0% found this document useful (0 votes)
132 views12 pages

A Toolkit For Restaurant Operators - Cybersecurity101

cyber 101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views12 pages

A Toolkit For Restaurant Operators - Cybersecurity101

cyber 101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Cybersecurity 101

A TOOLKIT FOR RESTAURANT OPERATORS

Cybersecurity Toolkit v2.indd 1 2/19/16 11:14 AM


February 2016 TABLE OF CONTENTS
Industry Colleagues:

Introduction...................................... 1
Data breaches continue
to dominate the news.
Why Cybersecurity Matters....... 2
Businesses are increasingly
vulnerable.
Five Essential Steps to

T odays hackers arent just looking for payment card data;


they also want information on a businesss operations,
customers and employees.
Protect Your Business..................4

Identify........................................ 5
For restaurant and foodservice businesses, cybersecurity isnt about playing defense. Its about
having a strong offense. The National Restaurant Association developed this guide to help you
Protect........................................ 5
take proactive steps to better secure your data.

This guide is intended to give you a better understanding of the five core areas of an enter-
Detect..........................................8
prise-wide cybersecurity program. Our goal is to arm you with the information you need to
identify your risks, protect your business and guests, understand laws that might apply to you
and recover if a breach ever happens. Respond.....................................8
There is no magic bullet. Security is an ongoing and evolving battle. This guide provides a
framework that will help you take a smart approach to cybersecurity. Youll need to reassess Recover.......................................9
your risks and dig deeper as you incorporate these practices into your restaurant operation.

As Congress considers increased regulation in this area, the National Restaurant Association is
engaged on your behalf in the nations capital. Were working to make sure lawmakers under- What Comes Next?...................... 10
stand the steps our industry is taking and the challenges we face.

Thank you for your efforts to protect your operation and, by extension, our entire industry. We
encourage you to visit Restaurant.org/Cybersecurity to stay updated on the latest resources and
information.

Sincerely,
SHARED VISION of the National Restau-
rant Association, National Restaurant
Association Educational Foundation and
State Restaurant Associations: We lead
Phil Kafarakis Americas restaurant and foodservice
Chief Innovation & Member Advancement Officer industry by elevating its prosperity,
National Restaurant Association prominence and participation, enhancing
the quality of life for all we serve.

NRA MISSION: We serve our members by


advancing and protecting Americas
restaurant and foodservice industry.

NRAEF MISSION: As the philanthropic


foundation of the National Restaurant
Association, we enhance the industrys
service to the public through education,
promotion of career opportunities, and
community engagement.
NationalRestaurantAssociation @WeRRestaurants RestaurantDotOrg

2016 National Restaurant Association. All rights reserved. The National Restaurant Association logo is a
registered trademark of the National Restaurant Association.

Cybersecurity Toolkit v2.indd 2 2/19/16 11:14 AM


Cybersecurity may be one of the biggest
emerging threats to your restaurant's
reputation and bottom line.

Are you prepared?


T
he digital age is transforming the way restaurants do business. Innovations in technology have only just begun to help restaurateurs streamline
operations, reduce their costs, and bring more guests into their restaurants.
With opportunity comes risk. Innovation in the restaurant businesswhether in payments, marketing, operations or even menu analysis
depends on processing large amounts of data, more than we can imagine. Its this data that criminal hackers are profiting from.
It seems like every day there is a new data breach. The Target breach at the end of 2013 was an early, wide-scale breach, exposing the payment card
data of millions of customers. However, the threat is now evolving. As we have seen in multliple other breaches, cyber criminals are now looking for
information other than payment card datadetails about employees, confidential company financials, and corporate secrets.
In times like these, protecting payment card datawhile still very importantonly goes part of the way.
Think about your own operation. You have more than just card data at stake. Through mobile applications, loyalty programs and social media, you
may be collecting guest data such as age, address, favorite orders, and visit frequency. You likely track your food, beverage and labor costs, as well as
your suppliers pricing. Your systems hold intellectual property like new recipes and business endeavors. You store employee and payroll information,
data on customer interactions, social media trends, and maybe even data on your competitors.

ALL OF THIS DATA IS VULNERABLE.


We know that cybersecurity isnt why you got into the restaurant business, but its emerging as one of the biggest risk factors for your reputation and
your bottom line. The threat is growing, so you need to take steps now to protect your business.
Hackers know that you face time and resource constraints. They prey on businesses that are ill-prepared for an attack. Thats why an ounce of
prevention is worth a pound of cure. Just as you have made food safety an integral part of your quality assurance program, you need to also make
cybersecurity a part of your operation. Improving security is a lot less expensive than dealing with a data breach.
In this paper, we lay the foundation for you to take those first steps. You will learn about the five aspects of a fully formed cybersecurity program.
You will need to dive deeper into many of these topics, but this high-level guide gives you a solid framework to move forward.

