Blog

Endpoint protection; a vital tool in the battle against ransomware

The ever-changing cyber security threat In May 2021, the East Coast of America suffered the effects of a large-scale ransomware attack that targeted Colonial Pipeline. This attack, which demanded $4.4 million, targeted the pipeline, which provides roughly 45% of all the fuel for the East Coast, causing prices to skyrocket and disruption for both businesses and […]

Blog

Vulnerability management – address known weaknesses in your systems and software before cybercriminals can exploit them

According to the National Cyber Security Centre “The majority of cyber security incidents are the result of attackers exploiting publicly disclosed vulnerabilities to gain access to systems and networks”. Cybercriminals’ attacks can make systems unusable, disrupt business activities or expose sensitive company information, personal data or payment card details to fraudulent and illegal use The […]

Blog

Ask a QSA

‘Ask a QSA’ recently received the below question that we believe will be of interest to our readers. Client Engagement QSA, Natasja Bolton answers. What does the removal of the PCI PTS v3.0 PIN Entry Devices from the Approved list to Expired, mean for our merchants? On 1st April 2021, Visa issued a reminder that […]

Articles, Blog

Real-life Threat Protection for Merchants

Our SOC (Service Operations Centre) team offers Real-life threat protection. They are continuously fighting and preventing malicious viruses and malware on merchants’ devices. This month alone 2,678 automatic security actions took place while we had 445 SOC team interventions. Note: An automatic security action is when our security tools directly deal with the malicious file […]

Blog

Sysnet Celebrates International Women’s Day

It’s that time of year again, International Women’s Day (IWD)! A global day to celebrate the social, economic, cultural and political achievements of women. This year’s theme is #ChoosetoChallenge, and it goes without saying that the intersection of technology and payments provides a fulfilling career path full of challenges by working in a highly complex […]

Creating a successful merchant PCI DSS compliance management programme
Articles, Blog

Creating a successful merchant PCI DSS compliance management programme

Introduction The Payment Card Industry Data Security Standard (PCI DSS), while undoubtedly benefitting both merchants and payment card holders, places significant demands on the resources of many acquirers.   Most people involved in risk and compliance within the payments industry recognise these benefits; nevertheless running a merchant PCI DSS compliance management programme can be a […]

What-is-it-that-makes-a-Level-4-Merchant-High-risk
Articles, Blog

What is it that makes a Level 4 Merchant High-risk?

Mastercard has set a deadline for acquiring organisations to manage risk in their Level 4 Merchant portfolio. Mastercard’s updated Site Data Protection (SDP) Program rules expect PCI DSS compliance validation from your high-risk merchants.   Mastercard requires all acquirers to have a Level 4 risk management programme in place to meet the updated SDP requirements. […]

EU-Payment-Services-Directive-2017-PSD2-and-Strong-Customer-Authentication
Articles, Blog

Payment Services Directive (EU) 2015/2366 (PSD2) & Strong Customer Authentication

by Natasja Bolton, Managing Information Security Consultant. [Published on 22/01/2020]   EU Payment Services Directive (PSD2) & Strong Customer Authentication The revised EU Payment Services Directive (PSD2) is an update to the original 2007 Payment Services Directive (PSD) which created a single market for payments in the European Union (EU). Since 2007, new services offered […]

Merchant PCI DSS compliance validation – what it means to be a Level 2 or Level 1 merchant
Articles, Blog

Merchant PCI DSS compliance validation – what it means to be a Level 2 or Level 1 merchant

by Natasja Bolton, QSA, CISSP [17.34, 10/01/2019]   Becoming a Level 2 or Level 1 merchant Most businesses, that accept branded cards for purchase of goods or services (merchant businesses) today, are already familiar with the annual process of accessing their acquiring bank’s compliance management portal to self-assess their compliance with the Payment Card Industry […]

What you need to know about Point to Point Encryption
Articles, Blog, Cyber Risk

What you need to know about Point to Point Encryption (P2PE)

by Michael Hopewell, Managing Information Security Consultant.   Introduction Many businesses have heard about Point to Point Encryption (P2PE). Point of Sale vendors, service providers and others often mention its benefits to businesses: P2PE can reduce risk to payment card data by rendering it unreadable, minimise the number of systems and networks in scope for […]

Business Email Compromise Attacks and How to Protect Your Business
Articles, Blog

Business Email Compromise Attacks and How to Protect Your Business!

In previous articles we have provided guidance on how organisations can protect themselves from ransomware and make sure they are prepared should they be hit by ransomware. Ransomware attacks are a successful and highly profitable criminal business model and, as we predicted in early 2017, ransomware attacks have continued to proliferate.   Ransomware is a […]

Maintaining-Your-Compliance-with-the-PCI-DSS-All-Year-Round
Articles, Blog

Maintaining Your Compliance with the PCI DSS – All Year Round

Compliance with the PCI DSS (Payment Card Industry Data Security Standard) is mandatory for all businesses accepting cards for payment. The Standard ensures appropriate security protocols are applied to your payment acceptance environment to protect against fraud.   In its simplest form, the process of achieving compliance involves a scoping (or profiling) stage, which determines […]

New PCI SSC Program for Software-based PIN entry on COTS Solutions
Articles, Blog, Uncategorized

New PCI SSC Program for Software-based PIN entry on COTS Solutions

Over the last few months, the PCI SSC has published a set of documents to establish a new program for the specification, testing, evaluation and PCI SSC listing of Software-based PIN entry on Commercial Off The Shelf devices (COTS) Solutions.  Solutions also known as SPoC.   The PCI DSS developed this new PCI Security Standard […]

Articles, Blog

Ask a QSA – Mobile attack rates: how can your business customers better secure their m-commerce channel?

