1. Secure networks must be in place to prevent cybercriminals from easily eavesdropping on transactions. Part of this requirement is enforcing secure authentication methods for users and allowing them to frequently change passwords.
2. All user data collected must be stored securely. Data must be encrypted when being transmitted via public networks.
3. All systems must stay updated to prevent security vulnerabilities and must use updated anti-virus, anti-malware and other security protection services.
4. Data access must be restricted. Businesses shouldn’t ask for anything more than what’s required and all users of the network must have unique credentials. Any physical documents must be destroyed when no longer needed to prevent unauthorized access.
5. Networks must be maintained and monitored for optimal security at all times.
6. Networks must be maintained and monitored for optimal security at all times.