SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
PAYMENT
Best Practices
SECURITY
To ensure merchants have secure payment solutions for their
customers, and to help protect merchants from penalties levied
by Payment Card Industry Data Security Standards in the event of
a breach, we have developed a series of best practices that apply
to traditional PIN pad devices, as well as today’s leading-edge
payment solutions that incorporate touch screens and advanced
wireless capabilities. These best practices will help retailers
determine whether an existing payment device has been tampered
with, while also outlining measures that can prevent security
breaches from happening in the first place.
At VeriFone, the protection of cardholder
information is a top priority.
The PCI Council adopted PIN Transaction Security (PTS) requirements because of
concerns that sophisticated criminals may have the resources to tamper with payment
devices and collect personal card data. Prior to the advent of PCI, the burden of
security lay almost completely on the retailer; but now, security requirements have
been standardized across the industry to make tampering progressively more difficult.
While this does mean that today’s PIN pad and POS devices are inherently more
secure than those developed pre-PCI, the simplest and often most effective
preventative measures are still those that retailers and merchants can incorporate
into routine operations.
Criminals are targeting less secure devices, which often pre-date PCI compliance
requirements – typically either tampering with an in-store device or obtaining the
same device that a retailer uses and modifying it for criminal purposes before
substituting the tampered device for the retailer’s device. The criminal then either
returns to retrieve the device to obtain the stolen information, or in some cases,
the device transmits personal card data wirelessly to another off-site computer.
Today’s newer devices incorporate a number of physical security precautions
designed to make it extremely difficult to modify a device. These precautions are
constantly tested and certified by independent labs.
Why should
merchants be
concerned
about security?
How do PIN
pad-based
security
breaches
happen?
1. Perform routine visual inspections of every device, looking for potential signs
of tampering. Also keep track of any operational difficulties that begin happening
on a regular basis. Some examples of things to look for include:
• Damaged or altered tamper seals
• Missing manufacturer labels
• Missing screws or screws with damaged heads
• Incorrect keyboard overlays
• External wires
• Holes in the device housing
• An electronic serial number that does not match the number printed
on the label on the bottom of the device
• A high number of mag-stripe read failures or debit card declines
• Difficulty inserting a chip and PIN card into the EMV slot
If you notice these or anything else out of the ordinary, stop using the device
immediately and disconnect it from the POS device or network, but do not power
it down. Immediately contact your bank or services provider, corporate security
team, or local authorities, and explain your concern. Continue to perform visual
inspections weekly in high-traffic areas and more frequently in locations with low
foot-traffic or PIN pad use.
2. Store spare devices under lock and key to prevent unauthorized removal.
Incorporate a shift change procedure to validate the inventory of devices at every
shift to ensure none have disappeared. Physically inspect devices before deploying
them for use.
3. Institute a procedure that requires all visiting repair technicians to sign in
with their name and company information and to track the serial numbers of
any devices that are installed, removed and/or replaced.
4. Securely mount devices so that cables cannot be unplugged simply by turning
the device over. You may also want to consider installing locking stands to prevent
unauthorized removal.
How to Protect Your Business and Your Customers
Even with the physical security built into today’s devices, there are things
that merchants can do to significantly reduce the likelihood of a device
being subjected to tampering.
Physical Hardware
5. If your POS equipment is connected to a network via Ethernet,
ensure you have a working and updated network firewall where the connection
enters your location.
6. Make sure your POS equipment is protected by an encryption and
tokenization solution that encrypts credit card information at the point of
capture (swipe, tap, etc.). As added protection, you may want to install an
estate management solution that lets you monitor the status of all of your devices.
In addition to monitoring normal system functions (power, faulty hardware, etc.),
it can also provide alerts related to encryption and tokenization.
7. Change the device’s default admin password. These default passwords
become widely known. Contact your account executive if you need help
changing this password.
8. Only obtain payment devices from a manufacturer or a manufacturer’s
authorized partner. Unauthorized resellers, which often may be found online at
sites such as eBay, may potentially sell devices that are already compromised,
whether intentionally or unwittingly.
9. For similar reasons, have your devices repaired by the manufacturer
or at an authorized manufacturer’s repair center that has completed a
key injection audit.
Software
Purchase  Repair
1. Steps to take to isolate all suspect payment systems to prevent further loss of
information and to preserve the attack method used for future investigation.
2. A contact list: Local law enforcement, acquiring bank, your processor, a qualified
security assessor and any payment system vendors with which you work.
At VeriFone, we take a strong stance on security. With more than 30 years of experience,
we are leveraging our close relationships with retailers, banks and industry bodies to
develop and deliver the most dependable and secure payment solutions across all retail
environments. In fact, all VeriFone payment solutions, including our payment processing
software, conform to the most stringent security requirements outlined by the PCI
Council. Our ultimate goal is to make it impossible for fraudsters to commit card crime,
thereby allowing consumers to enjoy peace of mind when using their payment of choice.
Taken together, these best practices should significantly reduce the risk of device
tampering and compromise. Though the chance of a consumer becoming a victim of
card fraud remains low, we can never be too vigilant when it comes to customer data
security and brand reputation.
Having a response plan
in place before you suspect
you have a security issue
can help reduce confusion
and the amount of time
 it takes to identify and
remediate a potential breach.
At a minimum,
this plan should
include:
www.verifone.com
© 2013 VeriFone, Inc. All rights reserved. VeriFone and the VeriFone logo are either trademarks or registered trademarks of VeriFone in the United States and/or other
countries. All other trademarks or brand names are the properties of their respective holders. All features and specifications are subject to change without notice.
Reproduction or posting of this document without prior VeriFone approval is prohibited. 5/13 46390 Rev A FS
About VeriFone Systems, Inc. (www.verifone.com) VeriFone Systems, Inc. (“VeriFone”) (NYSE: PAY) is the global
leader in secure electronic payment solutions. VeriFone provides expertise, solutions and services that add value
to the point of sale with merchant-operated, consumer-facing and self-service payment systems for the financial,
retail, hospitality, petroleum, government and healthcare vertical markets. VeriFone solutions are designed to
meet the needs of merchants, processors and acquirers in developed and emerging economies worldwide.

