Putting in malicious software built to breach brick-and-mortar POS components and software and accumulate card information for the duration of transactions Use powerful cryptography when transmitting cardholder facts across open, general public networks. These two requirements be sure that you secure information both of those at rest and in motion. https://www.nathanlabsadvisory.com/blog/tag/incident-response/