As part of your business, you electronically receive, process, store and transmit a wide range of confidential information, including sensitive customer information and personal consumer data.
Fake access points and evil twins are among the most common wireless network attacks, maintain an inventory of authorized wireless access points and implement incident response procedures in the event unauthorized wireless access points are detected. More than that, test for the presence of wireless access points and detect unauthorized wireless access points on a quarterly basis.
Want to check how your Card Not Present Processes are performing? You don’t know what you don’t know. Find out with our Card Not Present Self Assessment Toolkit: