Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Finance
    3. >PCI 3.0: WHAT THE STANDARD LACKS IS WHAT BUSINESSES SHOULD SECURE
    Finance

    Pci 3.0: What the Standard Lacks Is What Businesses Should Secure

    Published by Gbaf News

    Posted on December 3, 2013

    9 min read

    Last updated: January 22, 2026

    Add as preferred source on Google
    This image depicts a graph showing the decreasing trend of cash transactions in the euro zone, highlighting the shift towards electronic payments as noted in the ECB report. It is relevant to the article discussing the future of cash in finance.
    Graph illustrating the decline of cash payments in the euro zone - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    By Michael Aminzade, Director of Delivery for EMEA & APAC at Trustwave

    On November 7, 2013, the new Payment Card Industry Data Security Standard (PCI DSS 3.0) – a requirement for businesses that process, store or transmit payment card information designed to help them protect that information from a data breach – was published by the PCI Security Standards Council (PCI SSC). When drafting PCI DSS 3.0, The PCI SSC used feedback from industry experts about previous standards including which parts worked and what areas needed improvement. While many parts of the new standard should help businesses better protect their customers’ information, PCI DSS 3.0 still fails to address a few critical areas.

    The mobility and risk assessment problem

    Michael Aminzade Trustwave

    Michael Aminzade Trustwave

    The most pressing issue is the lack of any standards surrounding mobile and mobile payments. The Council may not yet be ready to issue a data security standard for mobile devices since new mobile devices and applications are being developed at a very high rate which may make any current standard obsolete. As revealed in the 2013 Trustwave Global Security Report, our security experts saw a 400% increase in mobile malware in 2012, which goes to show the challenge businesses are facing in developing effective security strategies surrounding mobile devices.

    Trustwave Managing Consultant, Mike Park, recently unveiled research that exposed vulnerabilities he found within iOS based custom mobile POS solutions that some retailers use every day. He ethically hacked several mobile POS solutions to discover the vulnerabilities and was able to gain access to customers’ payment card information within 20 minutes.  The project demonstrated how criminal hackers can exploit the same vulnerabilities in iOS based custom mobile POS solutions and steal payment card information for malicious purposes.  Currently, PCI DSS 3.0 does not mandate businesses to implement any security controls surrounding mobile POS payments. The PCI SSC has published suggested guidance pertaining to mobile security however it is voluntary, not mandated.  Ideally, the Council should develop a security standard for mobile devices that organisations are required to follow to help protect the valuable payment card information that flows through these devices every day.

    Assessing the Risk
    Like its predecessor, under PCI 3.0, any organisation that handles payment card data is required to conduct an annual risk assessment, which should help identify risks in a business’ environment. Risk assessments help businesses improve their security posture by identifying weaknesses within their network and applications that could lead to the organisation falling victim to a data breach. However, in today’s environment, a single risk assessment each year is no longer enough. As more technologies (such as BYOD, mobile applications and social media) are added to the business environment, new threats are consistently emerging, which is why risk assessments should be performed at least every six months.

    Security should be business as usual
    The PCI SSC used a “business-as-usual” approach when creating PCI 3.0, incorporating requirements for businesses to follow as part of their day-to-day operations. The standard encourages organisations to take a proactive approach to protecting cardholder data, one that focuses on security in addition to compliance. In previous versions of the standard, the Council used more of a check-the-box approach to compliance where businesses would fulfil the minimum requirements in order to be compliant.

    The new business-as-usual standard aims to change this by providing businesses guidance about how to incorporate security activities as part of their regular business activities. The goal of this approach is for businesses to understand security first, and then as a result of implementing the security controls that they need in their specific environment, they will inherently be in compliance. One area that could have helped organisations in the implementation of a business-as- usual strategy would have been guidance that highlights the expanded use of security tools beyond vulnerability scanning. Merchants should be using security tools that demonstrate their systems are configured to meet the compliance requirements. There are many options on the market such as tools that identify improper use of guest and administrator accounts, find weak and default passwords, and perform a network inventory as well as validate current anti-virus software. The new standard would have been a good opportunity to mandate that small merchants use these kinds of tools so that they can better demonstrate they are in compliance.

    Ultimately, the aim of PCI DSS 3.0 is to help businesses ensure that they put effective controls in place to protect payment card data. The new standard is scheduled to take effect on a voluntary basis beginning 1st January 2014, and will be mandated in January 2015. However, any forward-thinking organisation should already be considering and implementing new tools, techniques, and processes that will help them move towards achieving the new compliance standard. Not only will this mean businesses will be fully prepared for when the new compliance regulations come into force, but in the process they will develop new security practices to help protect their customer card data and improve their security posture.

    By Michael Aminzade, Director of Delivery for EMEA & APAC at Trustwave

    On November 7, 2013, the new Payment Card Industry Data Security Standard (PCI DSS 3.0) – a requirement for businesses that process, store or transmit payment card information designed to help them protect that information from a data breach – was published by the PCI Security Standards Council (PCI SSC). When drafting PCI DSS 3.0, The PCI SSC used feedback from industry experts about previous standards including which parts worked and what areas needed improvement. While many parts of the new standard should help businesses better protect their customers’ information, PCI DSS 3.0 still fails to address a few critical areas.

