{"id":15365,"date":"2019-10-10T10:41:14","date_gmt":"2019-10-10T09:41:14","guid":{"rendered":"https:\/\/www.dionach.com\/?post_type=project&#038;p=15365"},"modified":"2024-10-11T13:59:47","modified_gmt":"2024-10-11T12:59:47","slug":"pci-dss-compliance-5-common-mistakes-to-avoid","status":"publish","type":"project","link":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/","title":{"rendered":"PCI DSS Compliance: 5 Common Mistakes to Avoid"},"content":{"rendered":"\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>PCI DSS, the worldwide Payment&nbsp;Card&nbsp;Industry Data Security Standard, is designed to help e-commerce merchants process&nbsp;card&nbsp;payments securely and reduce&nbsp;card&nbsp;fraud.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>There are 12 high level requirements, in six categories, encompassing the storage, transmission and processing of cardholder data. These were established by the PCI&nbsp;Security Standards Council (SSC) but they are enforced by the main payment card brands, who can impose fines for non-compliance that are \u201cpassed from the&nbsp;Card&nbsp;Scheme&nbsp;to the&nbsp;acquirer&nbsp;and then onto the&nbsp;merchant\u201d.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The message is clear: if you take card payments, PCI DSS Compliance applies to you. So why do some merchants remain non-compliant and risk hefty fines, reputational damage and potentially losing their ability to accept card payments? Here are five common mistakes that we at Dionach regularly see in the course of our work as a PCI Qualified Security Assessor (QSA) and Forensic Investigator (PFI).<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The cost involved in dealing with the fall-out of a data breach will far exceed the cost of becoming PCI DSS-compliant.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">1.Underestimating the Likelihood and Impact of a Data Breach<\/h2>\n\n\n\n<p>Don\u2019t fall into the trap of underestimating the sophistication of today\u2019s cyber criminals or thinking that the worst won\u2019t happen to you! Unfortunately payment card fraud is an everyday occurrence. Fraudsters are part of a highly organised supply chain, and they make their living by stealing cardholder data and selling it on.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Any weak links in your security posture exposes you to immediate risk. For instance, hackers will leap on new security releases for common e-commerce platforms and attempt to reverse-engineer them and exploit merchants\u2019 sites that have not yet been updated. If you had adhered to PCI DSS controls, you would have patched your site within the recommended window and beaten the hackers to it.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>If you do suffer a data breach, it\u2019s likely you\u2019ll be fined by the card company (via your acquiring bank) and have to hire an independent forensic investigator and a PCI QSA to produce a Report on Compliance for the acquirer. If compliance isn\u2019t reached by their deadline, more fines may follow. This is quite apart from the commercial and reputational damage.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Let me put it plainly: non-compliance makes it easier for attackers to compromise your site \u2013 and the cost involved in dealing with the fall-out of a data breach will far exceed the cost of becoming PCI DSS-compliant.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Any weak links in your security posture exposes you to immediate risk.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">2. Assuming PCI DSS Compliance Doesn&#8217;t Apply to You<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>a. Data transmission counts!<\/strong><\/h3>\n\n\n\n<p>PCI DSS doesn\u2019t just apply to the storage of card details but also to their transmission and processing.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>For instance, if you receive payment calls over a VoIP line, or if your website users can submit credit card details via a form that you then forward on, you are transmitting card data. If you take telephone payments and enter card details into a vendor\u2019s payment portal via a workstation, this is also transmission and the workstation \u2013 and anything on that network \u2013 will be in scope.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>b. Outsourced card processing? You still have responsibilities<\/strong><\/h3>\n\n\n\n<p>Even when you\u2019ve outsourced all aspects of card processing to a payment provider such as Sage Pay or Worldpay, there is still a security risk inherent in your website\u2019s redirection to the third-party \u2013 for instance an attacker could alter the payment options form in order to compromise credentials. So your website will be subject to some PCI DSS controls, usually Self-Assessment Questionnaire (SAQ) A.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>You also have two areas of responsibility when it comes to verifying the compliance of your chosen hosting provider. Firstly you need to see evidence of their compliance by asking for their PCI DSS Attestation of Compliance (AOC), which needs to cover your specific payment environment and should be co-signed by a PCI QSA. Don\u2019t be fobbed off with other standards such as ISO 27001, even if accompanied with a statement saying this is sufficient. It is not.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Be warned that just because a payment provider is well-known in its niche or has high-profile clients, it does not necessarily mean they are PCI DSS-compliant.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Secondly you must scrutinise the proposed agreement with the payment provider to ensure that they are responsible for their cardholder data environment. This is to make sure that you as the merchant are not liable in the event of a breach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Completing the Wrong Self-Assessment Questionnaire (SAQ)<\/h2>\n\n\n\n<p>The SAQ you need to complete depends on your particular payment set-up or merchant environment.