Wi-Fi Security

A Wi-Fi connection to the internet can be less secure than wired connections because a cybercriminal does not require physical access to gain entry into the network. In order to secure a wireless network and to meet PCI compliance standards, there are two encryption protocols currently used by IT professionals.
Wi-Fi Security Protocols
Wireless Protected Access — known familiarly as WPA — and WPA2 were developed to improve the security of Wi-Fi connections by requiring the use of wireless encryption. WPA2 requires a stronger encryption than WPA, but IT professionals say it also may slow down the network's performance. Both protocols provide Wi-Fi users with a high level of security and can help minimize the risk of a breach.
Securing a Wireless Network to Achieve PCI Compliance
Wireless Protected Access — known familiarly as WPA — and WPA2 were developed to improve the security of Wi-Fi connections by requiring the use of wireless encryption. WPA2 requires a stronger encryption than WPA, but IT professionals say it also may slow down the network's performance. Both protocols provide Wi-Fi users with a high level of security and can help minimize the risk of a breach.
Wi-Fi Security Protocols
Industry regulations for PCI compliance require merchants to protect cardholder data and any payment card information, whether it is printed, processed, transmitted or stored. It requires organizations to extend the same level of security from the wired network to the wireless network and provides specific guidelines as to how to protect point-of-sale data over the wireless network.
Additionally, merchants should have secure Wi-Fi as it is defined and required by PCI regulations, including but not limited to the following:
  1. The merchant should ensure that only trusted individuals have access to the payment application and its associated environment
  2. The mobile device should be stored in a secure location when it is not in use. The merchant should consider locking the mobile device to the merchant's physical location when possible
  3. The merchant should place mobile devices in a location that offers the greatest level of security (less customer and employee access), observation, and monitoring when possible
  4. Where data passes through a network under the merchant's control (e.g., Wi-Fi or Bluetooth®), ensure that the network is implemented as a secure network
Wi-Fi Network Security
The PCI Security Standards Council states the following key points:
  1. Even if an organization that must comply with PCI DSS does not use wireless networking as part of the cardholder data environment (CDE), the organization must verify that its wireless networks have been segmented away from the CDE and that wireless networking has not been introduced into the CDE over time
  2. Although the PCI DSS outlines requirements for securing existing wireless technologies, there are validation requirements that extend beyond the known wireless devices and require monitoring of unknown and potentially dangerous rogue devices
  3. A rogue wireless device is an unauthorized wireless device that can allow access to the CDE; wireless networks can be considered outside of PCI scope if no wireless is deployed or if wireless has been deployed and segmented away from the CDE
  4. Regardless of whether wireless networks have been deployed, periodic monitoring is needed to keep unauthorized or rogue wireless devices from compromising the security of the CDE
  5. Segmenting wireless networks out of PCI scope requires a firewall between the wireless network and the CDE
Increase Security with Strong Passwords
The best passwords are designed to be difficult to discover through intelligent guessing. Security experts recommend the following password guidelines to help maximize Wi-Fi security:
  1. Use a minimum password length of 12 to 14 characters, or as many as the software allows
  2. Include lowercase and uppercase alphabetic characters, plus numbers and symbols if allowed
  3. Generate passwords randomly if possible
  4. Avoid using the same password twice in multiple user accounts or software systems
  5. Avoid character repetition, keyboard patterns or letter/number sequences
  6. Don't use relatives' or pets' names, ancestors' names, birthdays, anniversaries or ID numbers