Mais conteúdo relacionado

Mais de Verifone

Paybook presented by Verifone
Paybook presented by VerifonePaybook presented by Verifone
Paybook presented by VerifoneVerifone
 
Verifone Q4 FY17 Earnings Report
Verifone Q4 FY17 Earnings ReportVerifone Q4 FY17 Earnings Report
Verifone Q4 FY17 Earnings ReportVerifone
 
Helping Merchants Grow
Helping Merchants Grow Helping Merchants Grow
Helping Merchants Grow Verifone
 
Paybook Vol. 7 | October 2017
Paybook Vol. 7 | October 2017 Paybook Vol. 7 | October 2017
Paybook Vol. 7 | October 2017 Verifone
 
Verifone Q3 2017 Earnings
Verifone Q3 2017 EarningsVerifone Q3 2017 Earnings
Verifone Q3 2017 EarningsVerifone
 
Paybook Vol. 6 June 2017
Paybook Vol. 6 June 2017Paybook Vol. 6 June 2017
Paybook Vol. 6 June 2017Verifone
 
Guiding Merchants to Success in the 21st Century Survival Guide
Guiding Merchants to Success in the 21st Century Survival GuideGuiding Merchants to Success in the 21st Century Survival Guide
Guiding Merchants to Success in the 21st Century Survival GuideVerifone
 
Guiding Merchants to Success
Guiding Merchants to SuccessGuiding Merchants to Success
Guiding Merchants to SuccessVerifone
 
Verifone Q2 2017 Earnings
Verifone Q2 2017 EarningsVerifone Q2 2017 Earnings
Verifone Q2 2017 EarningsVerifone
 
21st Century Merchant Survival Guide US Edition
21st Century Merchant Survival Guide US Edition21st Century Merchant Survival Guide US Edition
21st Century Merchant Survival Guide US EditionVerifone
 
Paybook Vol. 5 May 2017
Paybook Vol. 5 May 2017Paybook Vol. 5 May 2017
Paybook Vol. 5 May 2017Verifone
 
Surviving the Retail Jungle
Surviving the Retail JungleSurviving the Retail Jungle
Surviving the Retail JungleVerifone
 
Verifone Q1 2017 Earnings
Verifone Q1 2017 EarningsVerifone Q1 2017 Earnings
Verifone Q1 2017 EarningsVerifone
 
Paybook Vol. 2 | July 2016
Paybook Vol. 2 | July 2016Paybook Vol. 2 | July 2016
Paybook Vol. 2 | July 2016Verifone
 
Paybook Vol. 4 | January 2017
Paybook Vol. 4 | January 2017Paybook Vol. 4 | January 2017
Paybook Vol. 4 | January 2017Verifone
 
Verifone Q4 2016 Earnings
Verifone Q4 2016 EarningsVerifone Q4 2016 Earnings
Verifone Q4 2016 EarningsVerifone
 
Paybook Vol. 3 | October 2016
Paybook Vol. 3 | October 2016Paybook Vol. 3 | October 2016
Paybook Vol. 3 | October 2016Verifone
 
Verifone FY16 Q3 Earnings Presentation
Verifone FY16 Q3 Earnings PresentationVerifone FY16 Q3 Earnings Presentation
Verifone FY16 Q3 Earnings PresentationVerifone
 
