{"id":62998,"date":"2025-03-03T12:12:25","date_gmt":"2025-03-03T15:12:25","guid":{"rendered":"https:\/\/www.evertecinc.com\/protect-your-business-what-to-do-if-your-data-is-compromised\/"},"modified":"2025-11-08T11:07:02","modified_gmt":"2025-11-08T14:07:02","slug":"protect-your-business-what-to-do-if-your-data-is-compromised","status":"publish","type":"post","link":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/","title":{"rendered":"Protect Your Business: What to Do If Your Data Is Compromised"},"content":{"rendered":"<h2>What You Need<br \/>\nto Know?<\/h2>\n<hr \/>\n<p>Any entity that suspects or confirms unauthorized access to, or misuse of, cardholder information\u2014including those that store, process, or transmit cardholder data, or have access to payment systems\u2014must follow certain key procedures.<\/p>\n<h3>Essential Steps:<\/h3>\n<h3>1. Containment and Control<\/h3>\n<p>Act swiftly to limit the exposure of compromised data:<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">isolate the affected systems.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">preserve all evidence to facilitate the investigation.<\/li>\n<\/ul>\n<h3>2. Notify Visa and Mastercard Immediately<\/h3>\n<p>Report the security incident:<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b>Visa:<\/b> within three calendar days.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b>Mastercard:<\/b> immediately.<\/li>\n<\/ul>\n<p>Include in your notification:<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">sufficient evidence to reasonably suspect or confirm a security breach.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">key details of the incident.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">contact us to report the incident and receive guidance on the next steps.<\/li>\n<\/ul>\n<h3>3. Conduct an Initial Investigation<\/h3>\n<p>Prepare a detailed report and submit it to Visa, Mastercard, and Evertec within three calendar days from the initial notification.<\/p>\n<h3>4. Preserve Evidence<\/h3>\n<p>Ensure all evidence remains intact to identify the root cause of the incident, aid in investigations, and protect system integrity.<\/p>\n<h3>5. Independent Investigation<\/h3>\n<p>Visa and Mastercard may require an independent investigation before or in place of a PCI forensic review.<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"17\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">The investigating entity must not have provided services to the affected organization within the past three years.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"17\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Visa and Mastercard reserve the right to reject reports not meeting their standards.<\/li>\n<\/ul>\n<h3>6. Notify Other Parties Involved:<\/h3>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"18\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">internal teams responsible for incident management and information security.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"18\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">manufacturers or integrators of devices (PED\/POS), if applicable.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"18\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">legal advisory teams, especially if applicable laws require customer notification.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"18\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">local or federal authorities (e.g., DACO in Puerto Rico or the U.S. Secret Service Cyber Crimes Unit for incidents in the U.S.).<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"18\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\">any other relevant parties as required by applicable laws.<\/li>\n<\/ul>\n<h3>7. Remediation<\/h3>\n<ul>\n<li>Address the identified vulnerabilities.<\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Update security protocols.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Ensure compliance with PCI DSS.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">Submit final reports and findings to Visa, Mastercard, and the acquiring bank.<\/li>\n<\/ul>\n<h3>8. Monitoring and Follow-Up<\/h3>\n<p>Implement continuous monitoring to prevent future security breaches and reinforce preventative measures.<\/p>\n<p>At <b>Evertec<\/b>, we are committed to ensuring that our business partners comply with these requirements. <b>Contact us<\/b> to ensure your business is protected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you know what to do if your business data is compromised? Below, we provide a practical guide with the steps to follow in case of suspicion or confirmation of a security breach that could put credit card transaction information at risk. It is essential to comply with the requirements established for such incidents.