National Restaurant Association | Restaurant.org/Cybersecurity | February 2016 1

Cybersecurity Toolkit v2.indd 1 2/19/16 11:14 AM


Why Cybersecurity Matters
Five ways a data breach can hurt your restaurant company

T
he costs associated with a data breach 1. INVESTIGATIONS, FINES AND brand compromise fees, card reissuing and
can be overwhelming. Payment card REMEDIATION monitoring fees, and fraud-reimbursement
breaches, for example, can easily add up If a breach involves payment card data, youll penalties (chargebacks).
to $100,000 or more in losses, fines and forensic face substantial fines from the card brands since Just the suspicion of a data breach of
auditsan expense many restaurants cannot you will have violated the card acceptance customer payment cards requires a forensic
survive. Those are just the financial costs. Its agreements that require you to remain audit by an approved PCI forensic investigator.
hard to predict how much brand damage you compliant with the Payment Card Industry Based on the size, complexity and extent of the
might experience if data youve collected on (PCI) Data Security Standards. breach, forensic fees can range from $12,000 to
your customers or confidential internal To see just how costly these fines can be, more than $100,000 per investigation.
information is compromised by hackers. Transaction Resources Inc. added up all of the Vulnerabilities uncovered by the forensic
Lets look a little more closely at five key fees and penalties merchants must pay when investigation must then be remediated. Transac-
ways a data breach could cost your restaurant their payment card information has been tion Resources says updating your security may
business. stolen. Fees and penalties include forensic require hardware, software and network modifica-
investigation fees, security remediation, card tions at an average cost of over $2,000.

Even a suspected data breach can be costly


Scott Carlson, owner of Court Avenue Restaurant & Brewing Company in Des Moines, Iowa, knows firsthand the jarring impact even a suspected data
breach can have on a restaurant.
In his case, there wasnt even a breachonly the suspicion of a breach. But that was enough to trigger a series of costly actions that have become all
too familiar to operators and merchants victimized by cybercrime.
Carlson was notified by local authorities of suspicious activity on some of his patrons credit cards. A common point was that all had dined at his
restaurant. Even though no card fraud was ever linked to his establishment and no suspicious activity has occurred since, Carlson says Court Avenue
incurred significant fines and losses from the incident.
Restaurants have become the victims, Carlson warns. They are bearing huge costs, even if it is only a suspected breach.

Unequal burden of responsibility


The impact of just one suspected breach, Carlson says, carries an unequal burden of responsibility. He adds, The POS companies, processors, banks and
credit card networks dont pay any fines. Were the ones that get hit. Among the consequences that he suffered and says other operators need to be aware of:
Processors will request detailed compliance information, requiring you to cross-reference each potential breach with your employees work
schedules.
Processors and card networks can require you to conduct a forensic audit, which can cost thousands of dollarsand must be conducted by one of
only a handful of approved vendors.
If the card network suspects there has been a breach, it can fine you thousands of dollars for allegedly violating the networks data security rules,
even if no actual fraud losses can be proved.
Worst case, the credit card company can refuse to accept further transactions.
Carlson says that restaurateurs have no choice regarding the fines. He was charged $6,000 by MasterCard and Visa even though there has never
been any evidence that a breach occurred at his restaurant. In other words, an operator can do everything possible to prevent fraud, as he did, and still
get stung.
Whats the answer? Even though Carlson had just invested in a new POS system that was PCI compliant, he decided he needed to take further steps
to protect his restaurant, including upgrading computer hardware and tightening controls on access to his systems.
With the help of a resourceful part-time IT person, Court Avenue was able to isolate and restrict the IP addresses that are allowed access to its POS
system. According to Carlson, Now we know exactly who is accessing our systems and why.
Other precautions taken by independent operators like Carlson have included building stronger firewalls to protect networks, installing security
cameras to monitor POS systems, training employees on data security, and limiting access to company computers.

2 National Restaurant Association | Restaurant.org/Cybersecurity | February 2016

Cybersecurity Toolkit v2.indd 2 2/19/16 11:14 AM


In addition, each card brand assesses fines of the biggest challenges is holding on to

