Think Your Point of Sale Devices Are Secure in Time for the Holidays? Think Again!
Retailers, restaurants, hoteliers, and small businesses continue to discover breaches on their point of sale (POS) devices, as the result of brute force hacking, backdoor malware, use of stolen credentials, phishing, or memory scraping. Even though retailers have a responsibility to protect consumer data, attacks still happen. According to the 2019 Verizon Data Breach Investigations Report, while some attacks are specific actions taken against specific assets, “others show that some actions are conducted earlier or later in event chains that feature a particular asset – you don’t phish a laptop, but you may phish a human and install malware on his/her laptop in the next step. In brief, the game has not changed for this industry. POS Controllers are compromised and malware specifically designed to capture payment card data in memory is installed and extended to connected POS Terminals.”
Why are POS devices so appealing to hackers? For one, they tend to run on older or designated embedded operating systems, and the very few Anti-Virus supposedly protecting these systems can easily be bypassed. New attacks and advanced malware simply can infiltrate systems undetected. And patching them usually means taking devices offline, which is costly to the business. Unfortunately, delayed detection of a breach gives attackers more time to scrape, exfiltrate and exploit customer financial data and tarnish a brand’s reputation. POS systems are often under attack by cyber criminals for months, and even years, without being noticed. The majority of attacks on POS systems are only identified once excessive suspicious financial activity and fraudulent charges are reported.
Moreover, heavy, resource-intensive AntiVirus and endpoint security solutions can also bog down POS devices because they are low-powered and resource-constrained. What’s needed is a lightweight security solution that supports broad legacy or designated OS with the ability to stop advanced malware and breaches dead in their tracks -- and contains attacks in real time so that the POS device can keep operating, ensuring business continuity without risk to the business.
And that’s exactly what enSilo is designed to do. With enSilo, you get proactive, real-time, fully automated security with orchestrated incident response across any communication device -- including POS devices, workstations and servers with current and legacy operating systems, traditional, embedded or VDI, as well as manufacturing and other IoT devices -- all in a single integrated platform, with flexible deployment options and a predictable operating cost. enSilo offers a single lightweight agent -- less than 1% CPU / 60 MB.
Because POS devices tend to be static environments, it’s very easy for us to take a baseline and automatically tune the environment and smoothly deploy -- eliminating alert fatigue. You can stop infections in real time, eliminating dwell time. enSilo uses its unique (the first and only in the industry) real-time post-infection blocking of data exfiltration and tampering. You get:
- Broad OS support, including legacy embedded systems often found in POS environments, such as XP and Windows 7.
- Small footprint comprising a lightweight agent (60MB) that is simple to deploy and does not require POS devices to restart.
- Protection in real time -- enSilo contains attacks in real time, even when devices have been infiltrated and compromised. This allows the POS device to continue working uninterrupted without risk, until IT can remediate.
- Prevents, detects, contains and remediates incidents in real time.
Product Certifications and Reviews
enSilo has been thoroughly vetted and tested by industry organizations, product labs and security media:
- PCI DSS
- NSS Labs
- CSO Online
- SC Magazine
Request a demo to find out how enSilo can reduce the attack surface with proactive risk mitigation, protect endpoints such as POS devices both pre- and post-infection, stop data breaches in real time and automatically orchestrate incident investigation and response.