A clear, human-first guide to securing card payments and protecting your customers
If your business accepts card payments—online, over the phone, or in person—then PCI DSS applies to you. It doesn’t matter if you’re a global retailer or a local gym. If you store, process, or transmit payment card data, you’re expected to follow a set of security requirements designed to reduce the risk of fraud and data breaches.
But here’s the problem: most businesses don’t actually know what PCI DSS is. Or they assume their payment provider handles it for them. Or they think it’s something only banks or big tech companies need to worry about.
That’s how breaches happen. And they’re rarely just technical failures. They’re almost always about poor understanding, weak habits, or missed responsibilities.
In this blog, we’ll break down what PCI DSS actually requires, why it matters to businesses of all sizes, and how to approach it in a way that builds confidence—not just compliance.
What Is PCI DSS?
PCI DSS stands for the Payment Card Industry Data Security Standard. It’s a set of security requirements developed by major card providers—Visa, Mastercard, American Express, Discover, and JCB—under a governing body called the PCI Security Standards Council (PCI SSC).
Its goal is simple: to protect cardholder data. That means ensuring the systems, networks, and people involved in processing credit or debit card transactions are secure enough to prevent theft, fraud, or misuse.
It’s not a UK law—but it is a contractual obligation. If you accept card payments, your merchant agreement will almost certainly include a requirement to comply with PCI DSS. And if you don’t meet the standard—or suffer a breach—you could face:
Fines from your payment processor or acquiring bank
Legal liability and compensation claims
Increased transaction fees or account suspension
Reputational damage and customer loss
So while PCI DSS isn’t enforced by the government, it’s very much enforced by the payment ecosystem. And it applies whether you process 10 card payments a year or 10,000.
Who Needs to Comply?
The short answer? Any business that accepts card payments.
PCI DSS applies to organisations of every size and sector—including:
Online retailers and e-commerce sites
In-person shops and cafes using card readers or POS systems
Charities collecting donations via card
Hotels, gyms, and membership services
Accountants, consultants, and service providers using virtual terminals
Any business that stores card data, even temporarily
The level of PCI DSS you need to meet depends on your annual transaction volume and how you process card data. There are four merchant levels, with Level 1 being the highest (typically for organisations processing over 6 million card transactions per year). But all businesses are expected to comply with some form of PCI DSS—even if you use a payment processor like Stripe, Square, or Worldpay.
If you’re using a third-party provider, they might handle some technical requirements—but you’re still responsible for things like device security, staff training, and making sure you don’t write down card numbers on a sticky note.
What Does PCI DSS Actually Require?
PCI DSS is structured around six overarching security goals, each supported by specific requirements that help you reduce risk and protect cardholder data. While the framework includes 12 core requirements, they’re grouped under these six objectives to make implementation more strategic and manageable.
Let’s walk through each goal and explain what it means in practice—and how it applies to real businesses, not just large enterprises.
1. Build and Maintain a Secure Network and Systems
The first goal focuses on making sure your systems aren’t exposed from the start. That means configuring firewalls, routers, and connected devices properly—and not relying on factory settings that attackers already know how to exploit.
This objective includes:
Requirement 1: Install and maintain a firewall to control traffic between trusted and untrusted networks
Requirement 2: Avoid vendor-supplied defaults for passwords and security settings
Example: If you’re using a card reader connected to your Wi-Fi, that router needs to be securely configured—and shouldn’t still be using “admin/admin” as login credentials. Firewalls help prevent unauthorised access from the internet or internal networks.
2. Protect Cardholder Data
This is the heart of PCI DSS. If you store, process, or transmit cardholder data, you need to protect it both while it’s stored and while it’s moving across networks.
This includes:
Requirement 3: Protect stored cardholder data (if you store it at all)
Requirement 4: Encrypt cardholder data during transmission over public networks
Example: If your business takes card payments over the phone and stores details in a spreadsheet—unencrypted—you’re in breach. Even transmitting card data through email or insecure web forms creates exposure. PCI DSS expects this data to be encrypted, masked, or eliminated where possible.
For most SMEs, the best option is to not store cardholder data at all and use a compliant third-party processor.
3. Maintain a Vulnerability Management Program
This objective is about making sure your systems don’t fall behind on security updates—and that they’re protected from known threats like malware and ransomware.
It includes:
Requirement 5: Use and regularly update anti-malware tools
Requirement 6: Patch systems and keep software up to date
Example: If your point-of-sale (POS) system or web store hasn’t had security updates in months, you’re creating unnecessary risk. Many breaches start with known vulnerabilities that haven’t been patched—even though fixes are readily available.
