30 Restaurants Affected Over 8 Months With PF Chang Data Breach – Chuck Leaver

Written By Chuck Leaver Ziften CEO

 

The PF Chang dining establishment chain recently published new information about the security breach of its charge card systems throughout the nation. The restaurant chain revealed that the breach affected more than 30 restaurants in 17 states and went on for 8 months before being spotted.

While the examination is still ongoing, in a statement PF Chang’s reported that the breach has actually been contained and customer monetary data has actually been processed securely by the dining establishment since June 11. The jeopardized systems used by the chain were removed till it was clear that their security could be ensured, and in the meantime charge cards were processed by hand.

Rick Federico, CEO stated in a declaration “The possibly taken credit and debit card data consists of the card number and in some cases likewise the cardholder’s name and/or the card’s date of expiry.” “Nevertheless, we have not determined that any specific cardholder’s credit or debit card data was taken by the hacker.”

PF Chang’s was notified of the breach, which they referred to as a “extremely advanced criminal operation,” in June when they were called by the Secret Service about cyber security issues. Once notified, the dining establishment employed third-party forensic investigators to discover how the breach had the ability to happen, at which time they found that destructive actors were able to exploit the chain’s charge card processing systems and potentially gain access to consumer charge card information.

Organizations worried about similar data breaches impacting point-of-sale terminals should execute endpoint threat detection to keep very important systems safeguarded. Endpoint security includes monitoring delicate access points – like POS systems, bar code readers and worker mobile devices – and mitigating threats that appear. Continuous endpoint visibility is required to recognize dangers before they compromise networks and make sure business security.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title="" rel=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>