
{"id":2125,"date":"2012-11-07T00:00:00","date_gmt":"2012-11-07T00:00:00","guid":{"rendered":"http:\/\/otava.test\/addressing-the-top-it-security-issues-of-2012\/"},"modified":"2012-11-07T00:00:00","modified_gmt":"2012-11-07T00:00:00","slug":"addressing-the-top-it-security-issues-of-2012","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/","title":{"rendered":"Addressing the Top IT Security Issues of 2012"},"content":{"rendered":"<figure id=\"attachment_8674\" aria-describedby=\"caption-attachment-8674\" style=\"width: 200px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-8674\" title=\"Trustwave 2012 Global Security Report\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif\" alt=\"Trustwave 2012 Global Security Report\" width=\"200\" height=\"259\" \/><figcaption id=\"caption-attachment-8674\" class=\"wp-caption-text\">Trustwave 2012 Global Security Report<\/figcaption><\/figure>\n<p>Trustwave\u2019s 2012 Global Security Report produced several key findings on data breaches and security issues across many industries. Here are a few of the findings, with resources to help remedy them:<\/p>\n<p><em><strong>Customer records made up 89 percent of all breached data investigated.<\/strong><\/em><br \/>\nCompanies that accept, store, process and\/or transmit credit cardholder data must meet <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI DSS compliance<\/a>. This includes companies that offer Software-as-a-Service (Saas) for e-commerce and billing payment solutions. Although the PCI standard has been around for years, not all companies are educated in how to build a secure environment and protect cardholder data under the 12 requirements, leading to a large amount of breached customer record data.<\/p>\n<p>Find out more about PCI DSS compliance to cut down on your risk of contributing to overall breached data:<\/p>\n<ul>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/what-is-pci-compliance\/\">What is PCI Compliance?<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/who-needs-to-be-hipaa-compliant\/\">Who Needs to Be PCI Compliant?<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/levels-of-pci-compliance\/\">Levels of PCI Compliance<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/pci-glossary-of-terms\/\">PCI Glossary of Terms<\/a><\/li>\n<\/ul>\n<p><em><strong>More than a third of all 2011 breaches were found in the franchise industry.<\/strong><\/em><br \/>\nFor every franchise, there is a weak link. Even though corporate franchise chains require franchisees to maintain standard levels of point-of-sale (POS) system security, not all franchisees comply. Hackers know this, and target the smaller stores that are linked to the corporate network.<\/p>\n<p>The Subway franchise suffered a breach resulting in $3 million fraudulent charges from more than 150 of its locations. Hackers were able to access their POS systems by running a targeted port scan of blocks of IP address to detect systems that used a certain type of remote desktop access software &#8211; while PCI DSS requires the use of two-factor authentication for remote access, a few Subway locations did not have this in place. Many locations also did not use point-to-point encryption and downloaded remote desktop software online, disregarding corporate\u2019s security guidelines.<\/p>\n<p>Barnes and Noble was also hit by a data breach that targeted their cash register customer keypads across 10 states in several different in-store locations. Read more about the cases in <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/franchise-point-of-sale-pos-systems-targeted-in-nationwide-pci-data-breach\/\">Franchise Point-of-Sale (POS) Systems Targeted in Nationwide PCI Data Breach<\/a>.<\/p>\n<figure id=\"attachment_8679\" aria-describedby=\"caption-attachment-8679\" style=\"width: 250px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8679 \" title=\"Technical Security\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/technical-security.png\" alt=\"Technical Security\" width=\"250\" height=\"379\" \/><figcaption id=\"caption-attachment-8679\" class=\"wp-caption-text\">Technical Security<\/figcaption><\/figure>\n<p>Find out which Technical Security services you can implement to create many different layers of security around your data and applications, and meet PCI DSS compliance:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/daily-log-review\">Daily Log Review<\/a><\/li>\n<li><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">File Integrity Monitoring (FIM)<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Web Application Firewall (WAF)<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Two-Factor Authentication<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Vulnerability Scanning<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Patch Management<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Antivirus<\/a><\/li>\n<li><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">SSL Certificate<\/a><\/li>\n<\/ul>\n<p><strong><em>Third-parties were responsible for introducing security deficiencies in 76 percent of all breaches.<\/em><\/strong><br \/>\nIn accordance with the litany of breaches seen in the healthcare industry, third-party service providers have been the root cause of many a data breach, due to either mishandling of sensitive data, stolen or lost portable media, and issues that can be traced back to poor or lack of security-trained staff.