CIOReview
CIOREVIEW >> RSA Security >>

Your Point-of-sale Should be a Point-of-security

Charles Henderson, VP-Managed Security Testing, Trustwave
Charles Henderson, VP-Managed Security Testing, Trustwave

Charles Henderson, VP-Managed Security Testing, Trustwave

Most PoS environments are optimized for ease of administration rather than security. Since network segmentation is often either inadequate or altogether non-existent, a breach can involve hundreds or even thousands of devices. Once an attacker knocks one PoS down, the rest fall like a line of clattering dominos.

"Many merchants even delegate PoS management entirely to a specialty vendor who typically has little experience in security and suffers far less brand destruction after a breach"

Part of the problem is that modern PoS systems seem to be mysterious magic boxes to many IT departments, who may prefer a hands-off approach rather than risk production instability. Many merchants even delegate PoS management entirely to a specialty vendor who typically has little experience in security and suffers far less brand destruction after a breach. As a result, defensive controls widely used in other systems are rarely deployed on what may be the highest-profile systems in the organization.

PoS systems shouldn’t be scary. In reality, they are usually just glorified PCs with specialized peripherals. While it’s true that criminals have developed specialized attack tools and techniques, the underlying flaws being exploited can usually be addressed with conventional strategies.

Check Out: Top Managed Security Service Companies

Vulnerabilities commonly found in PoS deployments range from the complex logic flaws to astoundingly simple but devastating shortcomings. On the simple end of the spectrum, default passwords, simple administrative passwords, and faulty remote access methods are common issues. These flaws are not difficult to find and even easier for an attacker to exploit.

Recently, our Trustwave security researchers found yet another new strain of PoS malware, which they named Punkey. Indeed, finding new variants of PoS malware is now a regular occurrence. Each time a researcher comes forth with a new discovery, retailers scurry to look for evidence of the latest, greatest malware. In the event that a retailer finds evidence of the malware, it is obviously too late.

Common sense dictates that a proactive approach would be beneficial. Rather than solely focusing on looking for evidence after the fact, the retail industry would be better served by proactively testing PoS deployments, segmenting networks, and enlisting proactive antimalware protection. Security awareness education training for employees could also be a useful tool.

While searching for traces of a crime that may have already been committed is a necessary due diligence action, there is so much more retailers can do to help stop the crime before it is too late.

tag

POS

Read Also

The Under- And Overestimation Of Data.

The Under- And Overestimation Of Data.

Dennis Wan Bregt, Director of Data and Content Management, Kramp
Protecting IP Amidst The Pandemic

Protecting IP Amidst The Pandemic

Kim Jessum, Chief IP Counsel U.S., Associate General Counsel & Secretary, Heraeus
AI Will Improve Talent Management Practice But Change Management Is Critical

AI Will Improve Talent Management Practice But Change Management Is...

Manish Verma, Global Head of Talent, Cargill
Keys To Reaching The Peak Of A Cyber Security Program Journey

Keys To Reaching The Peak Of A Cyber Security Program Journey

Christine Vanderpool, VP IT Security & CISO, Florida Crystals
Sailing through Uncertain COVID times

Sailing through Uncertain COVID times

Jarrod Sanfilippo, Group Managing Director, Burbank
Paving the Way for Incentivized, Ethical Waste Collection

Paving the Way for Incentivized, Ethical Waste Collection

Jenelle Shapiro, Sustainability Director, Webcor