A Toolkit For Restaurant Operators - Cybersecurity101
A Toolkit For Restaurant Operators - Cybersecurity101
Introduction...................................... 1
Data breaches continue
to dominate the news.
Why Cybersecurity Matters....... 2
Businesses are increasingly
vulnerable.
Five Essential Steps to
Identify........................................ 5
For restaurant and foodservice businesses, cybersecurity isnt about playing defense. Its about
having a strong offense. The National Restaurant Association developed this guide to help you
Protect........................................ 5
take proactive steps to better secure your data.
This guide is intended to give you a better understanding of the five core areas of an enter-
Detect..........................................8
prise-wide cybersecurity program. Our goal is to arm you with the information you need to
identify your risks, protect your business and guests, understand laws that might apply to you
and recover if a breach ever happens. Respond.....................................8
There is no magic bullet. Security is an ongoing and evolving battle. This guide provides a
framework that will help you take a smart approach to cybersecurity. Youll need to reassess Recover.......................................9
your risks and dig deeper as you incorporate these practices into your restaurant operation.
As Congress considers increased regulation in this area, the National Restaurant Association is
engaged on your behalf in the nations capital. Were working to make sure lawmakers under- What Comes Next?...................... 10
stand the steps our industry is taking and the challenges we face.
Thank you for your efforts to protect your operation and, by extension, our entire industry. We
encourage you to visit Restaurant.org/Cybersecurity to stay updated on the latest resources and
information.
Sincerely,
SHARED VISION of the National Restau-
rant Association, National Restaurant
Association Educational Foundation and
State Restaurant Associations: We lead
Phil Kafarakis Americas restaurant and foodservice
Chief Innovation & Member Advancement Officer industry by elevating its prosperity,
National Restaurant Association prominence and participation, enhancing
the quality of life for all we serve.
2016 National Restaurant Association. All rights reserved. The National Restaurant Association logo is a
registered trademark of the National Restaurant Association.
T
he costs associated with a data breach 1. INVESTIGATIONS, FINES AND brand compromise fees, card reissuing and
can be overwhelming. Payment card REMEDIATION monitoring fees, and fraud-reimbursement
breaches, for example, can easily add up If a breach involves payment card data, youll penalties (chargebacks).
to $100,000 or more in losses, fines and forensic face substantial fines from the card brands since Just the suspicion of a data breach of
auditsan expense many restaurants cannot you will have violated the card acceptance customer payment cards requires a forensic
survive. Those are just the financial costs. Its agreements that require you to remain audit by an approved PCI forensic investigator.
hard to predict how much brand damage you compliant with the Payment Card Industry Based on the size, complexity and extent of the
might experience if data youve collected on (PCI) Data Security Standards. breach, forensic fees can range from $12,000 to
your customers or confidential internal To see just how costly these fines can be, more than $100,000 per investigation.
information is compromised by hackers. Transaction Resources Inc. added up all of the Vulnerabilities uncovered by the forensic
Lets look a little more closely at five key fees and penalties merchants must pay when investigation must then be remediated. Transac-
ways a data breach could cost your restaurant their payment card information has been tion Resources says updating your security may
business. stolen. Fees and penalties include forensic require hardware, software and network modifica-
investigation fees, security remediation, card tions at an average cost of over $2,000.
The average
for the merchant data that is compromised. customers.
Transaction Resources says that these fees Research by the Ponemon Institute reveals
typically start around $5,000 and can exceed
$500,000, depending on the size of the breach. small business that reputation and the loss of customer loyalty
do the most damage to the bottom line after a
Chargebacks can also add up since stolen cards
may remain in circulation long after the breach.
pays $36,000 to breach. In the aftermath of a breach, compa-
nies find they must spend heavily to regain
Altogether, Transaction Resources estimates
that the average small business pays $36,000 to
$50,000 for a their brand image and acquire new customers,
according to Ponemon's 2014 study on the cost
$50,000 for a data breach. data breach. of data breaches.
In a separate survey of more than 800
2. 47 DIFFERENT STATE executives in 2011, Ponemon found that an
BREACH-NOTIFICATION LAWS organizations brand value dropped between 17
Businesses that have been breached face percent and 31 percent following a breach and
increasingly complex notification rules. As of 3. INEVITABLE CLASS-ACTION that companies spent up to a year restoring
early 2016, 47 states have laws on security LAWSUITS their reputation.
