Data Security for the Hospitality



Similar documents
AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

PCI Compliance. Top 10 Questions & Answers

Project Title slide Project: PCI. Are You At Risk?

PCI Compliance Top 10 Questions and Answers

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Becoming PCI Compliant

Global Partner Management Notice

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)

SecurityMetrics Introduction to PCI Compliance

PCI Data Security Standards

How To Protect Your Data From Being Stolen

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

SecurityMetrics Vision whitepaper

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Why Is Compliance with PCI DSS Important?

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Josiah Wilkinson Internal Security Assessor. Nationwide

Frequently Asked Questions

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY

SecurityMetrics. PCI Starter Kit

Your Compliance Classification Level and What it Means

PAI Secure Program Guide

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Target Security Breach

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI DSS. CollectorSolutions, Incorporated

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

New PCI Standards Enhance Security of Cardholder Data

How to complete the Secure Internet Site Declaration (SISD) form

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

Franchise Data Compromise Trends and Cardholder. December, 2010

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

Achieving Compliance with the PCI Data Security Standard

MITIGATING LARGE MERCHANT DATA BREACHES

Payment Card Industry Compliance

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

Customer PCI 3.0 Changes = New Opportunity For You. Giles Witherspoon-Boyd SecurityMetrics

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

Data Security Basics for Small Merchants

PCI Compliance 3.1. About Us

Payment Card Security

Preventing. Payment Card Fraud. Is your business protected?

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline Payment Card Industry Technical Requirements

How SafenSoft TPSecure can help. Compliance

UNLV Payment Card Merchant Policy Credit Card Handling Responsibilities and Procedures

How To Protect Your Credit Card Information From Being Stolen

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Payment Card Industry - Achieving PCI Compliance Steps Steps

Data Security, Fraud Prevention, and Cost Control. Mike Dorland, CPP Regional Marketing Representative Michigan Retailers Association

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

PCI DSS Compliance Information Pack for Merchants

PCI: It Never Ends. Why?

How To Protect Your Business From A Hacker Attack

ICCCFO Conference, Fall Payment Fraud Mitigation: Securing Your Future

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level.

Technical breakout session

CREDIT CARD MERCHANT POLICY. All campuses served by Louisiana State University (LSU) Office of Accounting Services

Need to be PCI DSS compliant and reduce the risk of fraud?

The Evolution of Data Breaches

Symposium (FBOS) PCI Compliance. Connecting Great Ideas and Great People. Agenda

PCI Compliance for Healthcare

PCI Compliance: How to ensure customer cardholder data is handled with care

Payment Card Industry Data Security Standard

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Thoughts on PCI DSS 3.0. September, 2014

See page 16. Thomas A. Vallas

Payment Card Crime Hotels Face Great Security Risks

Beef O Brady's. Security Review. Powered by

It is important to note, the payment brands and acquirers are responsible for enforcing compliance, not the PCI council.

How To Stop A Cybercriminal From Stealing A Credit Card Data From A Business Network

safe and sound processing online card payments securely

PCI Quick Reference Guide

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Important Info for Youth Sports Associations

Version 7.4 & higher is Critical for all Customers Processing Credit Cards!

What You Need to Know About PCI SSC Guiding open standards for global payment card security

White Paper: Are there Payment Threats Lurking in Your Hospital?

V ISA SECURITY ALERT 13 November 2015

HOW SECURE IS YOUR PAYMENT CARD DATA?

Transcription:

M&T Bank and SecurityMetrics Present: Data Security for the Hospitality Industry Featuring Lee Pierce, SecurityMetricsStrategicStrategic Accounts Dave Ellis, SecurityMetrics Forensic Investigator Doug Dunbar, M&T Bank Merchant Services Product Manager Audio Conference 1 800 851 0194, Passcode 8484739 Upondialing in, please mute all lines by pressing *6 To ask a question, un mute by pressing *7 You are welcome to ask questions via the chat feature of this webinar!