The average
for the merchant data that is compromised. customers.
Transaction Resources says that these fees Research by the Ponemon Institute reveals
typically start around $5,000 and can exceed
$500,000, depending on the size of the breach. small business that reputation and the loss of customer loyalty
do the most damage to the bottom line after a
Chargebacks can also add up since stolen cards
may remain in circulation long after the breach.
pays $36,000 to breach. In the aftermath of a breach, compa-
nies find they must spend heavily to regain
Altogether, Transaction Resources estimates
that the average small business pays $36,000 to
$50,000 for a their brand image and acquire new customers,
according to Ponemon's 2014 study on the cost
$50,000 for a data breach. data breach. of data breaches.
In a separate survey of more than 800
2. 47 DIFFERENT STATE executives in 2011, Ponemon found that an
BREACH-NOTIFICATION LAWS organizations brand value dropped between 17
Businesses that have been breached face percent and 31 percent following a breach and
increasingly complex notification rules. As of 3. INEVITABLE CLASS-ACTION that companies spent up to a year restoring
early 2016, 47 states have laws on security LAWSUITS their reputation.
breach notification, according to the National To make matters worse, its the notice to your The polled executives estimated their
Conference of State Legislatures. guests or the media that whets the appetite of companys brand value to be anywhere from $1
These laws detail when a company is trial lawyers. Your notice may trigger tort million to greater than $10 billion, with an
responsible for informing its customers or users lawsuits for failure to protect, inadequate average of $1.5 billion. Depending on the type
in the event of a breach. All the laws are slightly security and negligence. Class-action litigation of information stolen, companies, on average,
different, which makes compliance difficult for costs can add up quickly. lost between $184 million to more than $330
multi-state operators. A recent decision by a federal appeals court million in the value of their brand, according to
Provisions of these laws explain whos against Neiman Marcus clears the way for the survey.
covered, what type of compromised personal lawsuits after a breach, even if no fraud or harm
information will trigger notification require- has occurred. Customers may be able to sue 5. LOOMING CONGRESSIONAL
ments (e.g., account numbers, name combined simply based on the risk they face following a ACTION
with social security number, drivers license or breach. Policymakers are intent on addressing the
state ID), what constitutes a breach, require- Breached companies also have been the target problem of data breaches through complex
ments for notice once a breach has occurred of regulatory action by the Federal Trade federal and state laws and regulations. The
and exemptions (such as for encrypted Commission. The FTC is using its so-called pressure to find a solution builds with each new
information). Section V authority, which bans unfair and breach. The National Restaurant Association
Many restaurateurs and foodservice deceptive trade practices, to go after companies has been advocating for one federal data breach
operators simply collect name and payment that it says put consumers personal data in notification law, but banks and financial
card information from their guests, and danger. A recent appellate court decision affirmed institutions have been active on Capitol Hill
nothing more (no email or mailing address). FTCs work in this area, even though the agency demanding that Congress impose stringent new
When this is the case, and you dont have any has no written rules or guidelines about what data security standards on merchants. They
other means of informing your customers, constitutes reasonable cybersecurity. allege that merchants are irresponsible data
almost every state law will require that you custodians and need more direct government
provide substitute notice by informing 4. INESCAPABLE BRAND regulation.
statewide media that youve had a breach. DAMAGE Congress has not yet agreed on an approach,
Thats right, you must inflict further damage Its difficult to quantify how much your but as the battles in Washington heat up, restau-
on your reputation by informing the media that restaurants brand will suffer if a data breach is rateurs need to stay involved to counter the
youve been hacked. This has the effect of found. For businesses that suffer a breach, one threat of lopsided solutions.
harming your brand well beyond your core
customers.
Increasingly, states are going beyond security
ADVOCACY ALERT: The National Restaurant Association
breach notification laws. More states are getting
has been lobbying Congress for a national data security
prescriptive about the steps businesses should
and breach notification standard that preempts the 47
take to secure their data. The outcome could be a
state laws with a single federal law. The Association particularly favors an
patchwork of state-level regulation that makes
approach by Sen. Mark Warner (D-Va.) that would preempt all state laws
compliance even more difficult.
and do away with provisions requiring notice to statewide media. Visit
Restaurant.org/Cybersecurity to learn more.