    The mobility and risk assessment problem

    Michael Aminzade Trustwave

    Michael Aminzade Trustwave

    The most pressing issue is the lack of any standards surrounding mobile and mobile payments. The Council may not yet be ready to issue a data security standard for mobile devices since new mobile devices and applications are being developed at a very high rate which may make any current standard obsolete. As revealed in the 2013 Trustwave Global Security Report, our security experts saw a 400% increase in mobile malware in 2012, which goes to show the challenge businesses are facing in developing effective security strategies surrounding mobile devices.

    Trustwave Managing Consultant, Mike Park, recently unveiled research that exposed vulnerabilities he found within iOS based custom mobile POS solutions that some retailers use every day. He ethically hacked several mobile POS solutions to discover the vulnerabilities and was able to gain access to customers’ payment card information within 20 minutes.  The project demonstrated how criminal hackers can exploit the same vulnerabilities in iOS based custom mobile POS solutions and steal payment card information for malicious purposes.  Currently, PCI DSS 3.0 does not mandate businesses to implement any security controls surrounding mobile POS payments. The PCI SSC has published suggested guidance pertaining to mobile security however it is voluntary, not mandated.  Ideally, the Council should develop a security standard for mobile devices that organisations are required to follow to help protect the valuable payment card information that flows through these devices every day.

    Assessing the Risk
    Like its predecessor, under PCI 3.0, any organisation that handles payment card data is required to conduct an annual risk assessment, which should help identify risks in a business’ environment. Risk assessments help businesses improve their security posture by identifying weaknesses within their network and applications that could lead to the organisation falling victim to a data breach. However, in today’s environment, a single risk assessment each year is no longer enough. As more technologies (such as BYOD, mobile applications and social media) are added to the business environment, new threats are consistently emerging, which is why risk assessments should be performed at least every six months.

    Security should be business as usual
    The PCI SSC used a “business-as-usual” approach when creating PCI 3.0, incorporating requirements for businesses to follow as part of their day-to-day operations. The standard encourages organisations to take a proactive approach to protecting cardholder data, one that focuses on security in addition to compliance. In previous versions of the standard, the Council used more of a check-the-box approach to compliance where businesses would fulfil the minimum requirements in order to be compliant.

    The new business-as-usual standard aims to change this by providing businesses guidance about how to incorporate security activities as part of their regular business activities. The goal of this approach is for businesses to understand security first, and then as a result of implementing the security controls that they need in their specific environment, they will inherently be in compliance. One area that could have helped organisations in the implementation of a business-as- usual strategy would have been guidance that highlights the expanded use of security tools beyond vulnerability scanning. Merchants should be using security tools that demonstrate their systems are configured to meet the compliance requirements. There are many options on the market such as tools that identify improper use of guest and administrator accounts, find weak and default passwords, and perform a network inventory as well as validate current anti-virus software. The new standard would have been a good opportunity to mandate that small merchants use these kinds of tools so that they can better demonstrate they are in compliance.

    Ultimately, the aim of PCI DSS 3.0 is to help businesses ensure that they put effective controls in place to protect payment card data. The new standard is scheduled to take effect on a voluntary basis beginning 1st January 2014, and will be mandated in January 2015. However, any forward-thinking organisation should already be considering and implementing new tools, techniques, and processes that will help them move towards achieving the new compliance standard. Not only will this mean businesses will be fully prepared for when the new compliance regulations come into force, but in the process they will develop new security practices to help protect their customer card data and improve their security posture.

    More from Finance

    Explore more articles in the Finance category

    Image for Germany unveils climate plan to cut emissions, fossil fuels
    Germany Unveils Climate Plan to Cut Emissions, Fossil Fuels
    Image for Sterling steady as traders remain cautious about efforts to end Iran war
    Sterling Steady as Traders Remain Cautious About Efforts to End Iran War
    Image for Dutch gas storage levels hit lowest level in years
    Dutch Gas Storage Levels Hit Lowest Level in Years
    Image for London's FTSE 100 climbs on prospects of Middle East ceasefire 
    London's FTSE 100 Climbs on Prospects of Middle East Ceasefire 
    Image for Analysis-Ukraine faces new Russian offensive as peace talks stall
    Analysis-Ukraine Faces New Russian Offensive as Peace Talks Stall
    Image for German army eyes AI tools to expedite wartime decision-making
    German Army Eyes AI Tools to Expedite Wartime Decision-Making
    Image for Hungary to curb gas flows to Ukraine until Druzhba oil flows resume, Orban says
    Hungary to Curb Gas Flows to Ukraine Until Druzhba Oil Flows Resume, Orban Says
    Image for NatWest to sell HR consultancy unit Mentor in streamlining push, Sky News reports
    NatWest to Sell HR Consultancy Unit Mentor in Streamlining Push, Sky News Reports
    Image for Italy's growth outlook darkens due to Iran conflict, business lobby says
    Italy's Growth Outlook Darkens Due to Iran Conflict, Business Lobby Says
    Image for Denmark's prime minister hands in government resignation after election defeat
    Denmark's Prime Minister Hands in Government Resignation After Election Defeat
    Image for ECB's Lane flags selling prices and wages as key indicators
    ECB's Lane Flags Selling Prices and Wages as Key Indicators
    Image for UK house prices rise by least since September 2024 in January
    UK House Prices Rise by Least Since September 2024 in January
    View All Finance Posts
    Previous Finance PostCan’t Pay, Won’t Pay: The Prompt Payment Battleground
    Next Finance PostA Generational Approach to College Student Debt in America