You cannot store the credit card data in clear text at all – it has to be in 
some form of encryption (which can be reversible for internal re-usage).

 

There are different levels to PCI compliance .. all of them are a PITA  

 

Someone mentioned the $1k/annual McAfee option – that’s a really cheap option 
but I would talk with the folks involved on the customer side to see if it’s 
worth it .. if all of this is over $20/month I’d pay the monthly fee (if in 
fact they are going to charge it) and leave the situation alone

 

I know of a few companies that should be “level 1” on PCI compliance due to 
their volume and have managed to avoid any sort of PCI compliance requirements 
– mainly because of very limited chargebacks, very limited fraud issues etc.  
As soon as one or both of those issues start to break a certain percentage of 
overall sales (usually 2% I’ve heard) then you start to “get on the radar”.

 

From: Af [mailto:[email protected]] On Behalf Of Eric Kuhnke
Sent: Wednesday, October 28, 2015 5:48 PM
To: [email protected]
Subject: Re: [AFMUG] PCI compliance and managed router

 

traffic between their credit card terminal and the processor should be 
end-to-end encrypted. Audits of their network equipment would be required for 
PCI compliance if they were storing card info in plaintext anywhere on their 
LAN, which they are not.

 

On Wed, Oct 28, 2015 at 11:54 AM, Ken Hohhof <[email protected] 
<mailto:[email protected]> > wrote:

I have always heard of PCI compliance in terms of a business like a gas station 
where customers swipe cards at the pumps.

But I have a customer with a credit card reader terminal in their office that 
is making this big fuss because they annually do a PCI audit apparently to 
avoid a $20/month fee from their credit card processor.  Maybe I don't even 
realize we pay that, there is some $200/year PCI compliance fee we pay.

Anyway, this is not where some auditors show up, but rather a cloud based scan 
they run from one of their computers until they pass, then they print out the 
report and send it in.

And apparently the customer decided to have us replace Frontier and then do 
their annual scan the next day.  They claim they passed every year previous, 
hard to believe the Frontier modem they were using as their router having 
username/password set to admin/admin was not an issue.  Their first complaint 
to us was their WiFi password was not complex enough.  Well, we just set it to 
what you were already using.  Then they had some complaint about DNS.

Now they are saying they have to report that we manage the router remotely, and 
that may be a problem.  Is it?  We close off everything but Winbox.  It seems a 
lot more secure to me than having a web interface with admin/admin. I told the 
customer they are welcome to supply and manage their own router, but if they 
get a leased, managed router from us, well ... we manage it. Remotely.

Has anyone dealt with this issue already? 

 

Reply via email to