Payment Card Breach at Applebee’s

Researchers have found malware on Applebee’s point of sale systems. This malware infected more than 160 restaurants in Alabama, Arizona, Florida, Illinois, Indiana, Kansas, Kentucky, Missouri, Mississippi, Nebraska, Ohio, Pennsylvania, Texas, and Wyoming. During the malware analysis, it was found out that the malware was designed to secure names, credit or debit card numbers, expiration dates, and card verification codes.
This kind of cybersecurity problem can be easily avoided by protecting all of the systems with a good cybersecurity solution. Nowadays every company should install on every device that they own an antivirus for Windows or antivirus for Mac, depending on which OS their systems are using.

“Cybercriminals are being more and more successful at finding weaknesses in Point-of-Sale (PoS) systems nowadays. During this cybersecurity problem, 160 restaurants were hit by cybercriminals trying to steal credit card information. Restaurants and other hospitality industries must continuously monitor PoS devices and distribute patches regularly. Also, good security advice is installing a cybersecurity solution on each of them. On the other side, to counterattack online fraudulent transactions after the credit card information has been stolen, companies that have services in the card-not-present (CNP) channel need to identify customers using multi-layered technologies that include passive biometrics. This technology monitors the user’s natural behavior, making it impossible for cybercriminals to replicate or steal.”

Because you can never be too cyber-secured, it is imperative for you as an individual or as a company to prepare yourself for this kind of attacks. For both individuals and companies, we recommend the install of a Mac antivirus or a Windows antivirus in every device, depending on which OS are they running. Also if you are a company consider contracting professional cybersecurity companies once or twice a year for regular network checks. These checks are done by various tests like a penetration test or an ethical hacking test; once they are done, they can reveal if the network can or cannot be breach easily by the cybercriminals.