Summary is AI-generated, newsdesk-reviewed
  • Secure payment card tech at POS and strong authentication enhance retail data security.
  • EMV cards using dynamic security codes effectively counter threats like magstripe card fraud.
  • Tap-in authentication offers secure, seamless access to retail systems via NFC-enabled devices.
Europay Mastercard Visa (EMV) cards replace the magstripe’s static CVV code with a dynamic security code that cannot be used to create a counterfeit card
Secure payment card technology at the point of sale and a strong authentication are effective defences against data security threats

Data security is one of the top concerns to a retailer’s reputation and its customers’ privacy. The fall-out can be catastrophic, and organizations must understand the threat and take all necessary steps to protect their assets and customers. The challenge has become more complex with the explosive growth in mobile device usage throughout the retail enterprise and on the store floor, including notebooks, tablets and smartphones that increase vulnerability to ever-evolving threats. 

An effective defense against these threats requires numerous elements, including more secure payment card technology at the point of sale (POS), strong authentication that balances security with a convenient user experience, and a layered security strategy in the enterprise IT infrastructure that ensures appropriate risk mitigation levels when and where required. 

Securing Retail Payment Operations – Magstripe vs. EMV Cards 

In its 2015 Global State of Information Security Survey (GSISS), consulting firm PwC reported that “... assaults on major retailers reached epic levels in the past year, resulting in the theft of hundreds of millions of customer payment card records, a rash of litigation, and a rush to adopt a new payment card standard in the U.S.” 

There are numerous threats to large retail payment operations. One of the most glaring is the use of magstripe payment cards at the point of sale. Magstripes contain a static card-verification value (CVV) that is easily intercepted by malware-infected POS systems and cloned with cheap readers. In contrast, Europay Mastercard Visa (EMV) cards store all payment information in a secure chip, use issuer-specific personalization keys, and authenticate using cryptographic standards. They also replace the magstripe’s static CVV code with a dynamic security code that cannot be used to create a counterfeit card. With widespread adoption around the world, EMV cards are now making their way to the U.S.

Many users bring jailbroken phones into the workplace, leaving IT staff with the struggle to ensure security with best practices are in place
Seven in 10 respondents to a survey by HID Global said increased mobile use by employees and customers significantly or moderately raised their risk profile

Multi-Factor Authentication Systems For Data Security

Moving deeper into enterprise operations, another big security risk arises from the reliance on simple passwords. When hackers steal an employee’s user name and password, they can then often move through the network undetected and upload malware programs to a retailer’s POS system, where it has been relatively easy to steal/capture card data and create cloned payment cards. Organizations should protect systems and data through strong authentication that relies on more than just something the user knows (passwords.) There should be at least one other authentication factor, such as something the user has (i.e., a computer logon token) and/or is (i.e., a biometric or behavior-metric solution).

Layered IT Security Strategy For Real-Time Threat Detection

Retailers also expose themselves to risk when they don’t employ a layered IT security strategy. Best practices start with authenticating the user, then authenticating the device, protecting the browser and application, and finally authenticating the transaction with pattern-based intelligence for sensitive transactions. Implementing these layers requires an integrated, versatile authentication platform with real-time threat detection capabilities. This platform, combined with an anti-virus solution, provides the highest possible security against today’s threats.

To make this strategy work, however, user authentication must not only move beyond passwords, it also must be as convenient as possible while simultaneously addressing the threats posed by mobile devices. Now, with the advent of a mobiletap-in” strong authentication model, retailers can solve the mobilesecurity challenge while providing a faster and more seamless and convenient authentication solution than possible with dedicated hardware, one-time passwords (OTPs), display cards and other physical devices. 

Retailers need a solution that combines secure payment card technology, a layered enterprise security strategy, and secure user authentication solutions
If tap-in authentication is used responsibly with secured mobile devices, they can access everything from inventory control to payment systems, with a simple tap of their ID card

Maximizing Retail Security With Policies & Best Practices For Mobile Device Usage

Mobile devices have become one of the most dangerous security assault vectors. HID Global recently released a study it commissioned on the increased security risks of escalating mobility usage. In this survey of 140 registered members of the TechTarget Web communities for IT professionals, 87 percent said they have Bring Your Own Device (BYOD) policies but only 54 percent said this policy is formalized, with the rest using an ad hoc mix of user-driven practices and a loose collaboration between users and the IT team. Seven in 10 respondents in HID Global’s survey said increased mobile use by employees and customers significantly or moderately raised their risk profile. It was noted that many users brought jailbroken phones into the workplace, leaving IT staff with the struggle to ensure security with best practices are in place - or perhaps any security at all.