<\/p>\n<p>How can you protect your organization and still make the best use of third-party services? Ask your <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI hosting<\/a> or <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting<\/a> provider about:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" alignleft\" title=\"Data Center Audits and Reports\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/audits-reports.png\" alt=\"Data Center Audits and Reports\" width=\"104\" height=\"104\" \/><\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Audits and Reports<\/a><\/strong><br \/>\nWhat kind of audits has your data center and hosting provider invested in, and when was the last date of their audit report? What kind of measurements and standards do these audits follow? Are they willing to disclose a copy of their reports on compliance? From <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/soc-1-2-3-compliant-cloud\/\">SOC 2<\/a> to <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a>, do your due diligence to ensure they\u2019re familiar with your industry\u2019s requirements. Read our <a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/data-center-standards-cheat-sheet-from-hipaa-to-soc-2\/\">Data Center Standards Cheat Sheet<\/a> for a quick and dirty summary of each audit.<\/p>\n<p><strong><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/administrative-security\/policies\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Data Center Policies\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/policies.png\" alt=\"Data Center Policies\" width=\"104\" height=\"104\" \/>Policies<\/a><\/strong><br \/>\nGain insight into your third-party provider\u2019s culture of security by viewing their documented policies and procedures that may cover anything from password standards to data handling after service termination. How a provider handles breach notification and their disaster recovery plan can also affect your company in a worst case scenario. Get familiar with the scope of their policies.<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Staff Training\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/staff-training.png\" alt=\"Staff Training\" width=\"104\" height=\"104\" \/>Staff Training<\/a><\/strong><br \/>\nRegular employee training is key to keeping a secure environment. As reported in the blog, <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/michigan-cyber-initiative-reports-people-as-weakest-link-in-it-security\/\">Michigan Cyber Initiative Reports \u2018People\u2019 As Weakest Link in IT Security<\/a>, untrained or careless staff can also be traced back as the root cause of a data breach. Check the last dates of your service provider\u2019s employee training, and inquire about hiring policies to ensure your data is in safe hands.<\/p>\n<p><em><strong>Data in-transit were targeted in 62.5 percent of all breaches.<\/strong><\/em><br \/>\nEncryption of data at rest (in storage and on servers) and in transit is important to satisfy PCI and HIPAA requirements, and is vital to secure information exchange. Follow the NIST (National Institute of Standards and Technology) Special Publication 800-111, <a href=\"https:\/\/csrc.nist.gov\/\">Guide to Storage Encryption Technologies for End User Devices<\/a> standards for encryption. Read more about data protection in our <a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">HIPAA Compliant Hosting white paper<\/a>, and our <a href=\"https:\/\/web.otava.com\/pci-compliant-data-needs\">PCI Compliant Hosting white paper<\/a>.<\/p>\n<p><em><strong>Antivirus software detected less than 12 percent of targeted malware found in the study.<\/strong><\/em><br \/>\nAntivirus software alone isn\u2019t a proper defense against malware and other attacks on your systems. Read more about other <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">technical security<\/a> defenses you can use in conjunction with antivirus software.<\/p>\n<p><em><strong>SQL injection is the top method for web-based attacks for the fourth year in a row.<\/strong><\/em><br \/>\nProtect your web servers and databases from malicious online attacks by investing in a web application firewall (WAF). A network firewall\u2019s open port allows Internet traffic to access your websites, but it can also open up servers to potential application attacks (database commands to delete or extract data are sent through a web application to the backend database) and other malicious attacks.<\/p>\n<figure style=\"width: 581px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" \" title=\"Web Application Firewall\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/waf-diagram.png\" alt=\"Web Application Firewall\" width=\"581\" height=\"315\" \/><figcaption class=\"wp-caption-text\">Web Application Firewall<\/figcaption><\/figure>\n<p>A WAF can protect your servers more than a traditional IPS\/IDS (Intrustion Protection\/Detection System) can by detecting and preventing SQL injections. Find out more about <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Web Application Firewalls<\/a>.<\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.trustwave.com\/global-security-report?utm_expid=5000628-0&amp;utm_referrer=https%3A%2F%2Fwww.google.com%2Furl%3Fsa%3Dt%26rct%3Dj%26q%3D%26esrc%3Ds%26source%3Dweb%26cd%3D1%26ved%3D0CC8QFjAA%26url%3Dhttps%253A%252F%252Fwww.trustwave.com%252Fglobal-security-report%26ei%3DcnWaUPKyGM_QqAGE3oGgBw%26usg%3DAFQjCNH8SVNhVVn7Pn19P2qXKMuxuhIPSw\">Trustwave 2012 Global Security Report<\/a><br \/>\n<strong id=\"internal-source-marker_0.3766247422900051\"><br \/>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trustwave\u2019s 2012 Global Security Report produced several key findings on data breaches and security issues across many industries. Here are a few of the findings, with resources to help remedy them: Customer records made up 89 percent of all breached data investigated. Companies that accept, store, process and\/or transmit credit cardholder data must meet PCI DSS compliance. This