PCI DSS expects you to have a clear process for staying up to date, and to install critical patches as soon as practical.
4. Implement Strong Access Control Measures
This is about limiting who can access cardholder data, both physically and digitally. It’s not enough to have good systems—access needs to be restricted based on job role, and activity must be traceable to individual users.
This objective includes:
Requirement 7: Limit access based on business need-to-know
Requirement 8: Assign unique IDs to users and enforce strong authentication
Requirement 9: Restrict physical access to systems that store cardholder data
Example: Your staff shouldn’t share logins. Everyone should have their own username and password—especially if they have access to systems that handle payments. If you have staff using the same admin account, or if old employees still have access, you’re not compliant.
Even physical access matters. Paper receipts, card readers, and network-connected devices need to be kept secure—not left unattended in public or shared spaces.
5. Regularly Monitor and Test Networks
This is all about visibility. You can’t protect what you’re not monitoring. PCI DSS expects you to log activity, monitor access to systems handling card data, and regularly test your security controls.
It includes:
Requirement 10: Track and monitor access to cardholder data and systems
Requirement 11: Test security systems and processes regularly
Example: If a rogue device connects to your network or someone logs into a payment system at 3 a.m., you should know about it. Logging tools, vulnerability scans, and (for larger merchants) penetration tests help you spot problems before they escalate.
Even small businesses can benefit from basic activity logs and regular reviews—especially if they’re using cloud systems or shared workstations.
6. Maintain an Information Security Policy
Finally, PCI DSS requires that you put your expectations in writing—and make sure your team knows what to do.
This includes:
Requirement 12: Maintain policies that define how you handle security—and ensure staff follow them
Example: Your business should have a clear security policy that covers things like:
How payment data should (and shouldn’t) be handled
What devices are allowed for payment processing
How incidents are reported and escalated
What happens during onboarding, offboarding, and role changes
More importantly, your staff should be trained on it. Policies that live in a drawer—or policies no one understands—won’t help you in a breach or an audit.
Why It Matters—Even If You’re Small
It’s easy to assume PCI DSS is for the big players. You’re not a bank. You’re not Amazon. You’re just a local business taking card payments. Why would anyone target you?
But that’s exactly the problem.
Cybercriminals go after small businesses because they’re small. Because they know defences are often lighter. Because systems are set up quickly and left unmonitored. Because busy teams are juggling a thousand things—and security isn’t always at the top of the list.
And they know that even a tiny breach can give them exactly what they want.
Here’s the thing: you don’t need to store card data to be a target. Simply handling it—whether that’s processing a transaction, keying in details over the phone, or allowing a card reader to connect to an unsecure network—can create exposure. If a customer’s card is later used fraudulently and the breach is traced back to your systems or practices, your payment provider is required to investigate. And if you weren’t PCI compliant at the time? That’s when fines, increased fees, and reputational fallout kick in.
But it’s not just about avoiding penalties. It’s about trust.
Your customers hand over their card details assuming you’ve got their back. They’re not reading your compliance documents. They’re not asking what firewall you use. They’re trusting you to protect their data—just like they trust you to deliver a product, show up on time, or honour your word.
That’s why PCI DSS matters. Not because it’s another checklist, but because it gives you a clear, actionable way to protect the people who keep your business running. It helps you tighten the basics, document your approach, and give your customers confidence that their information is in safe hands.
Common Misconceptions About PCI DSS
“We don’t store card data, so we’re exempt.”
Not true. Even if you never store card details, you’re still processing them—which means PCI DSS still applies. You may have fewer requirements, but you still need to complete the correct Self-Assessment Questionnaire (SAQ) and secure your systems.
“We use Stripe/Shopify/PayPal, so they’re responsible.”
Partially true. Your provider handles much of the technical infrastructure—but you’re still accountable for what happens on your end. That includes staff behaviour, device security, and how card data is handled before it enters the system.
“Only online businesses need to worry about PCI.”
Incorrect. Whether you’re taking payments in a shop, over the phone, or via a mobile terminal, you’re processing card data—and that brings responsibility. PCI DSS applies to all environments, not just digital ones.
“It’s too complicated for a small business.”
It doesn’t have to be. With the right tools and a bit of support, most small businesses can meet their PCI DSS obligations through simple, practical steps—especially around secure payment processes and team awareness.
