• Services
    • Technical Services
    • Cloud & Data Centers
    • Internet Access
    • Internet Security
  • Cities
    • City of Industry
    • City of Commerce
    • Los Angeles
    • Santa Fe Springs
  • Promotions
  • Customer portal
  • Global IT Home
  • Services
    • Technical Services
    • Cloud & Data Centers
    • Internet Access
    • Internet Security
  • Cities
    • City of Industry
    • City of Commerce
    • Los Angeles
    • Santa Fe Springs
  • Promotions
  • Customer portal
  • Global IT Home
info.globalit.com / Computer Security / Best Network Security Practices for Merchant Processing

Best Network Security Practices for Merchant Processing

08/18/2014Tony Rare2 CommentsComputer Security, Internet Security, IT Services

Cards and padlock online banking, credit card transactions, trading, protection, fraud, identity theft, etc.

Best Network Security Practices for Merchant Processing

Protecting and securing consumer data should be an imperative policy. Securing consumer data can increase consumer shopping confidence and add value to your business reputation. Here are some guidelines for safeguarding merchant terminals from internet hackers. While not all the policies listed below may be necessary, it is recommended that you properly understand all network vulnerabilities and implement a series of policies based on potential exposure.

  • Purchase a leading Anti-Virus and stay patched, updated.
  • Review firewall configurations and ensure that only allowed ports, services, and Internet protocol (IP) addresses are communicating with your network. This is especially critical for outbound (e.g., egress) firewall rules in which compromised entities allow ports to communicate to any IP address on the Internet. Hackers leverage this configuration to ex-filtrate data to their IP addresses.
  • Segregate payment processing networks from other networks.
  • Apply access control lists (ACLs) on the router configuration to limit unauthorized traffic to payment processing networks.
  • Create strict ACLs segmenting public-facing systems and back-end database systems that house payment card data.
  • Implement data leakage prevention/detection tools to detect and help prevent data exfiltration.
  • Implement tools to detect anomalous network traffic and anomalous behavior by legitimate users (compromised credentials).

Resources: US-CERT – Department of Homeland Security

See related links:

Securing Remote Control Software and Stations

Best Practices for Cash Register and PoS Security

Backoff Point-of-Sale Malware US-CERT Alert (TA14-212A)

Responses (2)

  1. Traci
    09/26/2014 at 5:36 PM · Reply

    Nice site, good information!

Leave a reply

Cancel reply

Your email address will not be published. Required fields are marked *

Prev Post
Next Post
Facebook X-twitter Yelp Instagram Linkedin
  • Technical Services
  • Cloud & Data Centers
  • Internet Access
  • Internet Security
  • Global IT Home
  • Technical Services
  • Cloud & Data Centers
  • Internet Access
  • Internet Security
  • Global IT Home

© 2025 Global IT™ All Rights Reserved with Trademark

  • Visit Us – 5150 Wilshire Blvd, Suite 400. Los Angeles, CA 90036
  • Acceptable Use Policy
  • Privacy Policy