home_banner `

Content Icon

Phishing/Social Engineering Most Common Causes of POS-System Compromises

August 14, 2018 | Content Aggregator - Single Slide | Security Awareness, Phishing, Social Engineering

Phishing and other social engineering facilitate nearly half (47 percent) of the POS-system compromises investigated by Trustwave. These can happen when administrators don’t properly segregate the cardholder data environment from the rest of the network. Remote access was the second leading cause of POS compromise (23 percent), followed by malicious insiders at 13 percent.
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Poll: Ways to Vet Suspicious Email Flagged by Users

How can a security team avoid becoming overloaded once end users are empowered to flag and report suspicious email? In this Viewpoints report, IANS Faculty Marcus Ranum, Kevin Beaver and Ondrej Krehel recommend several technology- and process-based solutions.

C-Level Executives Need the Most Security Training

More than half of CISOs believe C-level executives are most in need of security awareness training to protect themselves from phishing and other social engineering attacks. HR is seen as needing the least amount of security awareness training.

Overview of Russian Cyber Attack Tactics Targeting U.S. Utilities

In cyberattacks against U.S. power utilities, Russian hackers stole employee credentials to gain access to corporate systems using spear-phishing, targeted oft-visited trade publication websites and used VPNs to stay hidden and maintain network access.