includes companies that offer Software-as-a-Service (Saas) for e-commerce and billing payment solutions. Although the PCI standard has been around for years, not all companies are educated in how to build a secure environment and protect cardholder data under the 12 requirements, leading to a large amount of breached customer record data. Find out more about PCI DSS compliance to cut down on your risk of contributing to overall breached data: What is PCI Compliance? Who Needs to Be PCI Compliant? Levels of PCI Compliance PCI Glossary of Terms More than a third of all 2011 breaches were found in the franchise industry. For every franchise, there is a weak link. Even though corporate franchise chains require franchisees to maintain standard levels of point-of-sale (POS) system security, not all franchisees comply. Hackers know this, and target the smaller stores that are linked to&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2125","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Addressing the Top IT Security Issues of 2012 | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Addressing the Top IT Security Issues of 2012\" \/>\n<meta property=\"og:description\" content=\"Trustwave\u2019s 2012 Global Security Report produced several key findings on data breaches and security issues across many industries. Here are a few of the findings, with resources to help remedy them: Customer records made up 89 percent of all breached data investigated. Companies that accept, store, process and\/or transmit credit cardholder data must meet PCI DSS compliance. This includes companies that offer Software-as-a-Service (Saas) for e-commerce and billing payment solutions. Although the PCI standard has been around for years, not all companies are educated in how to build a secure environment and protect cardholder data under the 12 requirements, leading to a large amount of breached customer record data. Find out more about PCI DSS compliance to cut down on your risk of contributing to overall breached data: What is PCI Compliance? Who Needs to Be PCI Compliant? Levels of PCI Compliance PCI Glossary of Terms More than a third of all 2011 breaches were found in the franchise industry. For every franchise, there is a weak link. Even though corporate franchise chains require franchisees to maintain standard levels of point-of-sale (POS) system security, not all franchisees comply. Hackers know this, and target the smaller stores that are linked to...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-11-07T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Addressing the Top IT Security Issues of 2012\",\"datePublished\":\"2012-11-07T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/\"},\"wordCount\":950,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/\",\"url\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/\",\"name\":\"Addressing the Top IT Security Issues of 2012 | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif\",\"datePublished\":\"2012-11-07T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Addressing the Top IT Security Issues of 2012\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Addressing the Top IT Security Issues of 2012 | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/","og_locale":"en_US","og_type":"article","og_title":"Addressing the Top IT Security Issues of 2012","og_description":"Trustwave\u2019s 2012 Global Security Report produced several key findings on data breaches and security issues across many industries. Here are a few of the findings, with resources to help remedy them: Customer records made up 89 percent of all breached data investigated. Companies that accept, store, process and\/or transmit credit cardholder data must meet PCI DSS compliance. This includes companies that offer Software-as-a-Service (Saas) for e-commerce and billing payment solutions. Although the PCI standard has been around for years, not all companies are educated in how to build a secure environment and protect cardholder data under the 12 requirements, leading to a large amount of breached customer record data. Find out more about PCI DSS compliance to cut down on your risk of contributing to overall breached data: What is PCI Compliance? Who Needs to Be PCI Compliant? Levels of PCI Compliance PCI Glossary of Terms More than a third of all 2011 breaches were found in the franchise industry. For every franchise, there is a weak link. Even though corporate franchise chains require franchisees to maintain standard levels of point-of-sale (POS) system security, not all franchisees comply. Hackers know this, and target the smaller stores that are linked to...","og_url":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/","og_site_name":"OTAVA","article_published_time":"2012-11-07T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Addressing the Top IT Security Issues of 2012","datePublished":"2012-11-07T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/"},"wordCount":950,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/","url":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/","name":"Addressing the Top IT Security Issues of 2012 | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif","datePublished":"2012-11-07T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Trustwave-2012-Global-Security-Report.gif"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/addressing-the-top-it-security-issues-of-2012\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Addressing the Top IT Security Issues of 2012"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2125"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2125\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2125"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}