Tuesday 4 December 2018

6 Ways to Secure Your EPOS System – Part 1


This week, Russian cyber criminals ruptured in excess of 330,000 point-of-sale (POS) systems manufactured by Oracle backup Micros one of the three biggest POS equipment sellers in the world. The breach has possibly exposed customer at fast food chains, retail stores, and hotels around the world.

POS attacks aren't new. One of the greatest information breaks in EPOS history, the Target hack, uncovered in excess of 70 million customer records to hackers and cost the retailer's CEO and CIO their jobs. At the time of the attack, it was revealed that the attack could have been avoided if Target had executed the auto-eradication highlight inside its Fire Eye anti malware system.

In reality most POS attacks can be restricted. There are lot many threats for your epos system yet there is similarly there are many approaches to battle these attacks.

1. Use an iPad for POS

In the recent attacks, including the Wendy's and Target attacks, have been the consequence of malware applications stacked into the POS system's memory. Hackers can covertly transfer malware applications into the POS systems and after pilfer information, without the customer or the dealer acknowledging what occurred. The vital point to note here is that a second app must run, generally the attack can't happen. This is the reason iOS has generally facilitated less attacks. Since iOS is just ready to completely run one app at any given time, these kinds of attacks once in a while happen on Apple-made devices.


To be reasonable, epos systems explicitly designed for the iPad, so it's to Ciabarra's greatest advantage to push Apple's equipment. Be that as it may, there's a reason you rarely, if at any time, know about POS attacks happening on Apple-specific POS systems. Keep in mind when the iPad Pro was unveiled? Everyone thought about whether Apple would enable true multitasking functionality, which would permit two apps to all while keep running at full capacity. Apple left this element off of the iPad Pro, a lot to the shame of everyone expect from those customers who were probably going to run epos software on their new devices.



2. Use End-to-End Encryption

Companies, for example, Verifone offer software that is intended to ensure your customer's data is never presented to hackers. These tools encrypt card data the second it's received on the epos device and by and by when it's sent to the software's server. This implies the data is never vulnerable, regardless to where hackers may be installing malware.

"You need a genuine point-to-point encoded unit," said Ciabarra. "You need the information to go straight from the unit to the portal. The charge card information won't contact the POS unit."

No comments:

Post a Comment