New York: The reliance of restaurant chains and retail stores on outside companies to handle credit-card processing and other information-technology functions is partly to blame for a rash of consumer data breaches over the last few years, according to data sleuths at Verizon Communications Inc.
Even a chain with thousands of restaurants might have only 100 employees in information technology, so it uses outside vendors for many IT functions, said Bryan Sartin, director of the investigative response team at Verizon Business.
Verizon’s unit investigates a quarter to a third of the big, publicly announced data breaches that occur each year, and hundreds of smaller cases.
In recent years, restaurant and retail businesses have accounted for more than half of Verizon’s 230 to 250 cases per year, according to a report Verizon was set to issue Thursday. It often finds that insiders at service vendors are part of the heists.
Organized data-stealing gangs “go to call centres, Web development companies, content development companies, business partners, people who pick up the backup tapes,” Sartin said. “They say ... if you hate your boss and you’re in financial straits, we’re your solution. Give us access to your customers. Better yet, give us your data.”
In a typical case Sartin was involved in, the team was approached by a large oil company in Canada, with thousands of gas stations. Customers were finding spurious charges on their credit cards after using them at the stations.
The team soon figured out that someone at a technology vendor was responsible, but couldn’t pin it down. So the investigators set a trap in the system, to see who accessed customer data.
Many breaches don’t happen through outsourcing. In one of the largest cases in recent years, the gang that stole 41 million credit and debit card numbers from chains including TJX Cos. obtained access through unsecured wireless networks, not through subcontractors’ systems.
Still, Verizon’s report advises companies to keep a tighter rein on contractors, including by limiting partners’ access to only the data they need.