{"id":27912,"date":"2017-10-24T04:00:00","date_gmt":"2017-10-24T08:00:00","guid":{"rendered":"https:\/\/goebt.com\/https-blog-cdesolutions-com-2017-10-secure-hardware-storage-why-it-matters-for-your-merchants\/"},"modified":"2025-04-02T13:31:57","modified_gmt":"2025-04-02T17:31:57","slug":"secure-hardware-storage-why-it-matters-for-your-merchants","status":"publish","type":"post","link":"https:\/\/goebt.com\/secure-hardware-storage-why-it-matters-for-your-merchants\/","title":{"rendered":"Secure Hardware Storage: Why It Matters for Your Merchants"},"content":{"rendered":"<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" style=\"\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><\/p>\n<p>What\u2019s the first word that comes to mind when you think about PCI compliance? Most likely \u201csecurity\u201d (or perhaps the word \u201cheadache\u201d). But in either case, hardware storage is probably not your top consideration. And yet, PCI compliant hardware storage is absolutely crucial for your merchants\u2019 data security.<\/p>\n<p> <!--more--><\/p>\n<p><b>Protect Your Merchants<\/b><\/p>\n<p>Unsecured encryption keys, PIN pads and POS terminals can be a gold mine for data thieves and a nightmare for merchants. Thus, PCI has put a number of stringent <a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/PCI_PTS_POI_SRs_v4_Final.pdf\" rel=\"noopener\">requirements<\/a> in place regarding device management, including how equipment is \u201cproduced, controlled, transported, stored and used.\u201d These standards ensure that at all points in the life cycle, devices are protected from unauthorized access.<\/p>\n<p><b>Look for Qualified Vendors<\/b><\/p>\n<p>So what should payment service providers look for to protect your merchants\u2019 devices? Work with vendors that are PCI-PIN validated. Approved vendors, including <a href=\"https:\/\/www.cdesolutions.com\/\" rel=\"noopener\">CDE Solutions<\/a>,&nbsp; have done the rigorous work involved in establishing dual-control secure storage and chain-of-custody tracking that meets PCI specifications. Bottom line, by partnering with a PCI compliant support partner for hardware storage, payment service providers can greatly reduce the risk of equipment compromise prior to merchant deployment.<\/p>\n<p><b>Meeting Security Standards<\/b><\/p>\n<p>Wondering what makes hardware storage secure? Here\u2019s an overview of the specifications:<\/p>\n<ul>\n<li>POIs are kept in locked storage with dual access control.<\/li>\n<li>POI access is highly employee restricted.<\/li>\n<li>POIs are both stored and shipped with tamper-evident security features<\/li>\n<li>The vendor documents the POI\u2019s complete chain of custody.<\/li>\n<\/ul>\n<p>For more in depth details, you can review the standards <a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/PCI_PTS_POI_SRs_v4_Final.pdf\" rel=\"noopener\">here<\/a>.&nbsp; These measures, and more, are designed to protect device integrity, ensuring optimal function in the field and protection for merchants and consumers.<\/p>\n<p>When considering the runaway disaster of data breaches, secure hardware storage is absolutely crucial for your merchants. By partnering with a PCI compliant hardware storage provider, you can help your merchants avoid this danger. After all, PCI standards are not just paperwork, they\u2019re truly best practice.<\/p>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What\u2019s the first word that comes to mind when you think about PCI compliance? Most likely \u201csecurity\u201d (or perhaps the word \u201cheadache\u201d). But in either case, hardware storage is probably not your top consideration. And yet, PCI compliant hardware storage is absolutely crucial for your merchants\u2019 data security.<\/p>\n","protected":false},"author":244,"featured_media":27913,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1],"tags":[227,218],"class_list":["post-27912","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-important-announcement","tag-best-practices","tag-security"],"_links":{"self":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/27912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/users\/244"}],"replies":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/comments?post=27912"}],"version-history":[{"count":1,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/27912\/revisions"}],"predecessor-version":[{"id":31215,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/27912\/revisions\/31215"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/media\/27913"}],"wp:attachment":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/media?parent=27912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/categories?post=27912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/tags?post=27912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}