Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity

    E-Commerce More Secure than Brick and Mortars

    By
    Evan Schuman
    -
    November 27, 2006
    Share
    Facebook
    Twitter
    Linkedin

      Despite consumer—and even some IT executive—beliefs that e-commerce poses a much greater security risk than store-based point-of-sale systems, a new Gartner report concludes that the opposite is true.

      Gartner is reporting that by 2008 most attacks will be on physical POS (point-of-sale) systems and that by 2009 only one out of three such systems will comply with current security standards.

      “Device vulnerabilities are often overlooked by enterprises, who tend to focus on enterprise servers and systems when securing their environments,” wrote Gartner security analyst Avivah Litan, adding that data transmissions are also closely monitored and “typically ignored by many companies are the devices that hang off of corporate networks where data are either collected or output, particularly point-of-sale devices and printers located throughout enterprise systems.”

      This disconnect has not been lost on thieves (neither the cyber nor the old-fashioned kind). “Criminals have discovered that some devices are ripe targets for committing financial fraud and other types of information theft. Particularly hard hit in the past year are point-of-sale systems exposed to the Internet which are storing magnetic stripe card data, and intelligent printer systems that store information as part of the paper print process,” the report said.

      How lopsided are the figures? Overwhelming, according to Gartners statistics, which have 80 percent of all data breaches happening in-store. “I cant think of one well-publicized successful e-commerce attack,” Litan said.

      To be fair, many of the data breaches involve the Internet but are quite far removed from e-commerce. For example, many POS systems seek authorizations and pass information along an IP connection, which is frequently how they are accessed by the crooks.

      “A lot of retailers have moved their POS from dial-up to IP, and they havent even thought about the security implications,” Litan said. “A lot of the passwords are still the default security passwords.”

      Another confusion point is where and how the data is used to commit the fraud, as opposed to how the confidential data is stolen. Its a lot more common—and easier—to steal the data from store systems, whether via the network, using someone in a physical storefront, or stealing a laptop from workers while they are commuting or by breaking into their homes. But after the data is captured, its indeed easier to commit the actual theft later on using the more anonymous Web site.

      The reasons in-store systems are such attractive targets are numerous, but primarily because they typically are not as well-protected. Another reason is that there is simply a lot more data to be taken from in-store systems.

      /zimages/3/28571.gifGartner says $2 billion in e-commerce sales have been lost because of security fears. Click here to read more.

      E-commerce sites and stores “might be equally secure, but brick and mortars have a lot more data and better data,” Litan said. “You can get millions of numbers instead of thousands, and you can get the magstripe data. Thats not supposed to be stored, but it is stored.”

      The report said that many retailers are likely to be fined soon by credit card groups for storing that data, even though many of them are not knowingly saving the forbidden data.

      ” Many of the breaches investigated involved the theft of magnetic stripe data—the most sensitive security information attached to a card—that was stored on a merchants point-of-sale system,” the report said. “This is often done without the retailers knowledge since the data is stored as a function of application software, which retailers typically do not know how to decipher.

      “Another forensic analyst firm that examines breaches involving major credit card brands found that a high percentage of data breaches can be traced to vulnerabilities with just a few terminal brands,” according to the report. “Of 71 breaches investigated by this firm, 59 percent were traced to just four terminal models. The criminals determined which companies to target by simply looking at the list of customers on the terminal manufacturers Web site.”

      The security risks posed by various smart network peripherals—especially printers, but also fax machines, copiers and scanners—are not particularly new. As those multi-decade-old devices have gotten a lot smarter—with much faster CPUs, much more RAM, large hard disks and full two-way network and even Internet access—the potential for using the rarely secured devices as an easy means to enter a network and then internally access as many resources as desired has soared, and mainstream stories have detailed such issues.

      But many retailers are using those smart printers to capture and print credit card information, which makes them very attractive physical targets. “The printers and multifunction products (MFPs) being deployed in enterprises today are all equipped with hard disk drives (HDD), and the latest generation of MFPs and printers (smartMFS) are deploying open architectures that incorporate or accommodate live applications accessible from the user interface (UI) or remotely,” the Gartner report said.

      “In many cases, these Java applications reside on the machine and, in other cases, the applications reside on a network server that receives commands using traditional web-services communication protocols. These applications transform the MFPs into an information hub that can scan paper-based information into an on-line repository, automate routine functions and even download information from a web-server.”

      Gartner recommends that printers—no matter how innocuous their history—be treated like any other information-rich part of the network.

      “At a minimum, employ basic security practices when it comes to these devices such as changing default administrator passwords and installing firewalls in front of them. Dont store sensitive data, such as magnetic stripe card data in a POS system or personal information on a printer hard drive,” the report suggested. “If such storage is due to a vendors system design, demand the vendor removes such capabilities or else switch to a new supplier.”

      Retail Center Editor Evan Schuman can be reached at Evan_Schuman@ziffdavis.com.

      /zimages/3/28571.gifCheck out eWEEK.coms for the latest news, views and analysis on technologys impact on retail.

      Evan Schuman
      Evan Schuman is the editor of CIOInsight.com's Retail industry center. He has covered retail technology issues since 1988 for Ziff-Davis, CMP Media, IDG, Penton, Lebhar-Friedman, VNU, BusinessWeek, Business 2.0 and United Press International, among others. He can be reached by e-mail at Evan.Schuman@ziffdavisenterprise.com.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×