Multi-Unit Franchisee Magazine Issue II, 2011 | Page 82

security By DavID ellIs is Your Data secure? One misstep can hand a hacker a master key to your network i n case you haven’t heard, franchises hold a place of honor in the world of data thieves. In fact, chains are the favorite target of hackers trying to steal payment card information. The most recent figures from Visa indicate that up to 97 percent of data compromises are suffered by smaller merchants and “specifically franchisees”—particularly those in the restaurant, clothing, sporting goods, and hotel industries. The reason so many attacks are mounted against franchise operations is simple: a hacker who can penetrate one franchisee’s computer systems can frequently infiltrate the entire network with little extra effort. Having this kind of “master key” to a larger enterprise is far more efficient—and lucrative—than trying to attack scores of smaller companies that have fewer cards to pilfer, as well as disparate security systems to break and enter. Franchise systems at risk A 2008 security breach at a major hotel chain illustrates the payoff for a franchise system breach. In that case, after hackers penetrated one hotel’s computer system, they were able to access information from more than three dozen other properties through the chain’s computer network. Not only were guest names, card numbers, and expiration dates theirs for the taking, but so was the magnetic stripe data that made the information even more valuable on the black market because it provided the ability to replicate the physical credit card for each stolen data set. This franchisee-first attack is a common scenario. Frequently, the first successful breach occurs at a franchise location and then spreads to the corporate network. Visa is so concerned about the number of attacks directed at franchises that it has created special rules to address the franchise environment. Recently, for example, Visa expanded its security requirements to include the integrators and value-added resellers (VARs) who supply payment-processing hardware and related services to franchisors and franchisees. For these corporate franchise servicers, as well as franchisors and their franchisees, compliance with the Payment Card Industry Data Security Standard (PCI DSS) is not only the best defense against card fraud, it is also mandatory. Adhering to PCI controls and processes will help plug the security holes that allow criminals to pocket your customers’ card data—or even your own. cracking the code For a determined hacker, there are multiple roads to successfully bypassing a merchant’s perimeter security. Attacks can be launched against the organization’s computer network, point-ofsale (POS) software, or the POS terminals themselves. Within each of these categories, data thieves can exploit a variety of security weaknesses. In the first six months of 2010, for example, four attacks out of 10 involved unauthorized users gaining remote access to computer systems because of issues such as lack of adequate password protection. In a franchise business, that kind of prob- 80 Multi-unit Franchisee Is s ue II, 2011 lem typically is related to the remote management applications used to disseminate business downloads, conduct sales polls, and/ or manage inventory within a particular franchise community. Nonexistent or improperly configured firewalls (the equivalent of leaving a store physically unlocked after business hours) and unencrypted credit card data stored by the organization are other danger zones. So are oversights such as a failure to segregate day-to-day business and Internet traffic from payment data (leaving the entire network open to an attacker once they’re in the door), and a failure to replace the vendor-supplied default passwords that come with POS systems and other network devices with complex, individualized passwords. the Pci cure The PCI DSS prescribes detailed safeguards in each of these areas and many more, providing a road map for keeping card data off-limits to interlopers. The rules require merchants to follow procedures such as: • Configuring firewalls to deny all traffic from untrusted networks and hosts, blocking a key entry point that cyber-criminals use to access payment systems. • Using two means of identification to authenticate remote users to the network—including a device such as a token, smart card, or biometric—to prevent hackers from using a password alone to gain network access. • Changing vendor-supplied default settings on firewalls and other network devices to eliminate easily guessed passwords such as “1234” and “admin.” • Encrypting transmission of cardholder data across public networks, so that any intercepted data cannot be interpreted. • Using and regularly updating antivirus software or programs to minimize the risk that malicious software that can extract card data (like keyloggers that record each keystroke) will be installed on servers and other vulnerable systems. Visa guidance While full compliance