March 16, 2015 By Bob Violino 2 min read

A bad trend among information security executives may be good news for cybercriminals. The majority of businesses — 80 percent — fail their interim Payment Card Industry Data Security Standard (PCI DSS) compliance assessment, leaving them open to potential attacks.

That’s according to the 2015 PCI Compliance Report by Verizon, which the firm released on March 12. The fourth annual report analyzes PCI compliance efforts and how they sync with data security breaches worldwide in a variety of industries.

The report encompasses three years of data and includes results from PCI assessments performed by Verizon PCI-qualified security assessors, who examined compliance efforts at large, multinational firms in more than 30 countries. The study includes analysis of each of the 12 PCI requirements.

Verizon says its research has shown for several years that companies victimized by data breaches tend to have lower-than-average compliance with PCI DSS controls.

One of the more telling findings of the latest PCI compliance report are that a mere 29 percent of organizations remain fully PCI DSS-compliant less than a year after being validated for compliance. On the positive side, nearly twice as many businesses received compliance validation during their interim review last year, in relation to 2013.

Companies need to take continuous compliance more seriously if they are to protect themselves against the kinds of attacks recently experienced by companies such as Home Depot and Sony Pictures Entertainment.

“Today’s cybersecurity landscape is constantly changing,” said Rodolphe Simonetti, managing director of professional services for Verizon Enterprise Solutions. “Compliance at [this] point in time isn’t sufficient to protect data. Putting the focus on making compliance sustainable is key. It must be a part of day-to-day activities within an organization’s greater security strategy.”

Among the areas in which companies typically fail with regard to PCI compliance, Simonetti says, are regularly testing security systems, maintaining secure systems and protecting stored data.

The recent rash of data breaches serves as a reminder of how important it is to maintain strong security practices, and organizations need to look at PCI DSS compliance as a key component of their cybersecurity and risk management strategy.

More from

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

Security roundup: Top AI stories in 2024

3 min read - 2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been exploring new ways to compromise systems with intelligent attacks.With the AI landscape rapidly evolving, it's worth looking back before moving forward. Here are our top five AI security stories for 2024.Can you hear me now? Hackers hijack audio with AIAttackers can fake entire conversations using large language models (LLMs), voice cloning and speech-to-text software. This method is relatively easy to…

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today