Verifone Q2 Earnings Presentation
Verifone Q2 Earnings PresentationVerifone Q2 Earnings Presentation
Verifone Q2 Earnings PresentationVerifone
 
Forget Cash!
Forget Cash! Forget Cash!
Forget Cash! Verifone
 

Mais de Verifone (20)

Paybook presented by Verifone
Paybook presented by VerifonePaybook presented by Verifone
Paybook presented by Verifone
 
Verifone Q4 FY17 Earnings Report
Verifone Q4 FY17 Earnings ReportVerifone Q4 FY17 Earnings Report
Verifone Q4 FY17 Earnings Report
 
Helping Merchants Grow
Helping Merchants Grow Helping Merchants Grow
Helping Merchants Grow
 
Paybook Vol. 7 | October 2017
Paybook Vol. 7 | October 2017 Paybook Vol. 7 | October 2017
Paybook Vol. 7 | October 2017
 
Verifone Q3 2017 Earnings
Verifone Q3 2017 EarningsVerifone Q3 2017 Earnings
Verifone Q3 2017 Earnings
 
Paybook Vol. 6 June 2017
Paybook Vol. 6 June 2017Paybook Vol. 6 June 2017
Paybook Vol. 6 June 2017
 
Guiding Merchants to Success in the 21st Century Survival Guide
Guiding Merchants to Success in the 21st Century Survival GuideGuiding Merchants to Success in the 21st Century Survival Guide
Guiding Merchants to Success in the 21st Century Survival Guide
 
Guiding Merchants to Success
Guiding Merchants to SuccessGuiding Merchants to Success
Guiding Merchants to Success
 
Verifone Q2 2017 Earnings
Verifone Q2 2017 EarningsVerifone Q2 2017 Earnings
Verifone Q2 2017 Earnings
 
21st Century Merchant Survival Guide US Edition
21st Century Merchant Survival Guide US Edition21st Century Merchant Survival Guide US Edition
21st Century Merchant Survival Guide US Edition
 
Paybook Vol. 5 May 2017
Paybook Vol. 5 May 2017Paybook Vol. 5 May 2017
Paybook Vol. 5 May 2017
 
Surviving the Retail Jungle
Surviving the Retail JungleSurviving the Retail Jungle
Surviving the Retail Jungle
 
Verifone Q1 2017 Earnings
Verifone Q1 2017 EarningsVerifone Q1 2017 Earnings
Verifone Q1 2017 Earnings
 
Paybook Vol. 2 | July 2016
Paybook Vol. 2 | July 2016Paybook Vol. 2 | July 2016
Paybook Vol. 2 | July 2016
 
Paybook Vol. 4 | January 2017
Paybook Vol. 4 | January 2017Paybook Vol. 4 | January 2017
Paybook Vol. 4 | January 2017
 
Verifone Q4 2016 Earnings
Verifone Q4 2016 EarningsVerifone Q4 2016 Earnings
Verifone Q4 2016 Earnings
 
Paybook Vol. 3 | October 2016
Paybook Vol. 3 | October 2016Paybook Vol. 3 | October 2016
Paybook Vol. 3 | October 2016
 
Verifone FY16 Q3 Earnings Presentation
Verifone FY16 Q3 Earnings PresentationVerifone FY16 Q3 Earnings Presentation
Verifone FY16 Q3 Earnings Presentation
 
Verifone Q2 Earnings Presentation
Verifone Q2 Earnings PresentationVerifone Q2 Earnings Presentation
Verifone Q2 Earnings Presentation
 
Forget Cash!
Forget Cash! Forget Cash!
Forget Cash!
 