<\/p>\n","protected":false},"author":9,"featured_media":68435,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2200],"tags":[],"class_list":["post-62998","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-merchant-retail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Your Business: What to Do If Your Data Is Compromised - Evertec Trends<\/title>\n<meta name=\"description\" content=\"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Business: What to Do If Your Data Is Compromised - Evertec Trends\" \/>\n<meta property=\"og:description\" content=\"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/\" \/>\n<meta property=\"og:site_name\" content=\"Evertec Trends\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-03T15:12:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-08T14:07:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evertectrends.com\/wp-content\/uploads\/2025\/07\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"620\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evertec Trends\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evertec Trends\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/\"},\"author\":{\"name\":\"Evertec Trends\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#\\\/schema\\\/person\\\/07899642d9e4667697b7b0463442d054\"},\"headline\":\"Protect Your Business: What to Do If Your Data Is Compromised\",\"datePublished\":\"2025-03-03T15:12:25+00:00\",\"dateModified\":\"2025-11-08T14:07:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/\"},\"wordCount\":347,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg\",\"articleSection\":[\"Merchant &amp; Retail\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/\",\"url\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/\",\"name\":\"Protect Your Business: What to Do If Your Data Is Compromised - Evertec Trends\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg\",\"datePublished\":\"2025-03-03T15:12:25+00:00\",\"dateModified\":\"2025-11-08T14:07:02+00:00\",\"description\":\"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/#primaryimage\",\"url\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg\",\"contentUrl\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg\",\"width\":1200,\"height\":620,\"caption\":\"DCC, transaction choices for consumers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/protect-your-business-what-to-do-if-your-data-is-compromised\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/evertectrends.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Comercio y Retail\",\"item\":\"https:\\\/\\\/evertectrends.com\\\/categorias\\\/comercio-y-varejo\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protect Your Business: What to Do If Your Data Is Compromised\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#website\",\"url\":\"https:\\\/\\\/evertectrends.com\\\/\",\"name\":\"Evertec Trends\",\"description\":\"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia\",\"publisher\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/evertectrends.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#organization\",\"name\":\"Evertec Trends\",\"url\":\"https:\\\/\\\/evertectrends.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/evertectrends-sq.png\",\"contentUrl\":\"https:\\\/\\\/evertectrends.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/evertectrends-sq.png\",\"width\":416,\"height\":417,\"caption\":\"Evertec Trends\"},\"image\":{\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/evertectrends.com\\\/#\\\/schema\\\/person\\\/07899642d9e4667697b7b0463442d054\",\"name\":\"Evertec Trends\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46217c56c100deb166f67953efa3f81077701bca98a102e48544095d631803d?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46217c56c100deb166f67953efa3f81077701bca98a102e48544095d631803d?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46217c56c100deb166f67953efa3f81077701bca98a102e48544095d631803d?s=96&d=robohash&r=g\",\"caption\":\"Evertec Trends\"},\"description\":\"Mais que um portal de conte\u00fados, um ponto de encontro para quem quer desvendar o setor financeiro.\",\"sameAs\":[\"https:\\\/\\\/www.instagram.com\\\/evertecinc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/evertec\\\/\"],\"url\":\"https:\\\/\\\/evertectrends.com\\\/en\\\/author\\\/evertectrends\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Your Business: What to Do If Your Data Is Compromised - Evertec Trends","description":"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Business: What to Do If Your Data Is Compromised - Evertec Trends","og_description":"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia","og_url":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/","og_site_name":"Evertec Trends","article_published_time":"2025-03-03T15:12:25+00:00","article_modified_time":"2025-11-08T14:07:02+00:00","og_image":[{"width":1200,"height":620,"url":"https:\/\/evertectrends.com\/wp-content\/uploads\/2025\/07\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg","type":"image\/jpeg"}],"author":"Evertec Trends","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evertec