Preview

Case Analysis: Global Payments Breach

Powerful Essays
Open Document
Open Document
985 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Analysis: Global Payments Breach
Table of Contents Executive Summary 3 Company Background 3 Security Breach 3 Cost of Security Breach 3 Closer Look at Control Issues 4 Steps to mitigate data breach 4 Conclusion 6 References 6

Executive Summary
A data breach at a credit card payments processing firm Global Payments potentially impacted 1.5 million credit and debit card numbers from major card brands Visa, MasterCard, Discover and American Express (money.cnn.com) in April 2012.
Company Background
Founded in 1967, Global Payments (NYSE:GPN) is one of the largest electronic transaction processing company based out of Atlanta, GA and operations in several European and APAC regions. The company provides business-to-business card payment and processing solutions for major card issuers such as Visa, Master Card, Amex and Discover. The company also performs terminal management and electronic check conversion.
Security Breach
Exactly a year ago, in March 2012 the company was hit by a massive security breach of its credit card payment processing servers impacting more than 1.5 million customers (nytimes.com). The company reported unauthorized access to its processing system resulting in data transfer of 1,500,000 card numbers. According to the company report, data stolen includes name, social security number and the business bank account designated for payment processing or deposit services. As a result of unauthorized access to the company’s servers millions of customer confidential records got exported.
Cost of Security Breach
While this data breach is not the largest of the cases, Global Payments data breach turned out to be a $93.9 million deal according to the company’s Jan 8th 2013 quarterly report (bankinfosecurity.com). This is mainly spent in enhancing security and ensure compliance with Payment Card Industry Data Security standard. The company hired a qualified security assessor (QSA) that conducted an independent review of the PCI-DSS compliance of Global Payments



References: 1. Jessica Silver-Greenburg, Nelson D Schwartz (March 30 2012). “Master Card and Visa Investigate Data Breach” New York Times. Retrieved 2013-03-17. 2. Information Security Group (January 10 2013). “Global Payments Breach Tab: $94 million”. www.bankofsecurity.com. Retrieved 2013-03-17. 3. Julianne Pepitone (April 3 2012). “1.5 million Card numbers at risk from hack”. www.money.cnn.com. Retrieved 2013-03-17 4. Dave Shackleford (November 2007). “Regulations and Standards: Where Encryption Applies”. www.sans.org/reading/analyst_program/encryption_Nov07.pdf

You May Also Find These Documents Helpful

  • Good Essays

    On December 19th Target revealed that 40 million credit and debit card accounts were compromised by a data breach. The information had appeared to be stole around black friday of 2013. This is the busiest shopping day of the year.The retailer said that the information stolen between November 27 and December 15, 2013 included personal information of as many as 70 million people more than the 40 million the company originally estimated. Target discovered the breach on December 13th and notified the justice department.The information stolen included names, mailing addresses, phone numbers and email addresses. The hackers tole 11 Gb worth of personal information. Target said that it will provide one year of free credit monitoring…

    • 442 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    In my opinion the PCI-DSS standards in place should lead to a secure network and ultimately protect the cardholder data. The Payment Card Industry (PCI) data security standard has important requirements like maintaining a firewall configuration, regularly updating anti-virus software, encrypting transmission of cardholder data across open, public networks to name a few. Unfortunately, the auditing practices at TJX were poor and did not identify the real problems with the TJX systems. The were three crucial issues with the TXJ systems. The first one was the absence of network monitoring; according to the PCI standards, a firewall or a “do not use vendor-supplied defaults for system passwords” was required. They also violated the second PCI standard of protecting the cardholder data by not keeping data logs, and the presence of unencrypted data stored on the system. The stolen information was from old transactions from 2002 which were supposed to be…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Clearly they were a well-respected, well-trusted company not too long before they were raided, and during a time that they were under investigation (not known to the public at the time) for fraudulent activity…

    • 1172 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    During Thanksgiving of 2013, Target had 40 million of its costumer’s credit card data stolen. Hackers remotely installed malware into Target’s security and payments system, which monitored the use of credit cards throughout all 1,797 of Target’s U.S. stores. This data was then stored on a Target server, which the hackers had taken over.…

    • 230 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Randy Vanderhoof Summary