National Restaurant Association | Restaurant.org/Cybersecurity | February 2016 3

Cybersecurity Toolkit v2.indd 3 2/19/16 11:14 AM


5 Identify
Essential Steps
to Protect Your Business
Protect Detect Respond Recover

G
iven all the threats, it makes sense to take cybersecurity to the most sophisticated functions, you will have taken that important
a proactive approach to cybersecurity. operations and franchised companies. next step towards protecting your business
Before we get started on how to do that, Once youve operationalized these five against cyberattacks and possible data breaches.
you should know that cybersecurity is fundamen-
tally an exercise in risk management. You wont
ever be able to remove the risk entirely, but you
can take steps to mitigate it. Risk is not anything Is the NIST framework required?
new for restaurant operators. You took a big risk
Its best not to think of the five functions of the NIST framework as a to-do list or a
just opening your restaurant. You learned to
requirement for compliance. In fact, beware of vendors who try to sell you NIST compli-
reduce the risk of failure and improve your rate of
ance. Its a guide and a way of thinkingnot a mandate.
success by following certain procedures and
The beauty and simplicity of the framework is that it can be adapted and scaled to any
instilling in your team an attitude for success. You
restaurant configuration: a single operator, a multi-unit operator, a franchisor, a franchisee.
can do the same with cybersecurity.
For an independent restaurant operator, you can use it within your four walls. For a
franchisor, it can be a way to educate your franchisees about your cybersecurity programs
THE FIVE FUNCTIONS
and track their progress. For a multi-unit restaurant operator, it can become a shared
Stakeholders from all sectors of the economy
operational guide for your IT staff, store managers, executives and board, so that members
recently came together to create a framework
of your team are all speaking the same language.
that businesses of all types can use to identify
According to NIST, The framework will help an organization to better understand,
cyber threats and protect their establishments
manage and reduce its cybersecurity risks. It will assist in determining which activities are
against data breaches. This framework, launched
most important to assure critical operations and service delivery. In turn, that will help to
in 2014, is formally known as the National
prioritize investments and maximize the impact of each dollar spent on cybersecurity.
Institute for Standards and Technologys (NIST)
Cybersecurity Framework for Critical Infra- YOURE NEVER FINISHED
structure. Its a long name for something very As you examine the components of the NIST framework, keep in mind that its a process.
simple. At its core are five functions: Identify, Think for a moment about quality assurance. Your QA programs are designed to ensure
Protect, Detect, Respond and Recover. A focus consistent food preparation and good service. QA is an ongoing process. Can you honestly say
on these five can help you create a cybersecurity that you are ever done with QA? By the same token, cybersecurity is not about checking
blueprint for your restaurant. boxes, although there are certainly checklists you can and should use to protect against
While its not a panacea, having a plan that threats. Rather, cybersecurity is a continual process that you need to build into your daily
addresses each of these five functions can go a operations. Threats will change, but if your cybersecurity program is designed properly, youll
long way toward protecting your restaurant. And be able to respond accordingly and adopt new policies to reduce the risk of cyberattacks.
the good news is that this framework works well Remember, there are no shortcuts. You may be tempted to focus more time and energy
for all sizes and types of restaurantsfrom small on the first two stepsIdentify and Protect. These surely are important, but you also need
establishments just starting to think about to be equally concerned about Detect, Respond and Recover.

4 National Restaurant Association | Restaurant.org/Cybersecurity | February 2016

Cybersecurity Toolkit v2.indd 4 2/19/16 11:14 AM


1 Identify 2 Protect
Identify Protect Detect Respond Recover Identify
Protect Detect Respond Recover

WHAT ASSETS ARE AT RISK? TAKE STEPS TO STOP A CYBERATTACK


Y our first step is to take an inventory of all of your systems and
Identify just how much risk you face. You need to know what you
have before you can protect it. Ask yourself these questions:
BEFORE IT BEGINS
O nce youve identified your cybersecurity risks, you can turn your
attention to protecting your data to stop a cyberattack before it
What systems or hardwarelike point-of-sale terminalsconnect to begins. In the Protect step, well look at tactics and procedures you can
your network, and what kind of information do they collect? What put in place to strategically leverage your resources and protect your
software do they run? restaurant.
Do you operate a website, a mobile site and/or a mobile ordering site? The key aspects of the Protect function include:
How are you connected to the Internet? Do you have a firewall in Limiting access to information, data sources and equipment like
place? servers, either through explicit policies or passwords.
Do you allow your employees to access your network remotely? Training staff on your cybersecurity procedures and policies.
Where do you store the information you collect? How does it get Determining if your employees tasked with cybersecurity and
there? Is it through an automated system or over a wireless system? compliance responsibilities have adequate and appropriate training.
How long do you keep the data? Ensuring that your systems are updated with new security updates or
What is your most sensitive data? Where is it stored? patches from the developer or manufacturer.
Who has access to your data (including third parties like your Implementing steps to protect your most sensitive data. This includes
credit card processor, loyalty program administer or part-time IT such compliance activities as meeting PCI standards, as well as other
consultant)? steps, like making sure passwords are changed at regular intervals.
Who on your staff is responsible for cybersecurity and compliance
activities? How are decisions on these issues made? No one-size-fits-all solution
Answering these questions helps identify your risks and vulnerabili- There are no one-size-fits-all solutions to cybersecurity. Every business
ties, whether its a piece of equipment or a source of data. The Identify is unique. You have different point-of-sale systems, different operations,
function helps you to determine how much risk you have. different processes and different pieces of information beyond the
Restaurants and other merchants are attractive targets for hackers payment card data you may retain. To be effective, the tactics and tools
because they process so many card transactions. But those arent the you employ must be tailored to your operation, taking into account your
only vulnerabilities you have. As you consider your data risks, you will tolerance for risk and your available resources.
undoubtedly uncover other types of sensitive information that your
restaurant holds. Follow best practices
Beyond payment card information, you may be collecting back-office While there isnt a single solution, we know that the vast majority of
information like restaurant financials and food costs, employee data targeted cyber-intrusions could be prevented by incorporating these
(including social security numbers) and supplier information. The simple, best-practice mitigation strategies: limiting access, training staff,
growth of mobile and loyalty programs in the restaurant industry brings ensuring your systems are updated and protecting your data.
risks. If youre collecting customer data through a mobile option or Limiting access: Armed with your answers from the Identify
third-party application, be sure to identify it. section, you should now be able to determine who has access to your
equipment and data sources. By limiting who can interact with your
restaurants computer server, for example, you can prevent a rogue or
careless employee from inadvertently downloading hostile or intrusive
Where do you store the information software, including computer viruses and other malicious programs.

