Are Industries Ready for Point-of-Sale System Breaches?
17 febbraio 2014
View research paper: Point-of-Sale System Breaches: Threats to the Retail and Hospitality Industries
As businesses move to automate their processes and improve the operational efficiency, they rely on PoS systems for purchase transactions, including sales, accounting, and inventory. PoS systems are also used to track consumer behavior, like patron frequency, so companies can provide rewards to loyal customers. An example of such privileges is bonus airline mileage.
One weakness is all it takes for businesses to hit ground zero. Unfortunately, PoS systems, which often run on unsupported Windows versions, are easy and lucrative cybercriminal targets. Malicious software like the ALINA, vSkimmer, Dexter, and FYSNA are designed to target PoS devices and are widely available in the cybercriminal underground. Given these, retail and hospitality industries will have to rethink their security measures.
Businesses have the option to secure both their PoS devices and their networks. They can, for example start by deploying the latest OS version on their PoS devices, complete with updated patches. They can also opt to routinely delete cardholder data to minimize the information cybercriminals can steal. As for networks, they can also patch vulnerabilities and monitor for any changes in system components. Any odd behavior spotted on the network can signal compromise.
Of course, these are only a few helpful solutions. Business owners can learn more in-depth details about PoS threats and how they can avoid them in Point-of-Sale System Breaches.
HIDE
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
Ultime notizie
- CES 2025: A Comprehensive Look at AI Digital Assistants and Their Security Risks
- Metaverse or Metaworse? How the Apple Vision Pro Stacks Up Against Predictions
- Understanding Hacktivists: The Overlap of Ideology and Cybercrime
- Across the Span of the Spanish Cybercriminal Underground: Current Activities and Trends
- Bridging Divides, Transcending Borders: The Current State of the English Underground