Skip navigation
industry news

Protecting Payment Cards: A Modern Guide to Retail Data Risks

Here’s a primer of what you may have missed when it comes to payment card breaches around the end of last year:

  • Chick-fil-A may have been the next on the breach list, as reported, in a nearly year-long breach that may have affected up to 9,000 cards in almost 2,000 locations across 41 states and British Columbia.
  • Staples officially confirms the suspected data breach spanning half a year and affecting 1.16 million cards at only 113 stores in 35 states. Point of sale (POS) malware was the culprit. Check out the locations (PDF).
  • Parking service companies were hit, including and Park-n-Fly, an airport parking reservation service, which subsequently had to suspend their online reservation system as they tried to remediate. Stolen payment cards from the services are reportedly for sale online.
  • Courts have ruled that consumers and banks are clear to bring class action suits against Target, one year after their 2013 data breach that affected 40 million payment cards and 70 million customer records, maintaining the possibility the retailer was liable for security negligence. This could set a precedence for other breached retailers to come that will be facing consumer and business lawsuits in the aftermath.

The breaches targeting the retail, service and other industries that process payment cards show no sign of stopping. It’s high time to learn about new risks and take a different approach to protecting our organizations from payment card theft.

And to help inform organizations about new threats to data, we’ve created a 115-page guide complete with infographics, technical solutions, and customer stories.

Check out a video below to learn more about the eBook:

Retail eGuide

Ideal for CISOs, security, compliance and risk management officers, as well as IT admins and professionals, our free eBook: A Modern Guide to Retail Data Risks provides guidance on:

  • New risks to the retail industry presented by cloud, mobile and Bring Your Own Device (BYOD)
  • Business and compliance drivers for strengthening authentication security
  • How outdated security solutions can no longer effectively protect retailers and consumers alike
  • How implementing a modern two-factor authentication solution can work to protect the new IT model

##Download the guide today.