By Sam Pfanstiel, QSA, QSA(P2PE), QPA, PA-QSA, SSF, SSA, SSLCA Ask a QSA recently received the following query from an acquirer and we felt that this may be of interest to our readers. Merchants had been asking their acquirer “how can we better secure our m-commerce channel?” It’s a good question. Recent research has shown […]

The evolution of the cybercriminal means small businesses need to adapt
Blog, Uncategorized

The evolution of the cybercriminal means small businesses need to adapt

We regularly hear news stories about large corporations being hit with fines and suffering significant costs due to data breaches.  Many small businesses believe themselves to be immune to this threat as they believe themselves to be “too small to be a target” or that they “don’t hold valuable data.” Sadly, this is no longer […]

Why small businesses need to take cyber security seriously
Blog, Fact Sheets, Uncategorized

Why small businesses need to take cyber security seriously

Continuing on with our series of articles that focuses on challenges that many smaller businesses have, in this paper we highlight the risks cyber security poses to small businesses. We discuss how company data can be monetised by cybercriminals, why small businesses are at risk and the real cost of ignoring cyber security issues. Share […]

Addressing the growing risk from insecure third party remote access
Blog

Addressing the growing risk from insecure third party remote access

By Judith Clark, QSA Consultant In recent years, numerous security reports have identified an increasing trend for intrusions affecting Point of Sale (POS) environments to have involved insecure remote access from service providers and their networks.  As the ENISA points out, criminals are turning to network-based attacks against retailers’ POS infrastructure because attacks requiring physical […]

Basic-cyber-threats-explained
Blog, Infographics, Uncategorized

Basic cyber threats explained

Businesses, in particular small to medium ones, often do not consider that they could be targeted by cybercrime. Unfortunately, the reality is that many small to medium businesses are now very much being targeted by cyber-criminals. The vast majority of criminals are opportunists, meaning that they will look to take advantage of any businesses that are […]

Simple Cyber Security threats every small business owner should know about
Blog, Fact Sheets, Uncategorized

Simple cyber security threats every small business owner should know about

Cyber security is a wide-ranging term that can relate to a plethora of complicated issues that are far above the head of the average person. However, small businesses can take strides towards making themselves more secure by taking simple steps to secure their information by avoiding negligent security habits.   These small practices begin with […]

The TLS deadline is fast approaching. What it is & how we can help your customers be prepared
Blog, Uncategorized

The TLS deadline is fast approaching. We examine what it is and how we can help your customers be prepared

With the Payment Card Industry Security Standards Council (PCI SSC) 30th June 2018 deadline fast approaching, it’s important that your customers are prepared to migrate to a secure version of TLS .   Back in October of last year, Sysnet’s Natasja Bolton, Senior Acquirer Support QSA, highlighted the key factors as to what the TLS […]

An-alternative-approach-to-non-compliance-fees
Blog, Infographics

An alternative approach to non-compliance fees

Despite various approaches that some acquirers take to try and engage with businesses when it comes to compliance programs, some merchants simply do not engage. The traditional approach of driving compliance via non-compliance fees unfortunately doesn’t always produce results and can also lead to a negative association with the brand of the acquirer in the eyes […]

The PCI DSS v3.2 requirements that become effective from February 2018
Blog, Uncategorized

The PCI DSS v3.2 requirements that become effective from February 2018

By Francis Kyereh, Information Security Consultant Maintaining payment security is required for all entities that store, process or transmit cardholder data. Guidance for maintaining payment security is provided in PCI security standards. These set the technical and operational requirements for organisations accepting or processing payment transactions. The PCI DSS Version 3.2, containing nine new requirements […]

Understanding the scope for PCI DSS
Blog, Uncategorized, Whitepapers

Understanding the scope for PCI DSS

When undertaking any kind of PCI DSS assessment, whether it is a formal assessment or self-assessment questionnaire (SAQ), the most important thing is ensuring that the scope is correct. Without an understanding of the scope, systems may be overlooked and/or insufficient security controls applied. This may lead to a risk of data breach.   Conversely, […]

5 cyber-predictions for 2018 (Part 1)
Blog, Uncategorized

5 cyber-predictions for 2018 (Part 1)

By Juliusz Idzik, Senior Information Security Consultant 2017 review During 2017 we witnessed some interesting but unnerving cyber campaigns that have forced many of us to rethink our security posture and whether our organisations are prepared to face sophisticated attacks. These campaigns use new, innovative tools that can pass traditional security mechanisms without any alert or […]

Contactless Cards: Protect your business customers from fraud/lost sales
Blog, Uncategorized

Contactless Cards: Protect your business customers from fraud/lost sales

By Judith Clark, QSA Consultant With 95% of credit cards in Canada supporting contactless, 165 million contactless cards across Europe and one out of three card payments being contactless in the UK; the total amount spent in the UK is estimated to be approximately £23 billion for the first six months of 2017. The popularity […]