Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » PCI DSS » Card Skimmer

Card Skimmer

Card skimmer is a device attached to the card reader that skims and steals the card information like card number, expiration date, and CVV code. This device reads the debit/credit card information from the magnetic stripe at the back of the card and stores it in its memory module. Generally, a card skimmer is placed in ATMs, shopping malls, petrol pumps, or other Point of Sales (POS) terminals to steal the card information of shoppers. Cybercriminals use this information for unauthorized purchases or to create counterfeit cards.

Additional reading

Information Assurance vs Cybersecurity

Information Assurance vs Cybersecurity: Differences & Similarities

Information assurance and cybersecurity are terms that find their way into every general discussion about data protection. Both disciplines protect information from being misused, destroyed, modified, or lost. However, the two terms have some significant differences that security teams and founders must note. Understanding the nuances of both disciplines is crucial for organizations to build…
CMMC Compliance Checklist

Your CMMC Compliance Checklist: Conquer The Challenges

If you’re a defense contractor, staying compliant with the Cybersecurity Maturity Model Certification (CMMC) is important to continue working with the Department of Defense (DoD).  CMMC is expected to be finalized by late 2024 and included in contracts by early 2025, so it’s time to start preparing. To help you prepare, here’s a straightforward introduction…

What Is ISO 27701 (PIMS): Benefits, Primary Focus & Steps

Data privacy is one of the major concerns of your customers, regardless of the industry you operate in. 94% of businesses believe that consumers will reject their products if they’re not reassured about their Privacy Information Management Systems (PIMS).  But there’s already a strong framework for information security: ISO 27001, so what more? Think of…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.