breach notification, according to the National To make matters worse, its the notice to your The polled executives estimated their
Conference of State Legislatures. guests or the media that whets the appetite of companys brand value to be anywhere from $1
These laws detail when a company is trial lawyers. Your notice may trigger tort million to greater than $10 billion, with an
responsible for informing its customers or users lawsuits for failure to protect, inadequate average of $1.5 billion. Depending on the type
in the event of a breach. All the laws are slightly security and negligence. Class-action litigation of information stolen, companies, on average,
different, which makes compliance difficult for costs can add up quickly. lost between $184 million to more than $330
multi-state operators. A recent decision by a federal appeals court million in the value of their brand, according to
Provisions of these laws explain whos against Neiman Marcus clears the way for the survey.
covered, what type of compromised personal lawsuits after a breach, even if no fraud or harm
information will trigger notification require- has occurred. Customers may be able to sue 5. LOOMING CONGRESSIONAL
ments (e.g., account numbers, name combined simply based on the risk they face following a ACTION
with social security number, drivers license or breach. Policymakers are intent on addressing the
state ID), what constitutes a breach, require- Breached companies also have been the target problem of data breaches through complex
ments for notice once a breach has occurred of regulatory action by the Federal Trade federal and state laws and regulations. The
and exemptions (such as for encrypted Commission. The FTC is using its so-called pressure to find a solution builds with each new
information). Section V authority, which bans unfair and breach. The National Restaurant Association
Many restaurateurs and foodservice deceptive trade practices, to go after companies has been advocating for one federal data breach
operators simply collect name and payment that it says put consumers personal data in notification law, but banks and financial
card information from their guests, and danger. A recent appellate court decision affirmed institutions have been active on Capitol Hill
nothing more (no email or mailing address). FTCs work in this area, even though the agency demanding that Congress impose stringent new
When this is the case, and you dont have any has no written rules or guidelines about what data security standards on merchants. They
other means of informing your customers, constitutes reasonable cybersecurity. allege that merchants are irresponsible data
almost every state law will require that you custodians and need more direct government
provide substitute notice by informing 4. INESCAPABLE BRAND regulation.
statewide media that youve had a breach. DAMAGE Congress has not yet agreed on an approach,
Thats right, you must inflict further damage Its difficult to quantify how much your but as the battles in Washington heat up, restau-
on your reputation by informing the media that restaurants brand will suffer if a data breach is rateurs need to stay involved to counter the
youve been hacked. This has the effect of found. For businesses that suffer a breach, one threat of lopsided solutions.
harming your brand well beyond your core
customers.
Increasingly, states are going beyond security
ADVOCACY ALERT: The National Restaurant Association
breach notification laws. More states are getting
has been lobbying Congress for a national data security
prescriptive about the steps businesses should
and breach notification standard that preempts the 47
take to secure their data. The outcome could be a
state laws with a single federal law. The Association particularly favors an
patchwork of state-level regulation that makes
approach by Sen. Mark Warner (D-Va.) that would preempt all state laws
compliance even more difficult.
and do away with provisions requiring notice to statewide media. Visit
Restaurant.org/Cybersecurity to learn more.
G
iven all the threats, it makes sense to take cybersecurity to the most sophisticated functions, you will have taken that important
a proactive approach to cybersecurity. operations and franchised companies. next step towards protecting your business
Before we get started on how to do that, Once youve operationalized these five against cyberattacks and possible data breaches.
you should know that cybersecurity is fundamen-
tally an exercise in risk management. You wont
ever be able to remove the risk entirely, but you
can take steps to mitigate it. Risk is not anything Is the NIST framework required?
new for restaurant operators. You took a big risk
Its best not to think of the five functions of the NIST framework as a to-do list or a
just opening your restaurant. You learned to
requirement for compliance. In fact, beware of vendors who try to sell you NIST compli-
reduce the risk of failure and improve your rate of
ance. Its a guide and a way of thinkingnot a mandate.
success by following certain procedures and
The beauty and simplicity of the framework is that it can be adapted and scaled to any
instilling in your team an attitude for success. You
restaurant configuration: a single operator, a multi-unit operator, a franchisor, a franchisee.
can do the same with cybersecurity.
For an independent restaurant operator, you can use it within your four walls. For a
franchisor, it can be a way to educate your franchisees about your cybersecurity programs
THE FIVE FUNCTIONS
and track their progress. For a multi-unit restaurant operator, it can become a shared
Stakeholders from all sectors of the economy
operational guide for your IT staff, store managers, executives and board, so that members
recently came together to create a framework
of your team are all speaking the same language.
that businesses of all types can use to identify
According to NIST, The framework will help an organization to better understand,
cyber threats and protect their establishments
manage and reduce its cybersecurity risks. It will assist in determining which activities are
against data breaches. This framework, launched
most important to assure critical operations and service delivery. In turn, that will help to
in 2014, is formally known as the National
prioritize investments and maximize the impact of each dollar spent on cybersecurity.
