6-12-14 Podcast References

“If you really want to do something, you’ll find a way. If you don’t, you’ll find an excuse.”

–Jim Rohn


P.F. Chang’s Investigates Possible Breach of Customer Credit Cards

http://www.securityweek.com/pf-changs-investigates-possible-breach-customer-credit-cards

http://www.infosecurity-magazine.com/view/38818/pf-changs-may-have-leaked-info-on-thousands-of-credit-cards-/

http://krebsonsecurity.com/2014/06/banks-credit-card-breach-at-p-f-changs/


 

Survey respondents praise, but neglect, continuous monitoring

http://www.scmagazine.com/survey-respondents-praise-but-neglect-continuous-monitoring/article/355322/

C-IT Recommendation

  1. Ensure your organization has Firewalls/Intrusion Prevention Solutions in place that is capable of block incoming attempts from bad reputation IP addresses from countries on the watch list.
  2. Verify your security appliances are reporting to a Security Information and Event Management tool (SIEM) that correlates events and displays intelligible information to security analysts.
  3. Validate your organization has an efficient Security Operations Center (SOC) of which trained analysts are trained to alert on potential malicious events or malicious sources.
  4. Verify your company has an effective and enforced data classification standard which requires data owners to seriously assess data sensitivity and requires data custodians to properly secure the information to need-to-know only basis.
  5. Ensure your organization has a solid data storage policy which requires confidential data to be stored in secure, encrypted locations
  6. Perform periodic access reviews for data stores and applications housing highly classified or confidential information to ensure appropriate access is enforced. Any users or groups who are discovered to have access and don’t have a need to have access should be immediately removed.
  7. Confirm network segmentation in your environment so that only required devices are able to access networks where highly classified or confidential data resides.

Article Resources

Ponemon Institute SQL Injection Threat Study

http://www.dbnetworks.com/pdf/ponemon-the-SQL-injection-threat-study.pdf


 

Small businesses running cloud-based POS software hit with unique ‘POSCLOUD’ malware

http://www.scmagazine.com/small-businesses-running-cloud-based-pos-software-hit-with-unique-poscloud-malware/article/355301/

C-IT Recommendation

  1. Perform a risk analysis for utilizing cloud based services. Understand your limitations of using the cloud including
    1. Not having have total control
    2. Having your data protected by someone else
    3. Having your security managed by someone else
    4. Not having information about the cloud providers infrastructure
  2. As a result, Ensure your legal department has a strong SLA and breach accountability agreement with the cloud provider in case critical company or customer data is compromised
  3. Use Strong password for Terminal log in accounts and change them regularly
  4. Keep POS operating systems and POS Software Applications updated with the latest patches:
  5. Install a Firewall
  6. Ensure a solid Antivirus solution is running on the PoS terminals
  7. Ensure your company is using a web content filtering solution to prevent user from accessing malicious websites.
  8. Validate the web content filtering solution is up to date with the latest stable version with the latest site signature updates
  9. Disallow Remote Access so that attackers cannot remotely access terminals
  10. Encrypt traffic between terminals, servers and payment card processor

Article Resources

IntelCrawler Cloud-Based POS Software – “New Target for Hackers?”

http://intelcrawler.com/intel/webpos.pdf

US-CERT Common Risks of Using Business Apps in the Cloud

http://www.us-cert.gov/sites/default/files/publications/using-cloud-apps-for-business.pdf

 

Leave a Reply

Your email address will not be published. Required fields are marked *