Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Finance > Protecting PANs: What Payment Service Providers Need to Know
    Finance

    Protecting PANs: What Payment Service Providers Need to Know

    Protecting PANs: What Payment Service Providers Need to Know

    Published by Gbaf News

    Posted on December 11, 2019

    Featured image for article about Finance

    By Anna Russell, VP at comforte AG

     Payment systems are complex as they connect and combine various networks and endpoints, from transaction logs to ATMs. They are essential for storing and processing payment card information, sensitive data and primary account numbers (PANs) across multiple locations. Then you have transaction log files and cardholder files which share sensitive datasets across numerous applications, from fraud detection systems to analytic programs. Given the vast range of cardholder data, and the many places it is kept, sent, and processed, it is no surprise that PCI DSS stipulates that PANs must be unreadable wherever they are stored. This can be complicated, especially as data is so dynamic, so how can organizations meet this difficult requirement?

    Issues with traditional data security perimeters        

    Anna Russell

    Anna Russell

    Traditional security perimeters are becoming increasingly entwined with hybrid applications, as data is migrating from internal databases to the cloud or third-party applications. These complex networks make it hard to protect PANs because visibility is not assured when it comes to third-party providers. The growing sprawl of data across multiple platforms means that businesses are expected be all the more vigilant when it comes to customer data.

    This is not to say that companies are leaving treasure troves of sensitive data unprotected. Generally, there are several traditional security measures in place to protect customer data. The first line of defence is often the perimeter. However, even the greatest of perimeter defences may simply present a speed bump to a determined and experienced cybercriminal. Furthermore, the boundaries of traditional perimeters are obscured by evolving storage methods, making it difficult to pinpoint where data originates. Data is perpetually being created from multiple points, superseding hard perimeters and dispersing controls throughout organizations. This makes PCI DSS compliance challenging as data is constantly being introduced, stored, and moved across multiple touchpoints; yet it must be safeguarded at all times.

    Within traditional perimeter defences, most companies deploy multiple security products to protect against malicious software. However, software is evolving all the time, and if your systems and applications are not promptly patched, then it could have dangerous consequences. Furthermore, on many occasions cybercriminals  have bypassed traditional perimeter defences and gained access to sensitive data without setting off any alarms. That is part of the reason why the average breach isn’t identified until 279 days after the fact. This means that there must be more intrinsic controls in place to protect sensitive information.

    Another wrench in the works is the introduction of bring your own device (BYOD) policies. This makes it difficult for security teams to patrol all the devices within their network. By allowing unmonitored devices into your network, you increase the likelihood of a breach occurring from within. To counteract this, many companies are deploying identity and access management (IAM) processes to determine who is accessing applications. This restricts access to a ‘need to use’ basis, ensuring that sensitive data can only be viewed when it is essential to do so as is required by PCI DSS.

    Often, the final level of protection is monitoring. This gives security teams insight into what is happening in the network, prompting action if there is any suspicious activity. When combined with IAM this may provide a comprehensive approach to data protection because suspicious activity can be linked to specific account, identifying users that are accessing data they shouldn’t be. However, this assumes that fully provisioned employees are inherently benevolent. On the other hand, even trusted workers can unintentionally facilitate a data breach. These vulnerabilities are known as insider threats and they can be difficult to predict due to the unpredictability of human nature. Indeed, an insider can be every bit as detrimental as an experienced cybercriminal.

    What is the solution to protect sensitive data?

    Despite the extensive security parameters being deployed, the amount of fraud that occurs suggests there is a need for more comprehensive security approach. Indeed, according to a 2019 study conducted by the Ponemon Institute spanning 16 countries, the average data breach affects 25,575 records, proving that deploying a data-centric mindset is essential (especially as each record carries an average cost of $150). As mentioned above, the average time to identify and detect a breach is 279 days. This is plenty of time to access, steal, and sell sensitive information without a trace, thereby enforcing the notion that companies shouldn’t cut corners when it comes to protecting data.

    With this in mind, it is no surprise that the Payment Card Industry expects businesses to protect customer PANs. PCI DSS isn’t a heavy-handed bureaucratic trap designed to slap sanctions on businesses, but a set of guidelines to improve both security and customer relations. Indeed, breaches don’t just cause damage in terms of incident handling, but also brand reputation. If you lose customer data, they will lose faith in you. Therefore, companies should endeavour to comply with PCI DSS. There are several ways that businesses can maintain compliance. Requirement 3.4 specifies that data can be protected with tokenization, truncation, or encryption with proper key management. Furthermore, Requirement 4 calls for similar measures to protect data being transmitted over public networks.

