data breach prevention - start with your pos terminal!
TRANSCRIPT
![Page 1: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/1.jpg)
POS Fraud Prevention
Securing Your POS. Protect your customers. Protect your reputation.
![Page 2: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/2.jpg)
Overview– Introduction to Halo Metrics
• Loss prevention solutions (Canada & US• The Halo Metrics Experience
– POS Data Breach• Malware attacks vs. Skimming• How Data is taken • Will EMV Chip technology help?• Examples of PIN Pad tampering• Liability Shift• PCI Compliance
– Customised Solutions for POS Equipment– Conclusion & Questions
![Page 3: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/3.jpg)
Since 1988
![Page 4: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/4.jpg)
Since 1988
POS Hardware Security
Convex Mirrors Turnstile Crowd Control
![Page 5: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/5.jpg)
Customers
![Page 6: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/6.jpg)
What is Halo’s Experience Protection?
Is about protecting the honest consumers shopping experience
99% of consumers are honest
Loss Prevention can enhance and protect the total consumer shopping experience
This includes point of sale
![Page 7: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/7.jpg)
Point of Sale
Point of Sale is an important step in the shopping experience
A great experience here involves having quick moving lines, friendly service and quick but secure payment processing
![Page 8: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/8.jpg)
Data Breach is a Major Issue…
Many Retail businesses have been hit by credit card data breaches from Point of Sale systems
![Page 9: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/9.jpg)
How does it happen?
Two primary methods include:1)Malware virus planted in payment servers or equipment2)Tampering with POS equipment or “Skimming” attacks
*image courtesy of symantec.com
![Page 10: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/10.jpg)
Malware on POS Equipment or Servers
POS malware exploits a gap in the security of how card data is handled. While card data is encrypted as it’s sent for payment authorization, it’s not encrypted while the payment is actually being processed, i.e. the moment when you swipe the card at the POS to pay for your goods.
![Page 11: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/11.jpg)
“Skimming” Attacks involve Theft & Tampering of POS Equipment
EXAMPLE:
Two person team about to steal a POS card swipe machine
![Page 12: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/12.jpg)
Theft can happen to any business
One partner looks out while the other starts the theft of the POS equipment
Note the time: 19:52:02
![Page 13: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/13.jpg)
Gone in 60 seconds…
He has removed the device.
Note the time: 19:53:00
![Page 14: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/14.jpg)
Out the door…
Theft is complete
Note the time: 19:53:00
![Page 15: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/15.jpg)
How do they tamper with the POS?Here is an example of a POS terminal with a fake cover:
![Page 16: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/16.jpg)
Modifying POS:Internal components modified to capture credit and debit card data.
Data can be remotely accessed
![Page 17: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/17.jpg)
Data is collected and downloaded
Information provided by:
![Page 18: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/18.jpg)
Data from Magnetic SwipeSee this video and how easy it is to download banking data:
![Page 19: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/19.jpg)
What Kind of Data is Being Taken?
![Page 20: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/20.jpg)
The Data is Sold Online:Data in Track 1 has less value because it can only be used online.
Source: http://www.symantec.com/connect/blogs/demystifying-point-sale-malware-and-attacks
Data in Track 2 is more lucrative as it is used to clone cards used in bricks and mortar businesses
![Page 21: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/21.jpg)
Will EMV (Chip) Technology Help?
Chip + PIN enabled technology does make it more difficult to counterfeit cards
This is not new technology! It has been implemented all over the world and fraud still occurs
![Page 22: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/22.jpg)
Liability Shift in October 2015
The party that is the cause of a chip-on-chip transaction not occurring (i.e., either the issuer or the merchant’s acquirer) will be financially liable for any resulting card-present counterfeit fraud losses.
![Page 23: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/23.jpg)
June 30, 2015 – Protect your POS Device
Current PCI Compliance regulations require that payment devices must be protected from tampering and substitution
Payment Card Industry (PCI) Data Security Standard
![Page 24: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/24.jpg)
Customized Security Solutions for POS
Halo Metrics offers customized security solutions for POS equipment
![Page 25: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/25.jpg)
Pick Your POS Security Platform
![Page 26: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/26.jpg)
Pick your Security Options
We can custom build security options into your security stand
![Page 27: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/27.jpg)
Satisfied POS Security Customers
![Page 28: Data Breach Prevention - Start with your POS Terminal!](https://reader035.vdocuments.site/reader035/viewer/2022070515/58792b451a28ab7c448b5633/html5/thumbnails/28.jpg)
Thank you