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>A small shop that only handles face-to-face payments might be eligible to complete SAQ B with roughly 34 requirements. If you\u2019re running an e-commerce site, you will fall into one of three categories: A, A-EP or D. If you don\u2019t match any of the environments as defined by the forms, the catch-all SAQ D will apply, with approximately 330 requirements.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Choosing the wrong form could make you non-compliant. We\u2019ve seen large organisations complete the wrong one if their finance function is tasked with it without sufficient technical knowledge of the company\u2019s processes. Usually they pick the SAQ A, with 25 requirements, instead of the form that is applicable to their actual circumstances that is likely to have far more.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>What will happen in this instance? If your data is compromised, and after the forensics investigation report is completed, you will be given 90 days by the acquirer to become PCI DSS-compliant. This is likely to be a stressful and time-consuming undertaking. For instance, complying to SAQ D within 90 days is normally not possible due to the volume and depth of the requirements, even for well-resourced organisations.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In fact, it is often easier to change your business operations to match the requirements of the SAQ, rather than vice versa. This may still prove challenging if done within the short timeframe of a post-compromise deadline.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Misunderstanding the Role of Network Vulnerability Scans<\/h2>\n\n\n\n<p><strong>a. They do not make you fully PCI DSS-compliant\u2026.<\/strong><\/p>\n\n\n\n<p>A passing vulnerability scan conducted by a PCI Approved Scanning Vendor (ASV) only makes your site compliant with a small subset of PCI DSS controls.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Some vendors may even provide you with a PCI DSS compliance badge or icon following completion of these scans, but unfortunately this is misleading because you are not fully compliant.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>b. \u2026.but are a key part of cyber security best practice!<\/strong><\/p>\n\n\n\n<p>However, conducting regular vulnerability scans is a very good idea in the interests of pre-empting problems in your environment; you can view them as a regular health check. Signing up to an automated scanning service will probably provide you with at least four vulnerability scans a year and the opportunity to analyse and investigate anything unexpected.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Not Prioritising Compliance<\/h2>\n\n\n\n<p>Complying with PCI DSS, like with any information security standard, makes good business sense \u2013 quite apart from your contractual responsibility. Ultimately the standard sets out a framework that will help you reassure your customers that you are doing your utmost to protect their data.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Turning compliance to your advantage is the most successful approach in cyber security. Ensure someone is tasked with responsibility for PCI DSS, and that they have the time and resources to achieve and maintain compliance. They should have the backing of management in order to overcome any technical or cultural hurdles that arise.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>It\u2019s always worth considering additional controls beyond the minimum requirements, such as an alert when files and directories on your e-commerce site unexpectedly change (File Integrity Monitoring or FIM). Also, vulnerability scans are a vital element of compliance and certainly have their place in cyber security best practice \u2013 but they are no substitute for penetration tests which incorporate a technical and manual evaluation. Companies typically engage us when launching a new website or when making major changes, but the ideal approach is to conduct penetration tests on an annual basis. I can say that I have never had to perform a post-breach Report on Compliance for a customer that had a programme of regular penetration tests \u2013 so that\u2019s testament to their value.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>My final piece of advice is to build compliance into your plans from the outset. Agree with your web developers to use an SAQ A-compatible implementation to minimise your compliance burden.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Turning compliance to your advantage is the most successful approach in cyber security.<\/p>\n<\/blockquote>\n\n\n\n<p>In summary those companies that ignore compliance do so at their peril. The risk of suffering a data breach is high and will have significant consequences on your customers and your business.