Ultimate Cardholder Data Security

When critically sensitive data exists and is accessible online whether in databases, storage devices or within networks in some form or another, there is always a degree of risk to the security of that data.

It is not neccessarily the fault of any organisation that falls victim to a breach. More often than not, serious data breaches have occurred as a result of phishing activity. Phishing scams trick key individuals, usually with administrator priviledges, to disclose their access credentials to databases, data storage systems and other similar appliances.

Sensitive Data Breaches

The one common denominator with all organisations that have suffered serious data breaches is that they all store critically sensitive data in some form or another.

A Bold Innovation: CDU

CDU (Critical Data Unplugged) is a strategic initiative that advocates for the complete removal of sensitive data from the internet's reach. The logic is brilliantly simple:

If it doesn't exist ...

Hackers and internet crooks cannot steal information from the internet when that information simply doesn't exist on the internet.

... it can't possibly be stolen!

By "unplugging" the data from the web, you terminate by design the very core reason behind cardholder data vulnerability.

e-Path & CDU

e-Path is fiercely proud to be a pioneer adopter of CDU. Our system was engineered from the ground up to accept payment authorisations without permanently storing critically sensitive credit card details, transaction history records or identity information whether whole or truncated, within our systems.

Why CDU will never become an industry standard

While CDU is an absolute bullet-proof answer to the question of data security on the internet, the reality is it is not a workable solution for our modern internet reliant world.

Modern society would snap to a halt if every snippet of sensitive data was removed from being internet accessible. So, of course highly sensitive data will continue to be stored online, in databases, within storage devices in some form or another and thus there will be further data breaches and compromises. But that doesn't mean e-Path has to play that game.

Read about e-Path Security