{"id":1093,"date":"2014-06-14T09:15:48","date_gmt":"2014-06-14T13:15:48","guid":{"rendered":"http:\/\/wehuberconsultingllc.com\/wordpress\/?p=1093"},"modified":"2014-09-16T14:31:09","modified_gmt":"2014-09-16T18:31:09","slug":"did-p-f-changs-replace-a-high-tech-security-breach-with-a-low-tech-security-breach","status":"publish","type":"post","link":"https:\/\/wehuberconsultingllc.com\/wordpress\/2014\/06\/14\/did-p-f-changs-replace-a-high-tech-security-breach-with-a-low-tech-security-breach\/","title":{"rendered":"Did P. F. Changs replace a high tech security breach with a low tech security breach?"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/wehuberconsultingllc.com\/wordpress\/wp-content\/uploads\/2014\/06\/25a.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" title=\"25a\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; float: right; padding-top: 0px; padding-left: 0px; border-left: 0px; display: inline; padding-right: 0px\" border=\"0\" alt=\"25a\" src=\"https:\/\/i0.wp.com\/wehuberconsultingllc.com\/wordpress\/wp-content\/uploads\/2014\/06\/25a_thumb.jpg?resize=128%2C128\" width=\"128\" align=\"right\" height=\"128\" \/><\/a>Last Wednesday my wife and I celebrated our 31<sup>st<\/sup> anniversary at P. F. Changs. We had a nice dinner and they ran our card through a manual imprint system. Today I noticed that they wrote my <a href=\"http:\/\/en.wikipedia.org\/wiki\/Card_security_code\">CVV<\/a> on the receipt. That is not necessary if they were actually going to process my bill as a manual credit card transaction in which the card is present. By writing the CVV on the receipt that means that they plan to process the charge later as a card not present transaction. For those of you who have jumped through the PCI hoops, you have to wonder what measures they are using to protect these receipts since they now include the CVV. In the PCI world there are some pretty serious restrictions on keeping the CVV information secure. This is a dumpster diver\u00e2\u20ac\u2122s gold mine.<\/p>\n<p>Okay, I am really annoyed. What is the best way for a company to continue their business after a data breach without annoying their customers? There are some interesting comments over at <a href=\"http:\/\/krebsonsecurity.com\/2014\/06\/p-f-changs-confirms-credit-card-breach\/\">Krebs on Security<\/a> but I have my own recommendation. As a long time developer I look for a good manual procedures to automate. In this case we are going in the opposite direction. We are breaking up a good automated procedure into standalone parts. In this case I would recommend creating a corporate web app to process the credit card transaction that would be very similar to the model used by internet retailers. In fact I would not be surprised if a corporate developer does not already have one they used to get through credit card processing certification. In this case either the waitperson or some other designated person enters the sixteen digit credit card number and CVV to run the transaction. If the transaction goes through then you update the bill in the restaurant\u00e2\u20ac\u2122s order system with the confirmation code or reference ID. Is this a little more work? Yes but we literally have millions of people who enter their sixteen digit credit card number and CVV every day without exposing themselves to credit card fraud. There are a whole lot less PCI compliance issues with this procedure than a manual imprint with the customer\u00e2\u20ac\u2122s CVV on the receipt.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last Wednesday my wife and I celebrated our 31st anniversary at P. F. Changs. We had a nice dinner and they ran our card through a manual imprint system. Today I noticed that they wrote my CVV on the receipt. That is not necessary if they were actually going to process my bill as a &hellip; <a href=\"https:\/\/wehuberconsultingllc.com\/wordpress\/2014\/06\/14\/did-p-f-changs-replace-a-high-tech-security-breach-with-a-low-tech-security-breach\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Did P. F. Changs replace a high tech security breach with a low tech security breach?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[14],"tags":[131],"class_list":["post-1093","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p4iN3d-hD","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wehuberconsultingllc.com\/wordpress\/wp-json\/wp\/v2\/posts\/1093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wehuberconsultingllc.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wehuberconsultingllc.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wehuberconsultingllc.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wehuberconsultingllc.com\/wordpress\/wp-json\/wp\/v2\/comments?post=1093"}],"version-history":[{"count":3,"href":"https:\/\/wehuberconsultingllc.com\/wordpress\/wp-json\/wp\/v2\/posts\/1093\/revisions"}],"predecessor-version":[{"id":1136,"href":"https:\/\/wehuberconsultingllc.com\/wordpress\/wp-json\/wp\/v2\/posts\/1093\/revisions\/1136"}],"wp:attachment":[{"href":"https:\/\/wehuberconsultingllc.com\/wordpress\/wp-json\/wp\/v2\/media?parent=1093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wehuberconsultingllc.com\/wordpress\/wp-json\/wp\/v2\/categories?post=1093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wehuberconsultingllc.com\/wordpress\/wp-json\/wp\/v2\/tags?post=1093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}