These issues are echoed in a PwC GSISS survey, which discovered that 29 percent of retailers experienced security threats as a result of mobile devices – but only 51 percent have a dedicated mobile security strategy in place. The report said this challenge is further compounded by the jump in BYOD policies which – if unmonitored – pose further threats to corporate networks.

It is critical, then, that mobile devices be used in a secure manner, which can only happen if security does not preclude a convenient user experience. Mobile users seek to maximize their productivity wherever they are, and this is especially true on a busy retail floor. Any security procedure that hampers this productivity makes mobility less useful or, worse, might be bypassed, leading to dangerous security exposure.

Effective Retail Security Solution - Tap-In Authentication

This all changes with the tap-in authentication model. With tap-in authentication, retailers improve service and enhance security by enabling sales staff and other employees to access the information they need by tapping a smart card to their laptop, tablet, smartphone or other Near Field Communications (NFC)-based mobile device. With this approach, users can access everything from inventory control to payment systems, directly from the store floor, all with a simple tapof their ID card.

A PwC GSISS survey discovered that 29% of retailers experienced security threats as a result of mobile devices – but only 51% have a dedicated mobile security strategy in place

Tap-in authentication makes it easier for retail and other organizations to secure corporate cloud applications, data and servers without having to issue passwords or tokens every time someone needs to access the network. At the same time, the user experience is also improved – employees can get the information they need from the mobile device of their choice, using the same smart card that opens doors.

Using tap authentication is a simple, three-step process. First, open a browser on the device, and type the URL to the desired application. Next, enter a corporate username and password. Finally, tap the access control card to the back of the mobile device or tablet to provide the second authentication factor. After the card has been tapped to one of these devices to authenticate to a network, the OTP is no longer usable. There are no additional tokens to deploy and manage, and users have only one item to carry – their smart card – and no longer need to remember or type a complex password.

Retailers will continue to face increasing security challenges. The solution is a combination of more secure payment card technology, a layered enterprise security strategy, and secure user authentication solutions that embrace the convenience of mobility while eliminating its threats. With the latest tap-in authentication solutions, the same card or badge that opens doors for authorized users can be tapped to the mobile device of their choice for secure access to cloud applications, data and web services, without having to remember or type in passwords or codes.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

HID news

ISC West 2019 Day Two: Explaining The New And The Tried-And-True

There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill...

HID Achieves TX-RAMP For PKIaaS Security Solution

HID, a pioneer in trusted identity solutions, has achieved Texas Risk and Authorization Management Program (TX-RAMP) certification for its Public Key Infrastructure as a Service (PKIaaS) solution. This certification demonstrates HID’s commitment to cybersecurity excellence and enables Texas state and local government to confidently engage with approved, trusted providers to procure secure, cloud-based certificate lifecycle management services with faster timelines and reduced administrati...

HID Appoints Jos Beernink As VP For PACS In Europe

HID, a worldwide pioneer in trusted identity solutions, announced the appointment of Jos Beernink as Vice President Europe for its Physical Access Control (PACS) business. In this role, Beernink will lead HID’s strategy, sales and operations across the whole European region, helping organizations leverage trusted identity and access control technologies to create a secure, smarter and more efficient workplace and physical spaces. Prior roles of Beernink  Beernink brings more than 2...

HID case studies

HID Helps In Automating The Access Control Management At Żabka

Enhancing enterprise security is high on the list of priorities for businesses across sectors. Within the retail industry, there is an additional focus on enabling new ways of working through management tools. Integrated solutions and applications help to create a robust security landscape and ensure a future-ready posture as organizations look to address emerging risks and create better experiences for next-gen employees. Physical access control (i.e., the readers on the door and the credentia...

BNY Innovates With Mobile Access Solutions

How do you rethink and transform building access for a 241-year-old company? BNY started by asking employees. The response was encouraging. The BNY team found that employees embraced the concept of mobile access solutions. The thought of implementing access solutions was already being considered by the company and the team was excited about the idea of providing a modern experience that allows employees worldwide to conveniently access their building spaces with a simple iPhone or Apple Watch....

HID Boosts Stockholm Transit With Digital Ticketing

HID, the pioneer in trusted identity and authentication solutions, announced that it successfully supported Stockholm's public transit authority, Storstockholms Lokaltrafik (SL), in transforming the daily travel experience for hundreds of thousands of passengers in the capital through a comprehensive digital ticketing modernization program. The initiative has eliminated paper tickets and enabled seamless contactless payments across buses, ferries, trams and metro stations. The technology u...