BankThink

Payment companies need to narrow the gap between breach and discovery

Complimentary Access Pill
Enjoy complimentary access to top ideas and insights — selected by our editors.

Recent breaches such as the one at Verifone demonstrate to the entire industry the importance of addressing the gap of time between when an incident occurs and when it's discovered.

Only little information is available about the incident, but despite of Verifone clearing siren for the payment system remaining intact, there are many ways an infection can propagate from the enterprise network to the payment system.

Whether or not a payments system can be compromised depends on many factors, one of the most important ones is how much time had passed from the breach to its discovery.

Verifone signage
Attendees visit the VeriFone Systems Inc. booth during the Money 20/20 conference in Las Vegas, Nevada, U.S., on Wednesday, Nov. 5, 2014. The conference, which includes over 100 sessions and 500 speakers, explores the evolution of payments and financial services and the innovations that are driving trends in the mobile, retail, marketing services, data and technology sectors. Photographer: Jacob Kepler/Bloomberg
Jacob Kepler/Bloomberg

From what we know, breaches remain undiscovered for weeks, months and sometimes even years, when during this period attackers can collect sensitive data and record users credentials without interference, and then a single user that uses the same or similar password to access both the enterprise network and the payment system, can be the bridge for the attacker to travel between the systems.

With cyber criminals becoming more and more sophisticated and creative, they will continue finding their way in and we will continue hearing about breaches exposed.

The challenge for organizations today is, even when losing some battles, keep winning the war. Security officers should operate under the assumption that the attackers are already inside their systems, looking for ways to deepen their grasp and crawling searching for business-critical data.”

For reprint and licensing requests for this article, click here.
Data breaches Point-of-sale Hacking ISO and agent
MORE FROM AMERICAN BANKER