Institute for Standards and Technologys (NIST)
Cybersecurity Framework for Critical Infra- YOURE NEVER FINISHED
structure. Its a long name for something very As you examine the components of the NIST framework, keep in mind that its a process.
simple. At its core are five functions: Identify, Think for a moment about quality assurance. Your QA programs are designed to ensure
Protect, Detect, Respond and Recover. A focus consistent food preparation and good service. QA is an ongoing process. Can you honestly say
on these five can help you create a cybersecurity that you are ever done with QA? By the same token, cybersecurity is not about checking
blueprint for your restaurant. boxes, although there are certainly checklists you can and should use to protect against
While its not a panacea, having a plan that threats. Rather, cybersecurity is a continual process that you need to build into your daily
addresses each of these five functions can go a operations. Threats will change, but if your cybersecurity program is designed properly, youll
long way toward protecting your restaurant. And be able to respond accordingly and adopt new policies to reduce the risk of cyberattacks.
the good news is that this framework works well Remember, there are no shortcuts. You may be tempted to focus more time and energy
for all sizes and types of restaurantsfrom small on the first two stepsIdentify and Protect. These surely are important, but you also need
establishments just starting to think about to be equally concerned about Detect, Respond and Recover.
you collect? How does it get there? Access controls apply not only to in-person interactions but to
remote ones as well. Many point-of-sale systems allow individuals to
Is it through an automated system view the receipts for the day from a remote site. Since this activity occurs
off premises, operators must be vigilant about adopting and enforcing
or over a wireless system? How long controls on who can view such data. Several restaurants in Delaware
do you keep the data? recently experienced data breaches due to failure to protect this
functionality. Hackers may find smaller restaurant operations more
ADVOCACY ALERT: The National Restaurant Association has long called for changes to the PCI
system, including replacing the current card-brand-driven process with an independent standards
organization. The Association favors consensus-based standards for card security rather than
top-down standards from the card brands without any real input from end users like restaurants. The Association
is pleased that its general counsel, David Matthews, has been appointed co-chair of PCIs task force on small-to-
mid-size businesses. The task force was formed specifically to address the problems that smaller businesses
experience with PCI compliance.
ADVOCACY ALERT: The National Restaurant Association believes that end-to-end encryption and
tokenization are technologies that restaurant operators should consider to ensure payment card data
is protected throughout the transaction chain. The Association has joined with other food and retail
groups to urge the adoption of an open and universal tokenization standard for U.S. commerce. We also believe
that a national data breach notification law would provide businesses with a strong incentive to encrypt their data
because businesses that encrypt would be exempt from having to notify customers in the event of a breach.
Ask the right questions Are you prepared for a slowdown in business? Look for ways to trim
expenses and increase your promotions.
of your third-party Are you prepared to deal with employee terminations? If business
slows, you may have to lay off employees, or you may need to take
vendors action against an employee who was negligent or violated your data
security policy.
That loyalty card company that you usewhat if it has a breach
Have you considered hiring a public relations firm to help you rebuild
of your customers data? What happens then?
your reputation?
You should make it part of your due diligence to find out how
Have you changed your passwords, and updated your software and
third parties protect your guests personal information and be
hardware? (See Protect.)
sure to review their processes throughout the life of your
Have you considered hiring an IT expert to conduct a security audit
contract. Be sure to ask them about their security and privacy
to prevent future incidents?
policies, and talk through what happens if theres a breach. Its
certainly possible for you to seek indemnification for the costs
and liability of a breach as you negotiate your contract with
them.
I ncorporating the five functions of the NIST framework into your businessIdentify, Protect, Detect, Respond and
Recoverare the first steps to protecting your restaurant from the growing threat of cybercrime. These five areas form the
basis of a strong enterprise-wide cybersecurity program.
The framework and this top-level guide are a good starting point, but you will need to dive deeper into the NIST
framework to create a comprehensive cybersecurity program. NIST provides extensive references to existing technical
standards, guidelines and practices that companies can choose to use.
NIST also encourages industry groups to review the list of standards and to customize resources for their own market
segments. In mid-2015, the National Restaurant Association convened a working group of member companies to formulate a
Cybersecurity Framework for the Restaurant Industry based on the NIST framework. The group is aiming to produce a
document in 2016 that will go into detail on the specific standards, guidelines and practices some of the nations leading
chain-restaurant companies already use for enterprise-wide cybersecurity.
The Cybersecurity Framework for the Restaurant Industry is intended to be a guide for restaurants. It will not provide a
checklist but will serve as a collection of best practices related to cybersecurity in restaurants.
Resources
National Institute of Standards and Technology (NIST) Cybersecurity Framework
Internet Crime Complaint Center (a partnership between the FBI and the National White Collar Crime Center) ic3.gov