Showing posts tagged with 'Technology'

November 4, 2013

2Checkout Podcast #1: Welcome to 2Checkout

Posted by 2Checkout Category Icon2Checkout Category IconTechnology
2Checkout first ever podcast about the newest innovations and developments at 2Checkout

In 2Checkout’s very first podcast, CEO Tom Dailey and Product Manager Bob Zabloudil sit down with Content Wrangler Sean Edgar to introduce new listeners to what online payment partner 2Checkout has been up to and some of the new paths it’s been paving in international payment services. Click on the media...

Read more..

March 30, 2010

PIN Debit and Signature Debit Payments

Posted by 2Checkout Category IconTechnology

More and more people are using debit cards to help them maintain their budgets. Unlike a credit card, a debit card accesses the available funds in an existing bank account. This gives the security and convenience of having a credit card without the monthly fees or interest rates. The popularity of debit card use is increasing at roughly 12 percent each year.

Because of this popularity, many online merchants are more than happy to accept debit...

Read more..

January 15, 2010

Back Office Admin API

Posted by 2Checkout Category Icon2Checkout Category IconTechnology

If you remember my last post in 2009, you may recall a little tease at the end saying that we had some big plans for this year. Well, I’m happy to post that our first announcement this year is the release of our back office API to help you manage your sales. Ever wanted to mark an item as “shipped”, refund an order, or cancel a recurring billing without logging into the Vendor Area? Now you have the tools to do so.

I want to thank all...

Read more..

January 8, 2010

Clearing the Mystery of PCI Compliance – Final Thoughts

Posted by 2Checkout Category Icon2Checkout Category IconTechnology

In previous weeks we have been looking at how to become PCI compliant. I will confess, that starting on this article series I knew next to nothing about PCI DSS. Research for this series was, for me, very educational. The first thing I realized was how involved and complicated compliance can be. The next, and more important realization is that compliance is a process, and never actually ends. From SearchSecurity.com:

“Compliance is not...

Read more..

December 11, 2009

Clearing the Mystery of PCI Compliance (Part6)

Posted by 2Checkout Category Icon2Checkout Category IconTechnology

This week, we move on from creating our secure network and start to develop a system to monitor the network, alert us if there is any suspicious activity, and regularly test our security procedures. We have moved on to two parts of PCI compliance that need to continue through the life of our company. These categories are more involved both technically and administratively than requirements that we looked at in past weeks. These requirements address...

Read more..

December 4, 2009

Clearing the Mystery of PCI Compliance (Part5)

Posted by 2Checkout Category Icon2Checkout Category IconTechnology

Over the past four weeks we have been taking a look at becoming PCI compliant. We have set up our network, we are encrypting customer’s data, Our anti-virus program is installed and updated, and we are taking steps to make sure our network and software is secure. I feel good about this, and I think we have learned some useful information. Now, we will Implement Strong Access Control Measures:

Requirement 7: Restrict access to cardholder...

Read more..

November 26, 2009

Clearing the Mystery of PCI Compliance (Part 4)

Posted by 2Checkout Category Icon2Checkout Category IconTechnology

Last week we looked at Anti-Virus(AV) software. This provides us with a reasonable level of protection so that we can protect our customers’ information. However, new threats are always being released and we need to make sure we keep updated on the latest virus or new security threat. We also need to have a place to test out software and hardware updates, as well as a place to try new shopping carts, or new pieces of code that will make our...

Read more..

November 20, 2009

Clearing the Mystery of PCI Compliance (Part 3)

Posted by 2Checkout Category Icon2Checkout Category IconTechnology

We are at the half-way mark in becoming PCI Compliant. We took a little break for Fraud Awareness Week and now we are ready to “Maintain a Vulnerability Management System”. Our previous efforts have been focused on Building and Maintaining a Secure Network and Protecting Cardholder Data. We now have a firewall, clear policies regarding the type of information we will store, and the length of time we will store it. We even have encryption software...

Read more..

October 30, 2009

Clearing the Mystery of PCI Compliance (Part 2)

Posted by 2Checkout Category Icon2Checkout Category IconTechnology

Last week I wrote an article detailing how to comply with the first two PCI DSS Standards. In this article, I will show what is involved in complying with the two requirements in the “Protect Cardholder Data” standard.

Requirement 3: Protect stored cardholder data

Requirement 4: Encrypt transmission of cardholder data across open, public networks

We have provided a secure network to collect and store our customer’s...

Read more..

October 23, 2009

Clearing the Mystery of PCI Compliance (Part 1)

Posted by 2Checkout Category Icon2Checkout Category IconTechnology

This is the first is a twelve-part series detailing what is involved with PCI compliance. Earlier, Warner gave a very good overview of PCI DSS compliance.

“PCI DSS (Payment Card Industry Data Security Standard) is a security standard that applies to companies handling credit card numbers. The PCI level of enforcement differs based on the volume of transactions that a company handles.”

My purpose with this series is to provide the...

Read more..