you collect? How does it get there? Access controls apply not only to in-person interactions but to
remote ones as well. Many point-of-sale systems allow individuals to
Is it through an automated system view the receipts for the day from a remote site. Since this activity occurs
off premises, operators must be vigilant about adopting and enforcing
or over a wireless system? How long controls on who can view such data. Several restaurants in Delaware
do you keep the data? recently experienced data breaches due to failure to protect this
functionality. Hackers may find smaller restaurant operations more

National Restaurant Association | Restaurant.org/Cybersecurity | February 2016 5

Cybersecurity Toolkit v2.indd 5 2/19/16 11:14 AM


attractive because these businesses often allow users to access data the software, too. In addition to protecting the data your software
remotely and tend to lack full-time IT support. collects, you must make sure you are running the most up-to-date
Recall that even Target, one of the largest retailers in the United version of your software. Software developers constantly discover new
States, was hacked because its remote portal for vendors was vulnerable vulnerabilities in their softwares code and will forward patches to fix
to attack. Cyber thieves were able to use login credentials from an those problems. Hackers take advantage of companies that havent
air-conditioning contractor to penetrate Targets internal systems. The patched their systems. Be sure you have systems in place that ensure you
lesson is that you can never have too many controls when it comes to are patching all of your software at regular intervals.
remote access. Protecting data: Too often, critical computer systems are left
Training staff: Educating your employees about who can access unprotected and easily hacked because of the failure to change the
your equipment is an important aspect of cybersecurity training. password that came preloaded on the system. Hackers know and exploit
Employees should be informed about who has responsibility over these this vulnerability with the greatest of ease. As a starting point in your
matters, and who can give authorization for internal access as well as efforts to Protect your data, you should outline procedures that ensure
access to service technicians and other third-party vendors like that passwords across your enterprise are changed at regular intervals,
processors. and especially after employee or vendor turnover.
If there is turnover in a position that has cybersecurity responsibility, When it comes protecting payment card data, the starting point for
be sure to update your employee information and change passwords or any restaurant is compliance with PCI standards. All merchants that
codes once the person leaves the position. If you dont, those employees process, store, or transmit cardholder data from American Express,
or former employees will be able to access your information. Discover, JCB, MasterCard and Visa
Staying up to date: As part of your Identify efforts, you invento- International must comply with
ried not only the hardware or equipment you use in your operation but these standards. As discussed earlier,

EMV is only part of the solution


Given that most of the cyberattacks in the restaurant industry occur at the point of sale, you might think the
new EMV or chip cards are the perfect solution. These new cards use a microcomputer chip to generate a
dynamic card value that is nearly impossible to counterfeit.
Unfortunately, there has been a lot of misinformation about EMV. The truth is EMV will not protect restaurants
from data breaches. At best, EMV provides an added layer of security. It will stop the use of counterfeit credit cards
in your establishment, but frankly thats a type of fraud that doesnt happen very often in restaurants.
The EMV liability shift that took place in October 2015 simply means that merchants without EMV- or
chip-enabled terminals now face liability when card-present fraud occurs. Merchants face no regulatory or
legal requirement to install EMV card readers. It is a business decision that each company must make.
If you have not yet converted your systems to EMV, you might take a look at what you pay in chargebacks
due to counterfeit cards. If its not a lot, your dollars might be better spent on other data security protections
such as tokenization or encryption.
The PCI Security Standards Council has warned that even with EMV, credit card numbers remain
unencrypted during transactions. The largest breaches of card data in the United States have come from
vulnerabilities within the merchant or processor environments that EMV does not address. This is why a focus on enterprise-wide cybersecuri-
ty and the five core functions of the NIST framework is so necessary.

Chip + PIN: Is the United States headed in that direction?


