For 2007, the most frequently-failed credit card security requirements are regular testing, secure applications, protecting data and enforcing unique user IDs, according to a summary of the audits from Verisign.
What's more interesting, though, is how little that list has changed from the prior year. Regular testing in 2006 was number two instead of number one and protecting data was number one instead of number three.
The only real priority movement was with securing applications. Last year, it showed up as ninth in a list of ten top Payment Card Industry Data Security Standard (PCI DSS) audit failures. This year, it rose to the number two slot.
The most significant change is that, across the board, the percentage of retailers failing any of the top ten categories has sharply dropped. The top failed category last year saw 79 percent of those assessments failing, while the tenth most failed item last year was missed by 45 percent of retailers. The top four items last year were all missed by more than 70 percent of those evaluated.
This year, in contrast, the worst offending item was only missed by 48 percent of the retailers being evaluated, while the tenth most missed was only missed by 27 percent.
"Overall trends show improvement. While almost no one passes a first review, failure rates for each of the 12 requirements dropped from the 70-80 percent range to the 40-50 percent range," said Verisign's Branden Williams. "Still, given looming deadline, a 50 percent failure rate is bad for the industry.?