
{"id":2111,"date":"2012-10-24T00:00:00","date_gmt":"2012-10-24T00:00:00","guid":{"rendered":"http:\/\/otava.test\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/"},"modified":"2012-10-24T00:00:00","modified_gmt":"2012-10-24T00:00:00","slug":"franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/","title":{"rendered":"Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach"},"content":{"rendered":"<p>Initially brought to the company\u2019s attention on Sept. 14, the large bookstore chain Barnes &amp; Noble suffered a data breach at the hands of hackers that stole credit cardholder data from 63 stores nationwide. Hackers accessed the customer keypads located in front of the cash registers that customers used to swipe their credit cards and enter PIN numbers. Affected states include California, Connecticut, Florida, Illinois, Massachusetts, New Jersey, New York, Pennsylvania and Rhode Island.<\/p>\n<p>What makes this breach different from others is the involvement of the Federal Bureau of Investigation (FBI). They had advised the chain to withhold news of the breach until recently to allow for investigation &#8211; extending their need-to-notify the public until late December. The U.S. government normally does not get involved in data breaches unless there\u2019s good reason.\u00a0This may be due to the increase in online attacks that appear to originate from overseas hackers.<\/p>\n<p>Customers that have shopped at Barnes &amp; Nobles in the affected states are advised to change their debit card PINs and review bank statements for unusual activity. The customer database, including the website, mobile apps and member database, is unaffected, meaning only individuals that purchased items in-store may be affected.\u00a0The New York Times has provided a\u00a0<a href=\"https:\/\/www.nytimes.com\/interactive\/2012\/10\/24\/business\/24barnes-and-noble-store-list.html\">list<\/a>\u00a0documenting\u00a0each store address that hacking is suspected.<\/p>\n<p>Although PCI DSS requires notification of consumers in the event of a breach, companies aren\u2019t technically required to do so unless their data is unencrypted. State laws do vary &#8211; the California Bill 1386 requires notification of affected consumers in the event of an actual or suspected compromise for any business with California residents in their database, according to the PCI DSS requirement testing procedure 12.9.1.a.<\/p>\n<p>This testing procedure, under PCI\u2019s requirement to Maintain an Information Security Policy, mandates the implementation of an incident response plan that includes \u2018business recovery and continuity procedures,\u2019 also known as a disaster recovery plan; and a data backup process. One way to ensure this requirement is covered is to partner with a <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI compliant hosting<\/a> provider with audited <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\">IT disaster recovery<\/a> (DR) and <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/cloud-backup\/\">offsite backup<\/a> solutions. If you\u2019re not sure what to look for in a DR provider, read <a href=\"https:\/\/www.onlinetech.com\/resources\/e-tips\/disaster-recovery\/what-to-look-for-in-a-michigan-disaster-recovery-provider\">What to Look for in a Michigan Disaster Recovery Provider<\/a> (applicable to the Midwest as well).<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Franchise_Point-of-Sales_POS_Systems_Targeted_by_Hackers\"><\/span>Franchise Point-of-Sales (POS) Systems Targeted by Hackers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Unfortunately, Barnes &amp; Noble did not say how hackers gained access to the credit card data. Attacks on point-of-sale systems are growing exponentially as encryption is no longer a deterrent for skilled hackers, according to Tom Kellermann, VP of Trend Micro, as quoted in the NYTimes.<\/p>\n<p>Last December, the sandwich franchise Subway was hacked when credit and debit cardholder data was stolen from the point-of-sale (POS) systems of more than 150 locations, affecting more than 80,000 individuals. How did they do it? Hackers ran a targeted port scan of blocks of IP addresses to detect systems that used a certain type of remote desktop access software that served as a backdoor to gain entry to their POS systems. Although PCI DSS requires the use of two-factor authentication for remote access, the Subway franchise did not have those in place across all of their locations.<\/p>\n<p>Small businesses are often targeted and known for their lack of security knowledge and implementation of security technology. Although Subway reportedly imparted that security knowledge and requirements to franchisees, many of the franchisees disregarded the requirements. They refused to use point-to-point encryption, and even went as far as to download low-cost remote desktop software available online, according to Arstechnica.com. As a result, the culture of skimping on security resulted in serious data theft &#8211; $3 million in fraudulent charges to be exact.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Two-Factor_Authentication_for_Remote_Access\"><\/span>Two-Factor Authentication for Remote Access<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The specific PCI requirement 8.3 states:<\/p>\n<blockquote><p>Incorporate two-factor authentication for remote access (network-level access originating from outside the network) to the network by employees, administrators, and third parties. (For example, remote authentication and dialin service (RADIUS) with tokens; terminal access controller access control system (TACACS) with tokens; or other technologies that facilitate two-factor authentication.)<\/p><\/blockquote>\n<figure style=\"width: 600px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" \" title=\"Two-Factor Authentication for VPN\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png\" alt=\"Two-Factor Authentication for VPN\" width=\"600\" height=\"455\" \/><figcaption class=\"wp-caption-text\">Two-Factor Authentication for VPN<\/figcaption><\/figure>\n<p>Two-factor authentication (also known as dual-factor or multi-factor) requires the use of one form of authorization (username\/password), and an additional form of authentication to gain access to a network remotely. Two-factor authentication provides an extra layer of protection to ensure the user is truly the one who is allowed access to the network, and to protect against unauthorized entry.<\/p>\n<p>Online Tech\u2019s two-factor method includes the use of a unique username\/password. Secondly, the addition of a simple, mobile phone-based authentication method allows users to complete a secondary authentication of their choice to achieve network access. Find out more about <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">two-factor authentication<\/a> and other <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">technical security<\/a> services that can help you not only achieve <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI DSS compliance<\/a>, but also prevent hacker entry and credit cardholder data theft by securing access points and protecting your systems.