Its still up in the air whether chip + PIN, a security feature used with EMV cards in Europe and Canada, will catch on in the United States.
At least for now, EMV cards are being implemented in the United States with chip technology only. By contrast, EMV cards in Europe and
Canada are issued as chip + PIN and require a PIN to be used at the point of sale instead of a signature. The chip + PIN approach gives
merchants a second layer of authentication.
President Obama threw his support behind chip + PIN for the United States in 2014 when he signed an Executive Order requiring the
federal government to use chip + PIN technology for government-issued cards and accept these cards at federal facilities such as national
parks. He also called on private industry to adopt EMV and use chip + PIN.
The technology continues to raise questions, and its possible that more dynamic technologies like mobile payments will eventually supplant
the need for PINs generally. In the meantime, if chip + PIN security gains ground in the United States, restaurateurs will need to figure out
whether the extra layer of security is worth the added cost of an extra piece of equipment specifically a PIN padfor use at tableside and at
drive-thrus. The National Restaurant Association is watching this issue closely and will keep its members updated.

6 National Restaurant Association | Restaurant.org/Cybersecurity | February 2016

Cybersecurity Toolkit v2.indd 6 2/19/16 11:14 AM


failure to do so will result in steep fines from the card brands, even if Orfei, general manager of the PCI Security Standards Council, noted in
your operation is merely accused of a breach. a presentation at the 2015 NRA Show that the PCI Data Security
Its not enough to be PCI compliant. PCI standards are aimed only at Standard is moving away from a compliance orientation to a risk-based
protecting payment card data, so PCI compliance is only part of the approach. Rather than look at PCI compliance as a once-a-year audit
security game. Look at all the systems you inventoried in the Identify process, Orfei said foodservice operators need to adopt an ongoing
function, then make sure you are taking steps to protect each of these risk-based strategy, which is the same approach NIST recommends in its
data sources. five-function cybersecurity framework.
PCI leaders themselves are aware of the systems limitations. Stephen

ADVOCACY ALERT: The National Restaurant Association has long called for changes to the PCI
system, including replacing the current card-brand-driven process with an independent standards
organization. The Association favors consensus-based standards for card security rather than
top-down standards from the card brands without any real input from end users like restaurants. The Association
is pleased that its general counsel, David Matthews, has been appointed co-chair of PCIs task force on small-to-
mid-size businesses. The task force was formed specifically to address the problems that smaller businesses
experience with PCI compliance.

Protecting data through encryption and tokenization


As payment and other technologies evolve, so do cybersecurity tactics. Restaurateurs and foodservice operators need to keep pace.
On the payment card side, EMV cards (see page 6) are certainly more secure than magnetic-stripe cards, but EMV cannot prevent
fraudsters from stealing unencrypted data. Once data from a sales transaction hits the Internet, there is a strong likelihood that hackers can
capture itunless the information is encrypted and stays encrypted all the way to its destination.
End-to-end encryption has thus become a primary goal for both merchants and processors when it comes to protecting card data. Several
companion data-protection technologies look promising as well, among them tokenization, which shields sensitive consumer information by
substituting other data that cannot be used by thieves.
With data security, the best defense is a good offense, says Michael English, vice president of product development for Heartland Payment
Systems. By taking the card data out of the transactionand out of a merchants ecosystemyou remove the ability of hackers to get anything
of value. You cannot monetize encrypted card data.
English suggests that the most secure way restaurants can go is to combine end-to-end encryption with EMV capability and tokenization.
EMV cards help reduce counterfeit-related fraud, but the biggest vulnerabilities in the payments process are often not about fraud. Theyre
about where a card is swiped or the card number is entered, where the card information is stored, and how the card information is transmitted.
Restaurateurs need a game plan in each area.
Encryption converts plain-text information captured at the point of sale into cipher text that requires a key to decrypt. Tokenization returns
a token to the merchant in the authorization process instead of a credit card number. Tokens replace sensitive data with random, unique
numbers that have no value to thieves. The token can also be used for returns, recurring payments, sales reports, etc.
Tokens can also be used as a substitute for the primary account number (PAN) you may be using to identify customers for your loyalty
programs and other customer promotions. When you use tokens, thieves who steal your data come up empty-handed.
The PCI Councils Stephen Orfei agrees that EMV, end-to-end encryption and tokenization are the three technologies that will get us to the
endgame. They will protect your business and will devalue the data, so that its useless in the hands of organized crime.
The power of encryption doesnt end with payment card data. You can apply encryption to all of the data your restaurant collects and that
youve inventoried as part of your Identify efforts.

