Defeating The Three Most Common EPoS Enemies

May 16, 2014

In our article, Why your EPoS is your worst enemy, we discussed the three most commonly used attack techniques used to steal data from PoS stations and the impact on business, brand name and customer service.

Thankfully the majority of the attack techniques used rely on security flaws that can be easily fixed.

In this guide, you'll learn how to quickly learn how to use several low cost techniques that will help defend your business from the most common threats on PoS terminals.

Malware

At time of writing, malware accounts for 24 per cent of all PoS data breaches.  Fortunately, the way in which you protect your PoS system against malware is similar to how you protect your home PC/Laptop:-

  • Ensure you have the latest security updates for your operating system (e.g. Windows 8/Windows 7/Linux/XP)
  • Install anti-virus software on your system
  • Think about how scalable the anti-virus suite is before you purchase
  • Ensure you have at least one firewall, software or hardware
  • Software firewall: creates a defence between your computer and the network, so if another computer on the network gets infected the software firewall will help prevent the spread to your computer
  • Hardware firewall: routers effectively work as a hardware firewall, creating a barrier between your computer and the internet. Routers provide protection for all computers behind the hardware firewall, so it is easy to scale.
  • Download an anti-spyware program, such as SpyBot Search & Destroy, this will immunize your computer from spyware (software that secretly gathers information about the users).
  • Some operating systems such as Microsoft Windows 8.1 has anti-spyware in-built it's Defender software - ensure that it is setup and active.

Once you've installed your chosen anti-virus and anti-spyware software you're half-way to fully protecting your PoS system.

hacker

Hacker prevention

 

The majority of "hacks" on PoS systems are simple to pull off and rely on the user's ignorance rather than the hacker's skill and knowledge.

Here are some ways to remove the weaknesses hackers exploit:

  • Change the default passwords and accounts with administrator access.
  • Set a strong password with nine or more characters using a mixture of characters, symbols and numbers on all user accounts
  • Set a lock-out measure for repeated failed log-in attempts

Hackers can also access your systems through remote desktop applications that exploit vulnerabilities in the code to gain remote control over your PoS system, computer and network.

To minimise the risk of hacker's gaining access through remote desktop applications ensure that your applications are patched and have the latest update installed. Hackers also exploit the default settings of remote desktop applications so be sure to change the default settings for that as well.

Physical attack prevention

Hacking and physical attacks are tied for the most used techniques to steal data however physical attacks require more skill and ability as a data thief will need to steal a PIN pad or quickly attached a skimmer or key logger to the device.

Once the thief has successfully struck the attack is harder to detect as it requires more than basic IT security knowledge to combat.

To reduce the chance and damage of a physical attack, follow these steps:

  • Track your POS terminals and their serial numbers
  • So you can easily spot a swap
  • Use secure POS stands
  • Inspect your terminal regularly
  • Check the security seals and labels for signs of tampering
  • Note any scratches or marks
  • Train staff to recognise tampered devices

Another tactic used by data thieves is to social engineering techniques for example they could pose as PoS engineers and 'repair' your terminal. While repairing your terminal the hacker could use that opportunity to tamper with very components of your PoS system so do ensure that your staff challenge any repair engineer.

Conclusion

It may appear that we've provided you with a long todo list to minimise attacks to your network via a compromised EPoS system. However once implemented, the on-going maintenance will be relatively minimal. To recap the essential components:

  • Install a firewall, anti-virus and anti-spyware software
  • Frequently download patches and updates for the operating system and applications
  • Change all the default settings
  • Don't use obvious passwords
  • Check for tampering

By following these steps you will greatly reduce the risk of data theft and will ensure the safety of your customer's personal data.If this is of concern to your business and brand name, do read the three extra articles that focus on each of the attacks mentioned in this defence overview and other easy ways to mitigate the attacks.

Ultimately the business should have someone (employee or outside contractor) to ensure the security stance of the business.




Author: Nathan Benjamin Chai
View the original article here.
Published under license from ITProPortal.com

Comment

 

Understanding the risks and rewards of public sector cloud 

Download the Whitepaper now

Partner

24Newswire
Sign up to receive latest news