If you are going to do business online, secure payment processing is a must. We just completed a three part series posted on the ERP Software Blog about payment gateways, obtaining PCI Compliance and encryption methods.
In part one, the key players of secure payment processing online are discussed. These include the merchant, the cardholder and payment gateways. Different merchant levels are also provided in details. Then in part two of the series, obtaining PCI Compliance is the focus. There are 12 steps in this process that are separated into six categories: build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks and maintain an information security policy. These were taken directly from the PCI DSS website. How to get started on these steps is also highlighted in part two of the series. And finally, part three details the two ways to handle sensitive data securely: tokenization and encryption. Encryption has been around for years and while tokenization is a newer technology, when it comes to secure payment processing, it is the clear winner.
To read these articles in more detail, visit our page on the ERP Software Blog.