ADVOCACY ALERT: The National Restaurant Association believes that end-to-end encryption and
tokenization are technologies that restaurant operators should consider to ensure payment card data
is protected throughout the transaction chain. The Association has joined with other food and retail
groups to urge the adoption of an open and universal tokenization standard for U.S. commerce. We also believe
that a national data breach notification law would provide businesses with a strong incentive to encrypt their data
because businesses that encrypt would be exempt from having to notify customers in the event of a breach.

National Restaurant Association | Restaurant.org/Cybersecurity | February 2016 7

Cybersecurity Toolkit v2.indd 7 2/19/16 11:14 AM


3 Detect 4 Respond
Identify Protect
Detect Respond Recover Identify Protect Detect
Respond Recover

ROUTINE MONITORING CAN HELP PLAN FOR THE WORST, AND BE


YOU PICK UP A PROBLEM READY TO ACT
O nce youve Identified which assets are at risk and taken steps to
Protect them, youll need to put systems in place to Detect
whether youve been breached.
R espond is how you react in case a breach is discoveredeither
through your own detection efforts or through contact with the
authorities or your payment processor. Once youve been breached, time
Just as its necessary to have smoke detectors, fire alarms and fire is of the essence! While youve worked hard to Protect yourself by
extinguishers in your restaurant facility, its imperative that you have the aligning your resources with your risks, you must also be ready to
tools to quickly detect a breach and promptly take action before the respond in a worst-case scenario. This will save you time, money and
fire gets out of hand. By monitoring and detecting a problem ahead of stress, and mitigate further damage to your restaurant.
time, you will put yourself in a far better position if a breach does occur.
Its less costly to take steps now than to wait until the authorities or WHAT YOU NEED TO KNOW
your processor notify you theres been fraudulent activity associated with To respond to a data breach, you will need to work with IT profession-
your restaurant. alsin-house and external, as appropriateto round up answers to the
There are a number of detection systems you can put into place. following questions, just as a start:
Consider implementing systems such as the use of a web-log analysis What data was compromised or stolen?
tool and processes that allow you to set a baseline of what normal or How did you find out about the breach?
unbreached systems look like, for example. How did the breach occur? When and where did it happen?
Checking your systems at regular intervals can lead to detection of If the breach is still happening, how can it be stopped? If its over, how
abnormal activity. For example, you should check to see if any large files long did it go on?
are being transferred out of your POS system, perhaps customer credit Who was affected by the breach? Guests? Employees? Suppliers?
card numbers kept on file in case of a chargeback investigation. Other What are the legal requirements? Beyond the law, do your contracts
signs of suspicious activity include unexpected Internet and network set any legal obligations in the event of a breach?
traffic, unknown files, software and devices installed on your systems, Does the law require you to inform guests about the breach? The
disabled antivirus programs, increased after-hours activity on your media? Both? What will you say? Are you prepared to issue a press
systems, and unknown applications that launch automatically when you release?
reboot. Do you have lawyers you can consult who know about cybercrime?
Simply having a routine detection procedure can reduce the Who else would you need to call? Do you have their phone/cell phone
likelihood of a longer, bigger and more expensive data breach. numbers?
Take time now to prepare a data breach response plan. This is a
REDUCING DETECTION TIME detailed blueprint that spells out how your operation will respond if a
Unfortunately, the hospitality industry has not been quick to detect data breach is detected through your efforts or discovered by an outside
cyberattacks. Verizons 2015 Data Breach Investigations Report found party. Putting together a plan is not a one-time task. You will need to
that in 78 percent of cases in the hospitality sector, incidents took review your response plan at regular intervals to ensure you have the
months or longer to discover. Compare that to the average across most up-to-date information.
industries, where 74 percent of incidents were discovered within hours. Your answers to the above questions will set the stage for your next
Verizon suggests one reason for the delay in discovery is that steps. Some post-breach responses are dictated by the law. As noted
restaurants are likely to be notified of an incident by an external party, earlier, most states have data breach notification laws. Familiarize
such as a fraud alert, rather than internally. yourself with your states notification requirements. Federal laws and
Remember, the longer an attack goes unnoticed, the longer criminals regulations may also be relevant, including the Federal Trade Commis-
have access to your systems and operations. As a result, the potential for sions enforcement authority.
data theft and loss of information is significant. Other response requirements may be spelled out in contracts or
agreements with third parties. If the compromise involves payment card
data, your card brand will have specific guidelines for you to follow. For
example, you may be asked not to turn off, access or alter the compro-
mised systems. You should preserve all logs, document all actions you

