Click me
Transcribed

Where is Your Point of Sale System Vulnerable?

ENTRY POINT Vulnerability in Small Businesses Haken an beak ia deof mal bi Passwords 63% 20/ of 2010 cyber aacks were at companies with O FMPLOYEES OR FEWER 50% of business users are still using SINEHESSED ASSWORDS POS Vulnerabilities You Didn't Know Were There F0 of credit cand dara breaches are on 95% MAL LNSINISS CUSTOMEES (adng Val em) The most common being DEFAULT PASSWORDS "Password1" A major vulnerability isue commonly targer by hackers Setting the Scene Limied dgyn end f Credit Card Hacks In 2012 dhe 45% of daa beach investigations Hachen whiawarly preimity an injert malae prgram er a wadwivdeu wert RETAIL INDUSTRY male up One of the most commen acks on mall busineses HIGHEST PERCENTAGE IN REAL HISTORY 19 Adng de Peyr Gd Indutry Seurity Stadendi Cumil many buiee gler hei warity БСOMMERCE sites were the mot common target. accouning for Anacks were discovered in DIFFERENT 29 DUNTHES 48% te of all investigatiom 64% of attacked bunineses took more than 90 DAYS- to detect an intrusion 210 Au cntd de e plaed anda wind t Ana can appear Employee Theft mplee emas Malware & Viruses KEYSTROKE LOGGERS PURPOSE Many ai m gber rity Financially mocivated attacks typically vely on planed compuner code KEYLLAMA Ade leging handea • AVERTISED AS Lat ef efwe maten Kyllema impanie deinet 100% Niterk sa ky an ASV Can hold 4MB of memory The keylogger program reconds each keystroke and uploads recorded data to a USB or over the latermet with larger software systems nd alanahilnin DATA CRIME AINGS paying employees for data SAFETY TIPS • Resurict dieect Intemet acce • Reject unauthorined devices • Change defaalt pasuwoeds • lolate orage vystems • Don't stoe cand data unless needed The Unprotected Wi-Fi Network CAUSES 10/ of businew failures are a 60% dre ele of intermal heft 29TEAR OLDemployees 34% believe it is jusifiable o neal from their employer FONNENOHON 1ESCIICAACLA IMPROVING SECURITY EDUCATE EMPLOTEES Condut security awarene raining on a regalar basis IDINTIFY USERS Every user-initianed action should be ragged REGISTER ASSETS Keep a complere invensory or regisery of valid devices PROTICT DATA Take the "more than UNIFY ACTIVITY LOGS VISUALIZE EVINTS Combine physical and information security Idensify pamerna and vulnerabilities vechnology" approsch NOWSOURCING Merchant Warehouse

Where is Your Point of Sale System Vulnerable?

shared by NowSourcing on May 07
224 views
0 shares
0 comments
This infographic provides a deeper look into POS systems and their vulnerabilities.

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size