Último

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

VeriFone PIN Pad Security Best Practices

  • 2. To ensure merchants have secure payment solutions for their customers, and to help protect merchants from penalties levied by Payment Card Industry Data Security Standards in the event of a breach, we have developed a series of best practices that apply to traditional PIN pad devices, as well as today’s leading-edge payment solutions that incorporate touch screens and advanced wireless capabilities. These best practices will help retailers determine whether an existing payment device has been tampered with, while also outlining measures that can prevent security breaches from happening in the first place. At VeriFone, the protection of cardholder information is a top priority.
  • 3. The PCI Council adopted PIN Transaction Security (PTS) requirements because of concerns that sophisticated criminals may have the resources to tamper with payment devices and collect personal card data. Prior to the advent of PCI, the burden of security lay almost completely on the retailer; but now, security requirements have been standardized across the industry to make tampering progressively more difficult. While this does mean that today’s PIN pad and POS devices are inherently more secure than those developed pre-PCI, the simplest and often most effective preventative measures are still those that retailers and merchants can incorporate into routine operations. Criminals are targeting less secure devices, which often pre-date PCI compliance requirements – typically either tampering with an in-store device or obtaining the same device that a retailer uses and modifying it for criminal purposes before substituting the tampered device for the retailer’s device. The criminal then either returns to retrieve the device to obtain the stolen information, or in some cases, the device transmits personal card data wirelessly to another off-site computer. Today’s newer devices incorporate a number of physical security precautions designed to make it extremely difficult to modify a device. These precautions are constantly tested and certified by independent labs. Why should merchants be concerned about security? How do PIN pad-based security breaches happen?
  • 4. 1. Perform routine visual inspections of every device, looking for potential signs of tampering. Also keep track of any operational difficulties that begin happening on a regular basis. Some examples of things to look for include: • Damaged or altered tamper seals • Missing manufacturer labels • Missing screws or screws with damaged heads • Incorrect keyboard overlays • External wires • Holes in the device housing • An electronic serial number that does not match the number printed on the label on the bottom of the device • A high number of mag-stripe read failures or debit card declines • Difficulty inserting a chip and PIN card into the EMV slot If you notice these or anything else out of the ordinary, stop using the device immediately and disconnect it from the POS device or network, but do not power it down. Immediately contact your bank or services provider, corporate security team, or local authorities, and explain your concern. Continue to perform visual inspections weekly in high-traffic areas and more frequently in locations with low foot-traffic or PIN pad use. 2. Store spare devices under lock and key to prevent unauthorized removal. Incorporate a shift change procedure to validate the inventory of devices at every shift to ensure none have disappeared. Physically inspect devices before deploying them for use. 3. Institute a procedure that requires all visiting repair technicians to sign in with their name and company information and to track the serial numbers of any devices that are installed, removed and/or replaced. 4. Securely mount devices so that cables cannot be unplugged simply by turning the device over. You may also want to consider installing locking stands to prevent unauthorized removal. How to Protect Your Business and Your Customers Even with the physical security built into today’s devices, there are things that merchants can do to significantly reduce the likelihood of a device being subjected to tampering. Physical Hardware
  • 5. 5. If your POS equipment is connected to a network via Ethernet, ensure you have a working and updated network firewall where the connection enters your location. 6. Make sure your POS equipment is protected by an encryption and tokenization solution that encrypts credit card information at the point of capture (swipe, tap, etc.). As added protection, you may want to install an estate management solution that lets you monitor the status of all of your devices. In addition to monitoring normal system functions (power, faulty hardware, etc.), it can also provide alerts related to encryption and tokenization. 7. Change the device’s default admin password. These default passwords become widely known. Contact your account executive if you need help changing this password. 8. Only obtain payment devices from a manufacturer or a manufacturer’s authorized partner. Unauthorized resellers, which often may be found online at sites such as eBay, may potentially sell devices that are already compromised, whether intentionally or unwittingly. 9. For similar reasons, have your devices repaired by the manufacturer or at an authorized manufacturer’s repair center that has completed a key injection audit. Software Purchase Repair
  • 6. 1. Steps to take to isolate all suspect payment systems to prevent further loss of information and to preserve the attack method used for future investigation. 2. A contact list: Local law enforcement, acquiring bank, your processor, a qualified security assessor and any payment system vendors with which you work. At VeriFone, we take a strong stance on security. With more than 30 years of experience, we are leveraging our close relationships with retailers, banks and industry bodies to develop and deliver the most dependable and secure payment solutions across all retail environments. In fact, all VeriFone payment solutions, including our payment processing software, conform to the most stringent security requirements outlined by the PCI Council. Our ultimate goal is to make it impossible for fraudsters to commit card crime, thereby allowing consumers to enjoy peace of mind when using their payment of choice. Taken together, these best practices should significantly reduce the risk of device tampering and compromise. Though the chance of a consumer becoming a victim of card fraud remains low, we can never be too vigilant when it comes to customer data security and brand reputation. Having a response plan in place before you suspect you have a security issue can help reduce confusion and the amount of time  it takes to identify and remediate a potential breach. At a minimum, this plan should include:
  • 7. www.verifone.com © 2013 VeriFone, Inc. All rights reserved. VeriFone and the VeriFone logo are either trademarks or registered trademarks of VeriFone in the United States and/or other countries. All other trademarks or brand names are the properties of their respective holders. All features and specifications are subject to change without notice. Reproduction or posting of this document without prior VeriFone approval is prohibited. 5/13 46390 Rev A FS About VeriFone Systems, Inc. (www.verifone.com) VeriFone Systems, Inc. (“VeriFone”) (NYSE: PAY) is the global leader in secure electronic payment solutions. VeriFone provides expertise, solutions and services that add value to the point of sale with merchant-operated, consumer-facing and self-service payment systems for the financial, retail, hospitality, petroleum, government and healthcare vertical markets. VeriFone solutions are designed to meet the needs of merchants, processors and acquirers in developed and emerging economies worldwide.