8 National Restaurant Association | Restaurant.org/Cybersecurity | February 2016

Cybersecurity Toolkit v2.indd 8 2/19/16 11:15 AM


5 Recover
Identify Protect Detect Respond
Recover

Putting together a plan is not a


one-time task. You will need to
review your response plan at regular GETTING BACK TO NORMAL AFTER A
intervals to ensure you have the BREACH
most up-to-date information. M uch like the Respond function, Recover entails planning. Again,
the purpose is to save precious time in the event of a breach. If
your restaurant is taken down by a breach, how will you get back to
normal? This function also calls for learningwhat lessons can you
apply to your operations to avoid future breaches?
Think about the steps that you will need to take to earn back the
take and alert appropriate incident-response personnel, including your trust of your customers. That alone will likely strengthen your resolve to
merchant bank and law enforcement. improve your cybersecurity procedures and pay more attention to the
Simply having the cell phone numbers and emails of key people to first four functions of the framework.
contact can save precious time if a breach is detected. Your first call after You need to consider, too, the financial resources it will take to
detecting a breach should be to a lawyer who is well versed in cyber- recover. As we noted earlier, data breaches are expensive. It may be
crime. After that, all activity should be run through the attorney. Your worth considering cyber liability insurance so that you have an extra
communications with your attorney or law firm will be protected by layer of financial protection.
attorney-client privilege, and these experts will be able to work with you As weve noted, recovering from a breach can be a lengthy process.
to mitigate the impact of potential lawsuits. Here are some questions you should be prepared to answer:
Have you fulfilled all of your legal obligations, including notifying law
enforcement and your guests (via state newspapers, if required)?

Ask the right questions Are you prepared for a slowdown in business? Look for ways to trim
expenses and increase your promotions.
of your third-party Are you prepared to deal with employee terminations? If business
slows, you may have to lay off employees, or you may need to take
vendors action against an employee who was negligent or violated your data
security policy.
That loyalty card company that you usewhat if it has a breach
Have you considered hiring a public relations firm to help you rebuild
of your customers data? What happens then?
your reputation?
You should make it part of your due diligence to find out how
Have you changed your passwords, and updated your software and
third parties protect your guests personal information and be
hardware? (See Protect.)
sure to review their processes throughout the life of your
Have you considered hiring an IT expert to conduct a security audit
contract. Be sure to ask them about their security and privacy
to prevent future incidents?
policies, and talk through what happens if theres a breach. Its
certainly possible for you to seek indemnification for the costs
and liability of a breach as you negotiate your contract with
them.

ADVOCACY ALERT: The National


Restaurant Association supports
federal data breach notification
legislation that requires third-party vendors to
inform their customers of a breach, and then give
the customer (i.e., the restaurant) the option of
deciding who should inform those affected by the
breachwith the third party bearing the costs.

National Restaurant Association | Restaurant.org/Cybersecurity | February 2016 9

Cybersecurity Toolkit v2.indd 9 2/19/16 11:15 AM


What Comes Next?
NRA is working on a restaurant cybersecurity framework

I ncorporating the five functions of the NIST framework into your businessIdentify, Protect, Detect, Respond and
Recoverare the first steps to protecting your restaurant from the growing threat of cybercrime. These five areas form the
basis of a strong enterprise-wide cybersecurity program.
The framework and this top-level guide are a good starting point, but you will need to dive deeper into the NIST
framework to create a comprehensive cybersecurity program. NIST provides extensive references to existing technical
standards, guidelines and practices that companies can choose to use.
NIST also encourages industry groups to review the list of standards and to customize resources for their own market
segments. In mid-2015, the National Restaurant Association convened a working group of member companies to formulate a
Cybersecurity Framework for the Restaurant Industry based on the NIST framework. The group is aiming to produce a
document in 2016 that will go into detail on the specific standards, guidelines and practices some of the nations leading
chain-restaurant companies already use for enterprise-wide cybersecurity.
The Cybersecurity Framework for the Restaurant Industry is intended to be a guide for restaurants. It will not provide a
checklist but will serve as a collection of best practices related to cybersecurity in restaurants.

Help shape cybersecurity policy


With policymakers taking on a greater role in data security, the National Restaurant Association urges restaurant companies
to help shape effective regulations. State-level regulators and legislators are already heavily involved in data security issues.
Congress is weighing in as high-profile data security incidents multiply, and national legislation is likely in the near future.
Banks and card companies are pushing for more regulations on restaurants and other merchants. The NRA is working to
ensure that Congress avoids regulatory overreach, doesnt saddle merchants with all the liability and helps resolve the
complications that multi-state companies deal with as they face nearly multiple state laws.

Resources
National Institute of Standards and Technology (NIST) Cybersecurity Framework

Federal Trade Commission Data Security

Department of Homeland Security Cybersecurity

Better Business Bureau Securing Your Personal Data

Internet Crime Complaint Center (a partnership between the FBI and the National White Collar Crime Center) ic3.gov

Visit Restaurant.org/Cybersecurity to stay updated on the latest resources and information.

Cybersecurity Toolkit v2.indd 10 2/19/16 11:15 AM

You might also like