28
POS Fraud Prevention Securing Your POS. Protect your customers. Protect your reputation.

Data Breach Prevention - Start with your POS Terminal!

Embed Size (px)

Citation preview

Page 1: Data Breach Prevention - Start with your POS Terminal!

POS Fraud Prevention

Securing Your POS. Protect your customers. Protect your reputation.

Page 2: Data Breach Prevention - Start with your POS Terminal!

Overview– Introduction to Halo Metrics

• Loss prevention solutions (Canada & US• The Halo Metrics Experience

– POS Data Breach• Malware attacks vs. Skimming• How Data is taken • Will EMV Chip technology help?• Examples of PIN Pad tampering• Liability Shift• PCI Compliance

– Customised Solutions for POS Equipment– Conclusion & Questions

Page 3: Data Breach Prevention - Start with your POS Terminal!

Since 1988

Page 4: Data Breach Prevention - Start with your POS Terminal!

Since 1988

POS Hardware Security

Convex Mirrors Turnstile Crowd Control

Page 5: Data Breach Prevention - Start with your POS Terminal!

Customers

Page 6: Data Breach Prevention - Start with your POS Terminal!

What is Halo’s Experience Protection?

Is about protecting the honest consumers shopping experience

99% of consumers are honest

Loss Prevention can enhance and protect the total consumer shopping experience

This includes point of sale

Page 7: Data Breach Prevention - Start with your POS Terminal!

Point of Sale

Point of Sale is an important step in the shopping experience

A great experience here involves having quick moving lines, friendly service and quick but secure payment processing

Page 8: Data Breach Prevention - Start with your POS Terminal!

Data Breach is a Major Issue…

Many Retail businesses have been hit by credit card data breaches from Point of Sale systems

Page 9: Data Breach Prevention - Start with your POS Terminal!

How does it happen?

Two primary methods include:1)Malware virus planted in payment servers or equipment2)Tampering with POS equipment or “Skimming” attacks

*image courtesy of symantec.com

Page 10: Data Breach Prevention - Start with your POS Terminal!

Malware on POS Equipment or Servers

POS malware exploits a gap in the security of how card data is handled. While card data is encrypted as it’s sent for payment authorization, it’s not encrypted while the payment is actually being processed, i.e. the moment when you swipe the card at the POS to pay for your goods.

Page 11: Data Breach Prevention - Start with your POS Terminal!

“Skimming” Attacks involve Theft & Tampering of POS Equipment

EXAMPLE:

Two person team about to steal a POS card swipe machine

Page 12: Data Breach Prevention - Start with your POS Terminal!

Theft can happen to any business

One partner looks out while the other starts the theft of the POS equipment

Note the time: 19:52:02

Page 13: Data Breach Prevention - Start with your POS Terminal!

Gone in 60 seconds…

He has removed the device.

Note the time: 19:53:00

Page 14: Data Breach Prevention - Start with your POS Terminal!

Out the door…

Theft is complete

Note the time: 19:53:00

Page 15: Data Breach Prevention - Start with your POS Terminal!

How do they tamper with the POS?Here is an example of a POS terminal with a fake cover:

Page 16: Data Breach Prevention - Start with your POS Terminal!

Modifying POS:Internal components modified to capture credit and debit card data.

Data can be remotely accessed

Page 17: Data Breach Prevention - Start with your POS Terminal!

Data is collected and downloaded

Information provided by:

Page 18: Data Breach Prevention - Start with your POS Terminal!

Data from Magnetic SwipeSee this video and how easy it is to download banking data:

Page 19: Data Breach Prevention - Start with your POS Terminal!

What Kind of Data is Being Taken?

Page 20: Data Breach Prevention - Start with your POS Terminal!

The Data is Sold Online:Data in Track 1 has less value because it can only be used online.

Source: http://www.symantec.com/connect/blogs/demystifying-point-sale-malware-and-attacks

Data in Track 2 is more lucrative as it is used to clone cards used in bricks and mortar businesses

Page 21: Data Breach Prevention - Start with your POS Terminal!

Will EMV (Chip) Technology Help?

Chip + PIN enabled technology does make it more difficult to counterfeit cards

This is not new technology! It has been implemented all over the world and fraud still occurs

Page 22: Data Breach Prevention - Start with your POS Terminal!

Liability Shift in October 2015

The party that is the cause of a chip-on-chip transaction not occurring (i.e., either the issuer or the merchant’s acquirer) will be financially liable for any resulting card-present counterfeit fraud losses.

Page 23: Data Breach Prevention - Start with your POS Terminal!

June 30, 2015 – Protect your POS Device

Current PCI Compliance regulations require that payment devices must be protected from tampering and substitution

Payment Card Industry (PCI) Data Security Standard

Page 24: Data Breach Prevention - Start with your POS Terminal!

Customized Security Solutions for POS

Halo Metrics offers customized security solutions for POS equipment

Page 25: Data Breach Prevention - Start with your POS Terminal!

Pick Your POS Security Platform

Page 26: Data Breach Prevention - Start with your POS Terminal!

Pick your Security Options

We can custom build security options into your security stand

Page 27: Data Breach Prevention - Start with your POS Terminal!

Satisfied POS Security Customers

Page 28: Data Breach Prevention - Start with your POS Terminal!

Thank you