Skip to content

How to Prevent PoS Breaches

Saks Fifth Avenue and Lord & Taylor are adding their names to the growing list of major businesses that have been cyber attacked. Many of these retailers have had their PoS systems breached, resulting in the potential compromise of information for millions of debit and credit cards.

Details about the Attack

One distinctive feature of the Saks and Lord & Taylor breach was that it was not only a PoS breach. Instead, the hackers took over the network to gain access to the confidential financial information. In these types of attacks on major retailers, hackers gain access to the network when privileged accounts are compromised. Traditionally, these cyber thieves gain access through phishing attacks, steal privileged information and elevate their privileges while gaining access to information through the network. The end goal for many of these thieves is the PoS system where the thief can steal information from debit and credit cards.

How to Prevent PoS Breaches

Retailers do not have to stand idly by until they become the newest victims of these PoS attacks. Some ways to reduce the likelihood of falling victim to a cyber attack include:

  • Use EMV or Chip-and-Pin Technology – The latest chip-enabled cards prevent privileged information about payment cards from being exposed. Replacing outdated magnetic strip readers with newer chip-enabled technology can protect cyber attackers from gaining access to his information.
  • Close Security Gaps – Attackers often gain access to PoS systems through employee’s compromised information. Retail networks should be secure and separate from the rest of the network. Additionally, retailers can automate the vault and protect and monitor credentials to prevent these cyber attacks.
  • Require Multi-factor Authentication – Implement multi-factor authentication on privileged accounts to provide greater security measures.

Contact an IT Specialist

If you are concerned that your business may be vulnerable to attack, it is important to talk to a qualified IT specialist. We can review your business’ security measures and assess your level of risk. We can recommend and implement best practices to provide greater security to your network. To schedule a professional consultation, contact us.

Check Out Our Blog!

a person using a laptop computer on a wooden table

Cybersecurity in the Age of Remote Work

https://youtu.be/KV9kgmFj_sM Facing the challenges of remote work requires a proactive approach to cybersecurity measures to ensure the protection of sensitive

Phishing Attack

What to Do After a Phishing Attack

https://www.youtube.com/watch?v=wP42Et2mOGI If you’ve ever wondered what steps to take after falling victim to a phishing attack, rest assured that there

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.