ThinKiosk - Software defined Windows Thin Clients

A software-only solution that repurposes existing Windows devices into secure, fully-featured, centrally managed Windows thin clients.

View Product

Key Benefits

  • Repurpose existing hardware
  • Familiar Windows interface
  • Centralized management
  • Maximise your VDI investment
  • Support for Citrix, VMware and Microsoft

Secure Remote Worker - Secure connectivity from a personal Windows device

A software-only solution that turns a personal Windows device into a secure software defined thin client enabling secure remote access and BYOD.

View Product

Key Benefits

  • Connect from Personal Devices
  • PCI Compliance
  • End Point Validation
  • Easy Deployment
  • Remove logistical complexities

IntelliPerform - Powering the optimization of desktop performance

A software optimization solution that maximizes the performance of desktop infrastructure resources.

View Product

Key Benefits

  • CPU Optimization
  • Memory Optimization
  • Advanced rules-based engine
  • Comprehensive reporting tools
  • Centralized management
18 March 2021

How to Ensure PCI Compliance in Remote BYOD Environments


PCI DSS compliance in BYOD & remote working environment

Data protection is essential for today’s organisations, but with cybercrime on the rise and employees working from less-secure environments, information security has become more challenging than ever.

Clients also expect organisations to meet strict compliance standards, both in the office and at home. One of these is the Payment Card Industry Data Security Standard (PCI DSS), designed to ensure that companies can securely process, store, or transmit credit card information.

Without the correct PCI compliance measures in place, data breaches can result in fines of up to €20 million or 4% of your annual global turnover, whichever is greater. On top of that, payment brands can fine financial institutions for non-compliance, and financial institutions can withdraw the ability to accept card payments from non-compliant merchants.

Aside from the financial damage, non-compliant companies face significant long-term damage to their brand’s reputation. In the event of a data breach and stolen credit card information, customer loyalty drops rapidly and all trust goes out the window, taking years to rectify.

For many companies, a big part of the solution is to provide pre-configured corporate equipment to their employees, making it easier to maintain security and PCI compliance across their entire workforce. But what about companies that rely on employee-owned equipment to get the job done, otherwise known as BYOD (Bring Your Own Device)?

Considerations About BYOD Security

Looking at it more closely, the BYOD model essentially invites employees to introduce personal devices into corporate environments. In some industries, particularly the contact centre and BPO space, companies would actively forbid agents from bringing mobile phones, laptops, tablets, or smart devices onto the operations floor.

Of course, COVID-19 changed all that. With much of the workforce now working from home, organisations and clients must consider BYOD a viable option, especially when the provision of corporate devices is out of the question.

BYOD has its benefits. It’s cost-effective, makes onboarding a more efficient process, and it’s much easier to scale up your workforce when there are no corporate devices to ship out. The main problem with BYOD is a lack of control. With employee devices, companies don’t have the same level of access as they do with corporate machines, so it’s more challenging to plug security vulnerabilities. On top of that, there’s a significant risk of disastrous data breaches, as employees have complete freedom to navigate to insecure websites or download malicious applications.

Thankfully, there are ways to reduce and even eliminate these risks, ensuring that any BYOD network can operate with full PCI compliance. So, unless you’re ready to cough up 20 million big ones, you’d better read on.


Start with a Security Awareness Program

One of the biggest reasons employees open the floodgates to cybercrime is that they’re frankly unaware of the dangers.

From day one, it’s essential to educate all personnel about internal security policies and the appropriate way to use computers for work purposes. At least once a year, ensure that your workforce is up-to-date on any changes to procedures, especially those related to work-at-home and BYOD.


Update Your Processes

It’s much easier to monitor workers in the office as they take over-the-phone card payments, but when you’re unable to keep watch, you need secure, up-to-date processes in place to prevent the worst from happening.

Remote BYOD employees should pass through robust multi-factor authentication processes when accessing any systems that deal with customer data, drastically reducing the risk of any unauthorised access. Likewise, a strict clean desk policy can ensure that employees don’t bring pens, paper, mobile phones, or other capturing devices into their workspace.


Provide the Latest and Greatest Technology

Although BYOD workers don’t use company-approved hardware, organisations can ensure they use secure, PCI-compliant software.

Companies should provide all BYOD employees with robust firewalls and virus protection, continuously updating them to the latest versions. Ideally, configure them in a way that prevents users from disabling them.

It’s also possible to implement virtual desktop infrastructure (VDI), enabling organisations to protect and manage sensitive applications from a central location. With VDI in place, companies can restrict employees access to specific tools and keep corporate data separate from the BYOD machine. However, poor connectivity or incompatible devices can limit the viability of VDI, so be sure to understand the minimum requirements for it to function.


Implement a Secure Workspace Environment

Like VDI, a secure workspace environment can turn a non-corporate or personal Windows device into a secure BYOD solution that facilitates PCI-compliant remote access.

These platforms provide a secure, PCI DSS-compliant workspace environment with endpoint lockdown security and application control. Some of them include built-in location awareness and enable dynamic permissions updates based on an endpoint's local network and centrally managed policies. Look for a solution with the tools to manage, troubleshoot, update, and scale your entire BYOD environment from a single console, like Thinscale’s Secure Remote Worker.

Remember that PCI compliance with BYOD requires more than one solution; it also takes a firm commitment from both the organisation and its employees to adhere to specific practices and handle data responsibly.

That said, if your company is interested in adopting a secure workspace environment solution as part of a complete PCI compliance plan for BYOD, Thinscale can help with that.

Want to learn more about how ThinScale can help you keep PCI compliance in your endpoint environments? Click below to get in touch!Contact us

Back to all

Subscribe For Future Updates

If you would like to stay up to date with our latest news and updates, please let us know by clicking the subscribe button.