2 M&T Bank Introduction Data Security for the Hospitality Industry M&T Bank understands the importance of keeping our clients informed of significant industry trends. Credit / Debit card data security Trend toward data security attacks in the hospitality industry Best practices for how to help protect your business and your customers

3 The Facts Hacking Ring steals over 40 million credit & debit card numbers US Department of Justice Security vulnerabilities persist in hospitality industry The Tech Herald IN PRISON FOR HACKING HOTEL BUSINESS KIOSKS & STEALING CREDIT CARD DATA US Department of Justice breaches reported indicate criminals continue to target merchants in the hospitality industry, specifically hotels and restaurants. VISA Inc.

SecurityMetrics Leading provider of Payment CardIndustry (PCI) Data Security Standard (DSS) security solutions SecurityMetrics is certified to perform: PCI Scans (ASV) PCI Audits (QSA) Consultation on PCI DSS with a Qualified Security Assessor (QSA) Payment Applications Software Audits (PA DSS) Point of Sale Terminal Security Audits (PTS) External / Internal Penetration Testing Forensic Analysis (QIRA) Security Appliance with Vulnerability Assessment, Intrusion Detection and Intrusion Prevention functionality 4

Industry Terms Common Data Security Expressions 5 Payment Card Industry (PCI) Acquirer Merchant Compliance Payment Application Data Security Standard (PA DSS) Approved Scanning Vendor (ASV) PCI Onsite Audits (QSA) PCI PA DSS Audits (PA QSA) Forensic Analysis (QIRA) CPP (Common Point of Purchase) Self Assessment Questionnaire (SAQ) Malware Trojan

Compliance vs. Validation An Important Difference 6 Compliance: bringing applicable systems and processes up to full standards of Payment Card Industry (PCI) Validation: through established, certified vendors, prove compliance to the satisfaction if i of PCI

What Hackers Want Key Cardholder Information 7 Primary Account Number Expiration Date Cardholder s Name Cardholder s Address Card Security Code (CVV, CVV2, CVC2, CID) PIN / PIN Block

Why Hackers Want It A Lucrative Business 8 For personal use in ecommerce setting Often resell purchased merchandise through ebay type avenues To sell the stolen card data on the internet Price depends on how much data If track data, they sell to organizations who produce new plastic cards To sell the methodology of the exploit Attacker sometimes does this after thorough exploitation of the cards stolen Leads to further exploits on the same merchant by different hackers NOTE: CPP identification can sometimes lag by months: attacker can hold the cards and not yet use them. The longer the delay, the more difficult it is to find the hacker. The quantity of cards exposed to theft can go up.

How Hackers Get It Common Vulnerabilities Through open doors in the cardholder data network Weak passwords or no passwords Improperly configured remote access or wireless connections to cardholder network Casual internet browsing or email that inadvertently bring malware into the cardholder data environment Improper handling of card data in the network environment Dfii Deficient payment applications that t handle cardholder dt data improperly Cardholder data was unwittingly stored unencrypted in an unsecured network location Through trusted access that should not have been granted Employees have too many privileges Multiple users share login name and password Malicious employees skim cards during transaction 9

YEAR NAME (Location) TYPE OF BREACH Jan. 9, 2006 <Sanitized Hotel Name> Dishonest insider or hacking. Names, addresses, credit card details, Social Security numbers, driver s license numbers and/or bank account data. Jan. 20, 2006 <Sanitized Hotel Name> Hacking. Reservation information including credit card account number compromised. <Nam e> NUMBER OF RECORDS 55,000 Unknown Feb. 16, 2009 <Sanitized Hotel Name> In mid September, 2008, the company discovered that a 21,000 sophisticated hacker penetrated the computer systems of one of the hotels. By going through the centralized network connection, the hacker was then able to access and download information from several, but not all, of the other <Hotel name> properties and create a unique file containing payment card information of a small percentage of our <Hotel name> customers. Potentially exposed through this breach are guest and/or cardholder names and card numbers, expiration dates and other data from the card s magnetic stripe. Total number of records containing sensitive personal information involved in security breaches in the U.S. since January 2005. 263,214,232

Defacement

Hacking Brag Site www.zone h.org

13 Popular Tools of the Trade Rootkits: A rootkit is a collection of software binaries or patches that modify an existing piece of code, usually an operating system, allowing a user to operate with administrator privileges. ileges Sites like these are all over the place on the web!