Trends","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/#article","isPartOf":{"@id":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/"},"author":{"name":"Evertec Trends","@id":"https:\/\/evertectrends.com\/#\/schema\/person\/07899642d9e4667697b7b0463442d054"},"headline":"Protect Your Business: What to Do If Your Data Is Compromised","datePublished":"2025-03-03T15:12:25+00:00","dateModified":"2025-11-08T14:07:02+00:00","mainEntityOfPage":{"@id":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/"},"wordCount":347,"commentCount":0,"publisher":{"@id":"https:\/\/evertectrends.com\/#organization"},"image":{"@id":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/#primaryimage"},"thumbnailUrl":"https:\/\/evertectrends.com\/wp-content\/uploads\/2025\/07\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg","articleSection":["Merchant &amp; Retail"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/","url":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/","name":"Protect Your Business: What to Do If Your Data Is Compromised - Evertec Trends","isPartOf":{"@id":"https:\/\/evertectrends.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/#primaryimage"},"image":{"@id":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/#primaryimage"},"thumbnailUrl":"https:\/\/evertectrends.com\/wp-content\/uploads\/2025\/07\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg","datePublished":"2025-03-03T15:12:25+00:00","dateModified":"2025-11-08T14:07:02+00:00","description":"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia","breadcrumb":{"@id":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/#primaryimage","url":"https:\/\/evertectrends.com\/wp-content\/uploads\/2025\/07\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg","contentUrl":"https:\/\/evertectrends.com\/wp-content\/uploads\/2025\/07\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg","width":1200,"height":620,"caption":"DCC, transaction choices for consumers"},{"@type":"BreadcrumbList","@id":"https:\/\/evertectrends.com\/en\/protect-your-business-what-to-do-if-your-data-is-compromised\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/evertectrends.com\/"},{"@type":"ListItem","position":2,"name":"Comercio y Retail","item":"https:\/\/evertectrends.com\/categorias\/comercio-y-varejo\/"},{"@type":"ListItem","position":3,"name":"Protect Your Business: What to Do If Your Data Is Compromised"}]},{"@type":"WebSite","@id":"https:\/\/evertectrends.com\/#website","url":"https:\/\/evertectrends.com\/","name":"Evertec Trends","description":"As tend\u00eancias de tecnologia para inovar com estrat\u00e9gia","publisher":{"@id":"https:\/\/evertectrends.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evertectrends.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evertectrends.com\/#organization","name":"Evertec Trends","url":"https:\/\/evertectrends.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evertectrends.com\/#\/schema\/logo\/image\/","url":"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/evertectrends-sq.png","contentUrl":"https:\/\/evertectrends.com\/wp-content\/uploads\/2024\/06\/evertectrends-sq.png","width":416,"height":417,"caption":"Evertec Trends"},"image":{"@id":"https:\/\/evertectrends.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/evertectrends.com\/#\/schema\/person\/07899642d9e4667697b7b0463442d054","name":"Evertec Trends","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f46217c56c100deb166f67953efa3f81077701bca98a102e48544095d631803d?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f46217c56c100deb166f67953efa3f81077701bca98a102e48544095d631803d?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f46217c56c100deb166f67953efa3f81077701bca98a102e48544095d631803d?s=96&d=robohash&r=g","caption":"Evertec Trends"},"description":"Mais que um portal de conte\u00fados, um ponto de encontro para quem quer desvendar o setor financeiro.","sameAs":["https:\/\/www.instagram.com\/evertecinc","https:\/\/www.linkedin.com\/company\/evertec\/"],"url":"https:\/\/evertectrends.com\/en\/author\/evertectrends\/"}]}},"featured_image_url":"https:\/\/evertectrends.com\/wp-content\/uploads\/2025\/07\/Protege-tu-negocio-\u00bfque-hacer-si-tus-datos-estan-comprometidos-2.jpg","primary_category":"Merchant &amp; Retail","_links":{"self":[{"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/posts\/62998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/comments?post=62998"}],"version-history":[{"count":5,"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/posts\/62998\/revisions"}],"predecessor-version":[{"id":69103,"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/posts\/62998\/revisions\/69103"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/media\/68435"}],"wp:attachment":[{"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/media?parent=62998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/categories?post=62998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evertectrends.com\/en\/wp-json\/wp\/v2\/tags?post=62998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}