Installing malicious software designed to breach brick-and-mortar POS components and software and obtain card information for the duration of transactions Handling the entry of bank card information from shoppers; namely, that sensitive card information are gathered and transmitted securely Requirement 8 now goes outside of just necessitating a singular ID https://www.nathanlabsadvisory.com/blog/tag/security-testing/