“We filled out the SAQ once—we’re done.”
PCI DSS isn’t a one-off exercise. The Self-Assessment Questionnaire is just one part of a broader commitment to ongoing compliance. If your systems, vendors, or processes change, your security responsibilities may change too.
“We only take payments in person, so online risks don’t apply.”
In-person payments are still vulnerable if your systems connect to networks, cloud dashboards, or back-office tools. Shared Wi-Fi, remote access, and poorly secured devices can expose payment data—regardless of how the transaction starts.
“Outsourcing means we’ve outsourced responsibility.”
Not quite. Third-party processors reduce your PCI scope, but they don’t eliminate it. You’re still responsible for securing your devices, training your staff, and following safe handling practices from start to finish.
“We’re fine because we’ve never had a breach.”
Complacency is one of the biggest risks. Just because you’ve never had an incident doesn’t mean your setup is secure—or that it will stay that way. PCI DSS is about being proactive, not waiting for something to go wrong.
Where Cybersecurity Awareness Comes In
PCI DSS has a lot to say about systems, firewalls, and encryption. But underneath the technical language, there’s a much simpler truth: compliance depends on what people do—not just what the policies say.
Even if your payment system is PCI-certified, your devices are encrypted, and your SAQ is up to date, a single careless moment can still lead to a breach. A card number written down on paper. A phone payment taken on an insecure network. An employee clicking a malicious link on the same laptop used to access payment records. None of these risks are about bad systems—they’re about everyday decisions made by people who haven’t been shown how to handle payment data securely.
That’s where cybersecurity awareness training becomes essential. It’s not just about general digital safety—it’s directly linked to PCI DSS requirements, including:
Requirement 5: Knowing how to prevent malware infections
Requirement 8: Using secure, individual logins
Requirement 9: Understanding physical access controls
Requirement 12: Following clear, enforced information security policies
The PCI DSS standard expects that your team understands these responsibilities and can act on them confidently—not just read about them once a year in a policy document. That means practical, human-focused training isn’t optional. It’s part of building and maintaining a compliant payment environment.
At Cyber Rebels, we don’t write compliance checklists or complete your SAQs for you. What we do is help your people understand what compliance looks like in the real world. Through live, jargon-free training sessions, we teach teams how to avoid costly mistakes, recognise insecure practices, and support your PCI obligations with everyday habits that stick.
Whether your team takes phone orders, works in retail, or manages back-office systems, we adapt our training to match your risks and role types. We make PCI DSS relatable—so your team doesn’t just follow the rules, they understand why the rules exist and how to apply them.
Because at the end of the day, it’s not your devices filling out compliance forms. It’s your people. And they deserve the tools, confidence, and knowledge to do it right.
From Card Data to Confidence
PCI DSS can look complex on paper—but at its core, it’s about protecting your customers, safeguarding your business, and earning trust with every transaction.
It’s not just for big retail chains or high-volume e-commerce sites. Whether you run a single card machine in a local shop, take bookings over the phone, or manage payments through an online form, PCI DSS is part of your responsibility. Not because it’s “compliance for compliance’s sake”—but because when something goes wrong with card data, the consequences fall on you.
That’s why getting to grips with the standard matters. It helps you understand your risk, put the right guardrails in place, and show your customers that their payment details are in safe hands.
But policy alone won’t protect you. Awareness is the missing piece.
If your staff don’t know what’s expected—or don’t realise how their everyday habits can expose card data—you’ll always be one mistake away from a breach. That’s why we focus on making PCI DSS real for your team, through live, practical training that connects technical requirements to day-to-day decisions.
Whether you’re starting your compliance journey, reviewing your controls, or just want to make sure your team knows how to handle payments safely, we’re here to help.
Director Of Training and Development, Cyber Rebels.
Andy Longhurst is a cybersecurity educator, web designer, and founder of Cyber Rebels. With more than a decade of experience across digital safety, adult education, and technical consultancy, he specialises in delivering practical, hands-on cyber awareness training for organisations of all sizes — from small businesses and startups to large companies, public-sector teams, and education providers.
Bringing together his background as a trainer, teacher, and IT consultant, Andy helps organisations understand and respond to real-world cyber threats in a clear, jargon-free way. His work focuses on human risk, behaviour change, and giving people the confidence to protect themselves and their businesses online.
When he isn’t running live training sessions or supporting organisations with security strategy, you’ll usually find him researching the latest attack tactics, developing new training content — or making another cup of tea.