Data Breaches per Industry<\/em><\/p><\/div>\n<p>Four years ago, retail data was <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\">most often compromised<\/a> at the point of sale. Since that time, EMV technology has reduced the value proposition of card-present fraud, and data breaches are primarily occurring <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\">through web applications<\/a>. However, security breaches haven\u2019t been eliminated. Retailers must still be vigilant about protecting card data.<\/p>\n<p>Data on long-term trends show that retail suffered the largest percentage of confirmed data breaches compared to the other industries studied\u2014hospitality, financial services and IT services. Verizon\u2019s data shows that it is mostly the online retailers that experience compromises. According to the Verizon 2019 DBIR, bad actors compromise retail data for financial gain, fun and espionage. This includes personal information that can be stolen from reward programs.<\/p>\n<p>While payment card security is vital, not all businesses are in full compliance. Retail\u2019s compliance rate with PCI DSS this year was similar to IT services, better than hospitality (26.3% compliance) and behind financial services, which led the four industries studied at 39.0% compliance with PCI DSS.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><h2>Retail PCI DSS Compliance: The Good, the Bad and the Interesting<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-4\"><p>The 2019 PSR indicates that retail did a good job of encrypting data in transit (PCI DSS Requirement 4) and protecting against malicious software (Requirement 5). Retail outperformed other industries by getting closer to complying with both requirements. The industry also did fairly well at authenticating access (Requirement 8) to prevent data theft. Retail reported 70.5% full compliance with Requirement 8, ahead of both financial and IT services. Finally, retail demonstrated success in tracking and monitoring access to data (Requirement 10). The industry reported the highest full compliance across the four industries surveyed (81.8%) in meeting this requirement.<\/p>\n<p>Where retail fell short in meeting PCI DSS requirements was in using too many vendor-supplied defaults across in-scope components (Requirement 2). Additionally, retail dropped significantly in complying with the requirement to have good security management (Requirement 12).<\/p>\n<p>Retail scored the lowest of all industries studied in data breach incident preparedness. The major barriers vendors faced were:<\/p>\n<ul>\n<li>Identifying users and ensuring that they had the right level of privileges (Control 10.2.5)<\/li>\n<li>Following due diligence when engaging service providers (Control 12.8.3)<\/li>\n<li>Detecting unauthorized wireless access points (Control 11.1.2)<\/li>\n<li>Maintaining an incident response (IR) plan (Control 12.10)<\/li>\n<\/ul>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><strong>Recommendations for Retail Compliance<\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-5\"><p>The Verizon 2019 PSR report offers some useful recommendations for the retail industry to increase their level of PCI DSS compliance.<\/p>\n<p>For starters, retail vendors should <strong>change vendor defaults<\/strong>. Replacing default passwords and avoiding other vendor-supplied defaults makes organizations more resistant to attacks. Organizations must make this a priority. The good news is that the skills to replace defaults are likely already in-house.<\/p>\n<p>Second, retail should <strong>invest in incident preparedness<\/strong>. Cybersecurity incidents will likely occur. How an organization responds can make all the difference. Identifying potential security incidents, responding quickly and maintaining incident response plans can give retailers an advantage in investigations and damage control.<\/p>\n<div id=\"attachment_1394\" style=\"width: 359px\" class=\"wp-caption alignright\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1394\" class=\"size-full wp-image-1394 lazyload\" data-src=\"http:\/\/72.52.228.46\/~itegriti\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-4_9-Factors-of-Control-Effectiveness-and-Sustainability.png\" alt=\"\" width=\"349\" height=\"341\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-4_9-Factors-of-Control-Effectiveness-and-Sustainability-200x195.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-4_9-Factors-of-Control-Effectiveness-and-Sustainability.png 349w\" data-sizes=\"(max-width: 349px) 100vw, 349px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 349px; --smush-placeholder-aspect-ratio: 349\/341;\" \/><p id=\"caption-attachment-1394\" class=\"wp-caption-text\"><em>Figure 4: 9 Factors of Control Effectiveness and Sustainability<\/em><\/p><\/div>\n<p>Overall, retail vendors should <strong>mature their compliance programs<\/strong>. Compliance challenges do not exist in isolation. The Verizon 2019 PSR report has good news for every retail vendor, as it introduces the Verizon 9-5-4 Compliance Program Performance Evaluation Framework. The Framework combines 9 Factors of Control Effectiveness and Sustainability with 5 Constraints of Organizational Proficiency and 4 Lines of Assurance. This integrated framework can be the navigational aid that organizations need to enhance the clarity of their DPCPs. The framework provides a level of visibility and control that helps organizations achieve repeatability, consistency and highly predictable outcomes.<\/p>\n<p>The Verizon 9-5-4 Compliance Program addresses elements to help develop and improve capability and process maturity across an entire DPCP. Continuously maturing your security framework with the Verizon Framework is a proactive and progressive step that will help keep compliance at optimum capacity.