8 Months To Detect PF Chang Data Breach And 30 Locations Affected – Charles Leaver

By | December 3, 2015

Written By Charles Leaver Ziften CEO

The PF Chang dining establishment chain just recently published new details about the security breach of its credit card systems across the country. The dining establishment chain announced that the breach impacted more than 30 locations in 17 states and went on for eight months prior to being discovered.

While the investigation is still ongoing, in a declaration PF Chang’s reported that the breach has been contained and client monetary data has been processed safely by the restaurant since June 11. The compromised systems utilized by the chain were decommissioned till it was clear that their security could be ensured, and in the meantime charge cards were processed by hand.

Rick Federico, CEO said in a statement “The potentially taken credit and debit card data includes the card number and sometimes also the cardholder’s name and/or the card’s date of expiry.” “However, we have actually not figured out that any particular cardholder’s credit or debit card data was stolen by the hacker.”

PF Chang’s was alerted of the breach, which they described as a “extremely sophisticated criminal operation,” in June when they were contacted by the Secret Service about cyber security concerns. As soon as they were informed, the restaurant employed third-party forensic detectives to find how the breach was able to occur, at which time they found that harmful actors had the ability to exploit the chain’s charge card processing systems and potentially gain access to consumer credit card information.

Organizations worried about similar data breaches impacting point-of-sale terminals must execute endpoint threat detection to keep crucial systems protected. Endpoint security involves monitoring sensitive access points – like POS systems, bar code readers and employee mobile phones – and reducing risks that appear. Constant endpoint visibility is essential to determine risks before they compromise networks and ensure business security.

 

Leave a Reply

Your email address will not be published. Required fields are marked *