    Of the above methods, tokenization is swiftly emerging as a best practice for protecting PANs because it replaces the original data with a surrogate (token) value. Therefore, even if an attacker gets access to a tokenized PAN, it is useless to them. This addresses the root problem behind data breaches by removing the threat of breached cardholder data all together. If PANs are protected at all stages of their lifecycle, then even if there was a significant breach, customer information remains protected. Once hackers become aware that their efforts to circumnavigate perimeter controls result in nothing but useless data, then they will move on.

    Related Posts
    Yields rise, stocks up slightly after US GDP data; yen firms on currency warnings 
    Yields rise, stocks up slightly after US GDP data; yen firms on currency warnings 
    UK police say comedian Russell Brand charged with two more sex offences
    UK police say comedian Russell Brand charged with two more sex offences
    RTX unit Raytheon lands $1.7 billion deal to supply Patriot systems to Spain
    RTX unit Raytheon lands $1.7 billion deal to supply Patriot systems to Spain
    CSG will supply trucks to Slovak army under framework deal worth up to $1.2 billion
    CSG will supply trucks to Slovak army under framework deal worth up to $1.2 billion
    EU plans stricter controls on plastic imports to help struggling recyclers
    EU plans stricter controls on plastic imports to help struggling recyclers
    Nestle sells remaining 40% Herta stake to Casa Tarradellas, ending joint venture
    Nestle sells remaining 40% Herta stake to Casa Tarradellas, ending joint venture
    Bank of Spain upgrades growth outlook but many Spaniards feel stretched
    Bank of Spain upgrades growth outlook but many Spaniards feel stretched
    US dollar retreats as prospect of Fed rate cuts overshadows growth data
    US dollar retreats as prospect of Fed rate cuts overshadows growth data
    Lebanon denies any army link to Hezbollah after Israeli strike
    Lebanon denies any army link to Hezbollah after Israeli strike
    Orsted sells 55% of Taiwan wind farm to Cathay
    Orsted sells 55% of Taiwan wind farm to Cathay
    ServiceNow to buy Armis for $7.75 billion as AI-fueled cyber risks surge
    ServiceNow to buy Armis for $7.75 billion as AI-fueled cyber risks surge
    Two men found guilty of UK plot to kill hundreds of Jews as IS fears grow
    Two men found guilty of UK plot to kill hundreds of Jews as IS fears grow

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    More from Finance

    Explore more articles in the Finance category

    Factbox-Weight-loss drug developers line up to tap lucrative market as competition heats up

    Factbox-Weight-loss drug developers line up to tap lucrative market as competition heats up

    Germany deports criminal to Syria as pressure mounts on migration

    Germany deports criminal to Syria as pressure mounts on migration

    Swedish Nov PPI +1.2 % month/month

    Swedish Nov PPI +1.2 % month/month

    Samsung Electronics unit Harman to acquire ZF Group's ADAS business for $1.8 billion

    Samsung Electronics unit Harman to acquire ZF Group's ADAS business for $1.8 billion

    Campari's top shareholder regains seized shares after tax deal

    Campari's top shareholder regains seized shares after tax deal

    Liechtenstein court rules against founder of Poland's Cyfrowy Polsat in ownership case

    Liechtenstein court rules against founder of Poland's Cyfrowy Polsat in ownership case

    Israeli defence minister says no plan to resettle Gaza after hinting at one

    Israeli defence minister says no plan to resettle Gaza after hinting at one

    Sterling rises to 12-week high versus weaker dollar

    Sterling rises to 12-week high versus weaker dollar

    Two CMA CGM vessels navigate the Suez Canal in sign of easing tension

    Two CMA CGM vessels navigate the Suez Canal in sign of easing tension

    EU broadens industry compensation for emissions regulation costs

    EU broadens industry compensation for emissions regulation costs

    Italy's government wins upper house confidence vote on 2026 budget

    Italy's government wins upper house confidence vote on 2026 budget

    UK softens stance on farm tax after months of protests

    UK softens stance on farm tax after months of protests

    View All Finance Posts
    Previous Finance PostWhat is the Senior Managers and Certificate Regime?
    Next Finance PostThe LIBOR Transition Has Poised Financial Institutions to Efficiently Manage Future Challenges