<\/p>\n<div id=\"attachment_1395\" style=\"width: 610px\" class=\"wp-caption alignnone\"><img decoding=\"async\" aria-describedby=\"caption-attachment-1395\" class=\"size-medium wp-image-1395 lazyload\" data-src=\"http:\/\/72.52.228.46\/~itegriti\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-5_5-Contraints-of-Organizational-Proficiency-600x56.png\" alt=\"\" width=\"600\" height=\"56\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-5_5-Contraints-of-Organizational-Proficiency-200x19.png 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-5_5-Contraints-of-Organizational-Proficiency-400x38.png 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-5_5-Contraints-of-Organizational-Proficiency-600x56.png 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-5_5-Contraints-of-Organizational-Proficiency-768x72.png 768w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-5_5-Contraints-of-Organizational-Proficiency-800x75.png 800w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/Verizon-Report-Figure-5_5-Contraints-of-Organizational-Proficiency.png 863w\" data-sizes=\"(max-width: 600px) 100vw, 600px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 600px; --smush-placeholder-aspect-ratio: 600\/56;\" \/><p id=\"caption-attachment-1395\" class=\"wp-caption-text\"><em>Figure 5: The 5 Constraints of Organizational Proficiency<\/em><\/p><\/div>\n<\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:#182857;--awb-margin-bottom:5px;--awb-margin-bottom-small:3px;--awb-font-size:32px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:32;line-height:0.78;\"><strong>Conclusion<\/strong><\/h2><\/div><div class=\"fusion-text fusion-text-6\"><p>Building a mature compliance program can allow you to join these industry leaders and gain a competitive advantage by creating the trusted brand that customers seek. Reading the Verizon PSR report is a good start, but the real value comes from implementing the recommendations. This will ensure greater data protection as well as help with audit compliance.<\/p>\n<p>Learn how <a href=\"http:\/\/72.52.228.46\/~itegriti\/\">ITEGRITI<\/a> can help you be compliant with the PCI DSS requirements or assist in the maturation of your program.<\/p>\n<p><em>Editor\u2019s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Itegriti, Inc.<\/em><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":10,"featured_media":1396,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2179,13,2180],"tags":[839],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Verizon\u2019s Payment Security Report: Stop Being Reactive, Get Proactive<\/title>\n<meta name=\"description\" content=\"2019 Verizon Security Report identify&#039;s trends on protecting critical organizational data and consumer PCS DSS compliance within the retail industry.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Verizon\u2019s 2019 Payment Security Report: Stop Being Reactive, Get Proactive\" \/>\n<meta property=\"og:description\" content=\"2019 Verizon Security Report identify&#039;s trends on protecting critical organizational data and consumer PCS DSS compliance within the retail industry.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-30T15:18:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T05:27:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/post-7_-Image-_Verizon-2019-PSR_FINAL.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Verizon\u2019s 2019 Payment Security Report: Stop Being Reactive, Get Proactive\",\"datePublished\":\"2019-12-30T15:18:54+00:00\",\"dateModified\":\"2021-04-12T05:27:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/\"},\"wordCount\":2040,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/post-7_-Image-_Verizon-2019-PSR_FINAL.png\",\"keywords\":[\"8 Minute Read\"],\"articleSection\":[\"Compliance\",\"Cybersecurity\",\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/\",\"name\":\"Verizon\u2019s Payment Security Report: Stop Being Reactive, Get Proactive\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/post-7_-Image-_Verizon-2019-PSR_FINAL.png\",\"datePublished\":\"2019-12-30T15:18:54+00:00\",\"dateModified\":\"2021-04-12T05:27:57+00:00\",\"description\":\"2019 Verizon Security Report identify's trends on protecting critical organizational data and consumer PCS DSS compliance within the retail industry.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/post-7_-Image-_Verizon-2019-PSR_FINAL.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/post-7_-Image-_Verizon-2019-PSR_FINAL.png\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Verizon\u2019s 2019 Payment Security Report: Stop Being Reactive, Get Proactive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Verizon\u2019s Payment Security Report: Stop Being Reactive, Get Proactive","description":"2019 Verizon Security Report identify's trends on protecting critical organizational data and consumer PCS DSS compliance within the retail industry.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/","og_locale":"en_US","og_type":"article","og_title":"Verizon\u2019s 2019 Payment Security Report: Stop Being Reactive, Get Proactive","og_description":"2019 Verizon Security Report identify's trends on protecting critical organizational data and consumer PCS DSS compliance within the retail industry.","og_url":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2019-12-30T15:18:54+00:00","article_modified_time":"2021-04-12T05:27:57+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/post-7_-Image-_Verizon-2019-PSR_FINAL.png","type":"image\/png"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Verizon\u2019s 2019 Payment Security Report: Stop Being Reactive, Get Proactive","datePublished":"2019-12-30T15:18:54+00:00","dateModified":"2021-04-12T05:27:57+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/"},"wordCount":2040,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/post-7_-Image-_Verizon-2019-PSR_FINAL.png","keywords":["8 Minute Read"],"articleSection":["Compliance","Cybersecurity","Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/","url":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/","name":"Verizon\u2019s Payment Security Report: Stop Being Reactive, Get Proactive","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/post-7_-Image-_Verizon-2019-PSR_FINAL.png","datePublished":"2019-12-30T15:18:54+00:00","dateModified":"2021-04-12T05:27:57+00:00","description":"2019 Verizon Security Report identify's trends on protecting critical organizational data and consumer PCS DSS compliance within the retail industry.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/post-7_-Image-_Verizon-2019-PSR_FINAL.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2019\/12\/post-7_-Image-_Verizon-2019-PSR_FINAL.png","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2019\/cybersecurity\/verizon-payment-security-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Verizon\u2019s 2019 Payment Security Report: Stop Being Reactive, Get Proactive"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1390"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=1390"}],"version-history":[{"count":5,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1390\/revisions"}],"predecessor-version":[{"id":2004,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/1390\/revisions\/2004"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/1396"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=1390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=1390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=1390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}