14 Popular Tools of the Trade Keyloggers: A POS Hacker Favorite for just $34.95 Packet tsniffers: Hackers intercept and log traffic over a digital network.

Popular Tools of the Trade 15 Memory Dumpers: You don t have to even store the data. Hackers can get it right out of RAM.

68% of your customers are very/extremely concerned about credit card fraud. How much are you concerned about National security Credit and debit fraud 26% 22% 31% 31% 32% 11% Health epidemic 37% 10% Identity theft 16 23% 38% 29% 24% 18% 11% 21% 36% Survey conducted cted in February, 2009 by Unisys s Corp Somewhat concerned Not concerned Very concerned Extremely concerned

Ten Keys Avoiding a Data Compromise 17 1. Use POS systems that are fully compliant with PCI DSS. Third party payment application software must only be selected from the PCI DSS listing of certified applications, PABP (Payment Application Best Practices), or PA DSS (Payment Application Data Security Standards) Be certain that the POS system has been implemented in a PCI DSS compliant manner and environment, and according to the payment application vendor s PA DSS Implementation Guide. (PCI DSS 6.3) 2. Use Secure Zones for storage of cardholder data: additional hardware firewalls should be configured to segregate stored cardholder data away from publicly accessible zones with public facing IP addresses. (PCI DSS 1.3, 1.3.4) Implement only one primary function per server. Minimize risk by reducing exposure. (PCI DSS 2.2.1) 2 3. Change all default passwords upon installing POS systems. When vendors install POS systems, they often have the default password as password, or no password at all. Hardened passwords must be used and changed on a regular basis. (PCI DSS 2.1) Establish unique user names and passwords for each individual logging in. (PCI DSS 8.1) 4. Remote access to the cardholder data environment must be carefully configured, secured and monitored. (PCI DSS 12.3)

Ten Keys Avoiding a Dt Data Compromise 18 5. Cardholder data should only be displayed in full when absolutely necessary, and any viewing of it must be logged. Otherwise, it should be masked. For example: xxxx1234. (PCI DSS 3.4) 6. Cardholder data must be encrypted while in transit over public networks. (PCI DSS 4.1) 7. Make certain that all Anti Virus software is truly up to date on every computer involved with cardholder data network segments. (PCI DSS 5.1) 8. Ensure all system components and software have the latest vendor supplied security patches installed (PCI DSS 6.1) 9. File integrity monitoring software and network intrusion detection systems must be in place which will alert administrators to any unauthorized modifications or access. (PCI DSS 11.4, 11.5) Track and monitor all access to network resources and cardholder data. Be aware that logging is often not enabled by default, and must be turned on. (PCI DSS 10) 10. Logs for all system components must be reviewed for malicious activity at least weekly. These logs must be retained for at least one year, with a minimum of three month of online availability. (PCI DSS 10.6, 10.7)

19 Key Takeaways Hackers are targeting the hospitality industry to steal payment card data Use PA DSS / PABP applications for Point of Sale http://usa.visa.com/download/merchants/validated p// / / / _payment _ applications.pdf p https://www.pcisecuritystandards.org/security_standards/pa_dss.shtml Have IP addresses scanned for known vulnerabilities Become and remain PCI DSS compliant MIS providers are they installing POS securely? Ensure remote access has secure configuration Take a hard look at how you answer SAQ questions

Thank you! Data Security for the Hospitality Industry 20 How To Get Started Begin the PCI Compliance & Validation Process M&T and SecurityMetrics stand ready to help you understand your payment applications and data security threats. For more information visit: https://www.pcisecuritystandards.org http://visa.com/cisp / i http://www.mastercard.com/us/sdp/merchants/index.html https://securitymetrics.com Or speak to your Relationship Manager