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Find out more about how we can help your business achieve\u00a0<a href=\"https:\/\/www.dionach.com\/services\/compliance\/pci-dss\/\">PCI compliance\u00a0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PCI DSS, the worldwide Payment&nbsp;Card&nbsp;Industry Data Security Standard, is designed to help e-commerce merchants process&nbsp;card&nbsp;payments securely and reduce&nbsp;card&nbsp;fraud. There are 12 high level requirements, in six categories, encompassing the storage, transmission and processing of cardholder data. These were established by the PCI&nbsp;Security Standards Council (SSC) but they are enforced by the main payment card brands, [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":18022,"template":"","class_list":["post-15365","project","type-project","status-publish","has-post-thumbnail","hentry","wpbf-post"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PCI DSS Compliance: 5 Common Mistakes to Avoid - Dionach<\/title>\n<meta name=\"description\" content=\"PCI DSS, the worldwide Payment&nbsp;Card&nbsp;Industry Data Security Standard, is designed to help e-commerce merchants process&nbsp;card&nbsp;payments\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PCI DSS Compliance: 5 Common Mistakes to Avoid - Dionach\" \/>\n<meta property=\"og:description\" content=\"PCI DSS, the worldwide Payment&nbsp;Card&nbsp;Industry Data Security Standard, is designed to help e-commerce merchants process&nbsp;card&nbsp;payments\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-11T12:59:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_112344183.jpeg?fit=2048%2C1365&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/\"},\"author\":{\"name\":\"Dionach by Nomios\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/cda8ad8b5715b4d431547564ed6a9ca9\"},\"headline\":\"PCI DSS Compliance: 5 Common Mistakes to Avoid\",\"datePublished\":\"2019-10-10T09:41:14+00:00\",\"dateModified\":\"2024-10-11T12:59:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/\"},\"wordCount\":1444,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/AdobeStock_112344183.jpeg?fit=2048%2C1365&ssl=1\",\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/\",\"name\":\"PCI DSS Compliance: 5 Common Mistakes to Avoid - Dionach\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/AdobeStock_112344183.jpeg?fit=2048%2C1365&ssl=1\",\"datePublished\":\"2019-10-10T09:41:14+00:00\",\"dateModified\":\"2024-10-11T12:59:47+00:00\",\"description\":\"PCI DSS, the worldwide Payment&nbsp;Card&nbsp;Industry Data Security Standard, is designed to help e-commerce merchants process&nbsp;card&nbsp;payments\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/AdobeStock_112344183.jpeg?fit=2048%2C1365&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/AdobeStock_112344183.jpeg?fit=2048%2C1365&ssl=1\",\"width\":2048,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/pci-dss-compliance-5-common-mistakes-to-avoid\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\",\"item\":\"https:\\\/\\\/dionach.com\\\/nl\\\/project\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"PCI DSS Compliance: 5 Common Mistakes to Avoid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/cda8ad8b5715b4d431547564ed6a9ca9\",\"name\":\"Dionach by Nomios\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"caption\":\"Dionach by Nomios\"},\"sameAs\":[\"http:\\\/\\\/Dionach\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PCI DSS Compliance: 5 Common Mistakes to Avoid - Dionach","description":"PCI DSS, the worldwide Payment&nbsp;Card&nbsp;Industry Data Security Standard, is designed to help e-commerce merchants process&nbsp;card&nbsp;payments","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/","og_locale":"nl_NL","og_type":"article","og_title":"PCI DSS Compliance: 5 Common Mistakes to Avoid - Dionach","og_description":"PCI DSS, the worldwide Payment&nbsp;Card&nbsp;Industry Data Security Standard, is designed to help e-commerce merchants process&nbsp;card&nbsp;payments","og_url":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_modified_time":"2024-10-11T12:59:47+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_112344183.jpeg?fit=2048%2C1365&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@dionachcyber","twitter_misc":{"Geschatte leestijd":"7 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/"},"author":{"name":"Dionach by Nomios","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9"},"headline":"PCI DSS Compliance: 5 Common Mistakes to Avoid","datePublished":"2019-10-10T09:41:14+00:00","dateModified":"2024-10-11T12:59:47+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/"},"wordCount":1444,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"image":{"@id":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_112344183.jpeg?fit=2048%2C1365&ssl=1","inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/","url":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/","name":"PCI DSS Compliance: 5 Common Mistakes to Avoid - Dionach","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_112344183.jpeg?fit=2048%2C1365&ssl=1","datePublished":"2019-10-10T09:41:14+00:00","dateModified":"2024-10-11T12:59:47+00:00","description":"PCI DSS, the worldwide Payment&nbsp;Card&nbsp;Industry Data Security Standard, is designed to help e-commerce merchants process&nbsp;card&nbsp;payments","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_112344183.jpeg?fit=2048%2C1365&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2024\/10\/AdobeStock_112344183.jpeg?fit=2048%2C1365&ssl=1","width":2048,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/project\/pci-dss-compliance-5-common-mistakes-to-avoid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Projects","item":"https:\/\/dionach.com\/nl\/project\/"},{"@type":"ListItem","position":3,"name":"PCI DSS Compliance: 5 Common Mistakes to Avoid"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9","name":"Dionach by Nomios","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","caption":"Dionach by Nomios"},"sameAs":["http:\/\/Dionach"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/project\/15365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/project"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/project"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/12"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/project\/15365\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media\/18022"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=15365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}