advertisement
advertisement

This is page 2 of:

Could Global Payments Breach Finally Kill KBA Questions?

March 31st, 2012

Secondly, Garcia’s comment that “it is crucial to understand that this incident does not involve our merchants or their relationships with their customers” is either stunningly naïve (quite unlikely) or deliberating misleading. Is Garcia honestly suggesting that a 10 million card breach “does not involve” a department store’s “relationship” with its payment-card-using shoppers?

Consumers don’t know Global Payments. All they know is the card brand, their bank and the retailer. When a breach happens, they begin to suspect all of the above.

History has shown overwhelmingly that U.S. shoppers have never stopped—or even slowed—purchases because of a major breach. But that’s not to say that as consumers better understand these issues and, critically, continue their move to debit cards and away from credit cards (where they lose the zero-liability credit-card protections), those fears won’t start translating into action.

Such breaches could also impact young markets, such as mobile payments, where fear of the unknown coupled with major breaches could slow a market that is already stumbling.

If Global Payments meant to say that it will protect retailers from fraud losses, it should have said that. But to say that this breach “doesn’t involve merchants or their relationships with their customers” simply doesn’t pass the laugh test.

That all said, let’s get back to Litan’s KBA thoughts.

Litan pointed out the absurdity of such security defenses in 2012 and said, “we can expect the PCI assessors to say no to KBA on administrative accounts. They need to say no to many different types of authentication that are being successfully bypassed by determined crooks.”

Unfortunately, I doubt that we can expect this. Just because QSAs should be forbidding KBA tactics for anything sensitive doesn’t mean they will. By the way, if something is sensitive enough to need protection, it would seem sensitive enough to need good protection. Hence, should KBAs be used at all?

QSAs are not likely to start fighting against KBAs until the PCI Council comes out with some strong language discouraging—if not outright banning—their use for anything that even gets close to payment card data. The council doesn’t have the jurisdiction to say anything about security that is not related to payment cards, but I am hoping that QSAs would take the logical next step. If not, retailers will hopefully make that move directly.

One low-cost and low-disruption response is to make KBAs more difficult. Instead of asking for something easily discoverable—such as your last residential ZIP code—why not seek the name of your third-grade science teacher? Or what you had for breakfast three days ago?

Simple answer: The more difficult to remember the answer is, the more likely the consumer will just make something up, as in “Mrs. Smith” or “cereal.” And we’re back into the “easily guessable” trap.

Shoppers will opt for the easy way out, using the same password for many accounts, writing it down near their computer (or in a text file on their phone) or something that is easy to remember (12345, password or iloveyou anyone?). The only secure mechanism is for the system to issue strong passwords and to also use secondary authentication. (Let’s say it all together: Something you know, something you have, something you are.)


advertisement

2 Comments | Read Could Global Payments Breach Finally Kill KBA Questions?

  1. trooper Says:

    Integrating strong, managed security processes has always demanded more security-focused employees. Companies look at anything security-related as non value overhead. If they’re forced into a compliance mandate, such as PCI, it usually translates into a do-the-minimim approach, put on existing IT employees who are already over utilized doing production support (primary) work. Companies don’t consider risk -the probability, frequency and impact. Once a breech happens the response is usually in the form of an internal witch hunt and massive over-spending on a poorly planned, rushed solution to ad-hoc the gap. Companies will eventually recognize the difference between IT support and IT security, the need for both and the need to integrate both for successful implementation, management and monitoring of threat targets. As it stands now, any penny split between hiring overhead security staff and stock dividend will always go to the shareholders. It’s akin to eating yourself for breakfast.

  2. Justin Robinson Says:

    I think the death of KBA questions has been dying for quite sometime and unfortunately businesses and consumers are having to pay the price before companies take action. It’s amazing that social media and gaming companies around the globe have adopted technologies that allow their users to telesign into their account using the telephone while enterprises, financial institutions, etc sit around and let things like this happen…..

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.