    • 1496 Words
    • 6 Pages

    In 2012, citizens in the United States incurred 47.3% of global fraud. Imagine being one of the 47% who nearly lost everything (Vanderhoof, 213). One has the option to stand up to fraud or sit back and become a victim. Randy Vanderhoof explains the importance of technology in the fight against fraud at length in his article, “Can Technology Protect Americans from International Cybercriminals?” In his testimony, Vanderhoof expresses the importance of EMV (Europay, Mastercard, and Visa) chip technology in the fight against bankcard fraud (Vanderhoof, 212). Vanderhoof cites the high amount of security that EMV chips have beyond traditional magnetic stripe cards. In addition, Vanderhoof cites recent hacking events to illustrate the need for EMV…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Good Essays

    On April 27, 2011 more than 70 million customers of Sony’s PlayStation Network and Qriocity music service received a disturbing email saying that everything the company knew about them including where they live, when they were born, their logins and passwords, and possibly more information had been hacked into. From a statement made by Sony, “If you have provided your credit card data through PlayStation Network or Qriocity out of an abundance of caution we are advising you that your credit card number (excluding security code) and expiration date may have been obtained.” (http://www.nytimes.com/2011/04/28/arts/video-games/sony-playstation-security-flaw-tests-consumer-trust.html). Imagine the shock and awe of users when they received this notification. This security breach is one of many that Americans fear on a daily basis.…

    • 1165 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Target Financial Health

    • 1437 Words
    • 5 Pages

    References: Cable News Network . (2014). Target: 40 million Credit Cards Compromised . Retrieved from http://money.cnn.com/2013/12/18/news/companies/target-credit-card/…

    • 1437 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Wells Fargo Crisis

    • 628 Words
    • 3 Pages

    2006). In the past several years, Wells Fargo lowered employees’ regular pay and raised their sales target to ‘motivate’ employees to improve sales performance in different regions’ branches. In a long period, Wells Fargo using a ‘special incentive policy’ urging staff to reach the ‘unrealistic’ quotas, at the same time, turning a blind eye to the illegal means used by employees to complete the requirement (Appendix 1). Obviously, the customers were the victims firstly can be defined in this event. Wells Fargo’s employees have issued and activated debit cards without customers’ permission and forged email addresses to open unwitting online banking operations for customers. Many clients have to pay credit card annual fees, interest and other costs for credit cards are not authorized to open , but in their own name (Appendix 2). In the US banking industry, cheating and squeezing consumers are common. In June 2016, bank staff admitted in Congress that they sold unnecessary products to…

    • 628 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Anthem Syndrome

    • 340 Words
    • 2 Pages

    In 2015, Anthem has announced their biggest data breach yet, 80 million people were at risk in having their personal data exposed which may cause identity fraud. This was not the case in just losing a credit card it was much more personal because of the information it contained. Everyone’s social security numbers, previous health records, previous employees and previous address that is the biggest issue in this case. This was called “sophisticated attack” because someone has impersonated as administrator worker. This allows the thieves to go back in later and enter much sensitive information that is not for the public eye.…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    Credit Card Fraud poses one of the greatest risks to businesses nowadays. As card business transactions increase, so too do frauds. According to the Jamaica Observer dated March 2010 “The National Commercial Bank (NCB) yesterday revealed that it lost more than J$100 million to credit card fraud last year, put merchants on guard against what it said was a rising problem”.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    annotated biography

    • 551 Words
    • 2 Pages

    University of Phoenix Library Jenni Bergal, B. W. (2001, Aug 07). IDENTIY CRISIS > TODAY 'S SAVVY CRIMINALS STEAL DATA TO OPEN AND MAX OUT CREDIT CARDS. South Florida Sun - Sentinel Retrieved from http://search.proquest.com/docview/388009277?accountid=458…

    • 551 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    When an organization uses and relies on computer systems and information technology to assist in running their company(s) and also uses these resources to store important, personal information about clients, customers, employees, and the organization itself, it is important to have the adequate security protection in place to prevent this information from being compromised. The following summary will discuss how IBM prevents security breaches by using technology to reduce the rampant crime committed against them.…

    • 555 Words
    • 3 Pages
    Good Essays