Blog

How Payments Are Done: The Top 5 Blog Posts of 2015

Hard to believe we’ll be ringing in 2016 at the end of this month. That means now is the perfect time to reflect back on this year.

In May, we launched the How Payments Are Done blog with a specific mission in mind: to keep our business partners and merchant clients updated and armed with payment strategies that work.

Throughout the past seven months, we’ve covered a broad range of topics from EMV and tokenization, to card not present (CNP) fraud and mobile commerce.

Now let’s see which of those posts got the most attention — and might just warrant printing out and keeping at your desk to refer to again and again. Continue reading “How Payments Are Done: The Top 5 Blog Posts of 2015”

Share this article:

Blog

Credit Card Tokenization: Data Thieves Can’t Steal What Isn’t Theirs

In today’s world, merchants are expected to keep cardholder data secure. Companies like Target and Lowe’s don’t just find themselves with a bunch of bad PR, they also have to deal with costly fines and litigation. Unfortunately, many merchants don’t truly understand how vulnerable electronic payments are, and may think they are secure, when in fact they are not.

The Payment Card Industry Data Security Standard (PCI-DSS) is the set of payment card industry rules for data security. As PCI standards become more and more complicated, merchants are investing in a variety of solutions. However, some of those solutions don’t provide the level of security required to pass an audit.

Continue reading “Credit Card Tokenization: Data Thieves Can’t Steal What Isn’t Theirs”

Share this article: