


#Nodus hacked software#
Direct connections have given way to the cheap interconnectivity of the Internet, costly dedicated hardware has been replaced by software, and business line software solutions have automated payment acceptance. The configuration consisted of a terminal that included software and direct connection (POTS) to the payment processor.īut as the Internet, software and mobile have proliferated, dedicated hardware solutions have been replaced. Before the Internet, processing a credit card by using a dedicated terminal was relatively safe. The first thing merchants must do to protect themselves is understand their environment when collecting a credit card. In a case like this, the merchant will experience fines, loss of reputation/business, and possible loss of ability to accept credit cards as a form of payment altogether. The responsibility to protect private cardholder data falls fully on the merchant.

We all know how this story goes – “may have” turns into “a small number of customers were affected” turns into “all customers should monitor their credit cards and credit reports for suspicious activity.” When will this stop? Only when merchants understand the responsibility they signed up for when agreeing to accept credit cards as a form of payment. Another local company recently sent out notices to customers stating they “may have” experienced a breach of their system.