<\/p>\n<hr \/>\n<p><span style=\"line-height: 18px;\"><a href=\"https:\/\/web.otava.com\/pci-compliant-data-needs\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" style=\"margin-right: 10px;\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/pci-white-paper-sm.gif\" alt=\"PCI Compliant Data Centers\" width=\"200\" height=\"165\" \/><\/a>Looking for more information on PCI hosting requirements, recommendations, and the foundation of a secure <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/pci-compliant-data-centers\">PCI compliant data center<\/a>?<\/span><\/p>\n<p><span style=\"line-height: 18px;\"><a href=\"https:\/\/web.otava.com\/pci-compliant-data-needs\">Download our PCI Compliant Hosting white paper<\/a> now for a complete guide to PCI hosting with IT vendors.<\/span><\/p>\n<p><span style=\"line-height: 18px;\"><strong>Still have questions?\u00a0<\/strong><a href=\"https:\/\/otavawebsite.wpengine.com\/contact\/\">Contact us<\/a>\u00a0or\u00a0<a href=\"https:\/\/hostedusa6.whoson.com\/chat\/chatstart.htm?domain=www.onlinetech.com\">chat<\/a>\u00a0with us now. Find out more about our fully compliant, <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI\u00a0hosting solutions<\/a>, or\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/contact\/\">submit a quote request<\/a>\u00a0for your project today.<\/span><\/p>\n<div>\n<hr \/>\n<p>Related Links:<br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/michigan-hosting-providers-offer-cost-effective-it-security-for-smbs\/\">Michigan Hosting Providers Offer Cost-Effective IT Security for SMBs<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/michigan-cyber-initiative-reports-people-as-weakest-link-in-it-security\/\">Michigan Cyber Initiative Reports \u2018People\u2019 As Weakest Link in IT Security<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2011-smbs-disaster-recovery-in-the-cloud\/\">2011 SMBs &amp; Disaster Recovery in the Cloud<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/pci_dss_v2.pdf\">PCI DSS Requirements and Security Assessment Procedures, Version 2.0<\/a> (PDF)<br \/>\n<a href=\"https:\/\/www.nytimes.com\/2012\/10\/24\/business\/hackers-get-credit-data-at-barnes-noble.html?ref=technology\">Credit Card Data Breach at Barnes &amp; Noble Stores<\/a><br \/>\n<a href=\"https:\/\/www.reuters.com\/article\/2012\/10\/24\/us-barnesnoble-breach-idUSBRE89N05L20121024\">Barnes &amp; Noble Reports Breach of U.S. Customer Credit Card Data<\/a><br \/>\n<a href=\"https:\/\/arstechnica.com\/business\/2011\/12\/how-hackers-gave-subway-a-30-million-lesson-in-point-of-sale-security\/\">How Hackers Gave Subway a $3 Million Lesson in Point-of-Sale Security<\/a><strong id=\"internal-source-marker_0.5436970498412848\"><br \/>\n<\/strong><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Initially brought to the company\u2019s attention on Sept. 14, the large bookstore chain Barnes &amp; Noble suffered a data breach at the hands of hackers that stole credit cardholder data from 63 stores nationwide. Hackers accessed the customer keypads located in front of the cash registers that customers used to swipe their credit cards and enter PIN numbers. Affected states include California, Connecticut, Florida, Illinois, Massachusetts, New Jersey, New York, Pennsylvania and Rhode Island. What makes this breach different from others is the involvement of the Federal Bureau of Investigation (FBI). They had advised the chain to withhold news of the breach until recently to allow for investigation &#8211; extending their need-to-notify the public until late December. The U.S. government normally does not get involved in data breaches unless there\u2019s good reason.\u00a0This may be due to the increase in online attacks that appear to originate from overseas hackers. Customers that have shopped at Barnes &amp; Nobles in the affected states are advised to change their debit card PINs and review bank statements for unusual activity. The customer database, including the website, mobile apps and member database, is unaffected, meaning only individuals that purchased items in-store may be affected.\u00a0The New York&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2111","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach | OTAVA<\/title>\n<meta name=\"description\" content=\"Although PCI DSS requires notifying consumers in the event of a breach, companies aren\u2019t technically required to do so unless their data is unencrypted.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach\" \/>\n<meta property=\"og:description\" content=\"Although PCI DSS requires notifying consumers in the event of a breach, companies aren\u2019t technically required to do so unless their data is unencrypted.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-24T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach\",\"datePublished\":\"2012-10-24T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/\"},\"wordCount\":960,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/\",\"url\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/\",\"name\":\"Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png\",\"datePublished\":\"2012-10-24T00:00:00+00:00\",\"description\":\"Although PCI DSS requires notifying consumers in the event of a breach, companies aren\u2019t technically required to do so unless their data is unencrypted.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach | OTAVA","description":"Although PCI DSS requires notifying consumers in the event of a breach, companies aren\u2019t technically required to do so unless their data is unencrypted.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach","og_description":"Although PCI DSS requires notifying consumers in the event of a breach, companies aren\u2019t technically required to do so unless their data is unencrypted.","og_url":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/","og_site_name":"OTAVA","article_published_time":"2012-10-24T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach","datePublished":"2012-10-24T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/"},"wordCount":960,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/","url":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/","name":"Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png","datePublished":"2012-10-24T00:00:00+00:00","description":"Although PCI DSS requires notifying consumers in the event of a breach, companies aren\u2019t technically required to do so unless their data is unencrypted.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication-diagram.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2111"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2111\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2111"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}