Grocery Chain Data Breach Extends Security Debate

A data security breach within Massachusetts grocery chain Hannaford Bros. on Monday not only led to 1,800 known cases of fraud but is also serving as debate fodder in the ongoing argument about data ownership and Payment Card Industry (PCI) compliance.

Currently, Visa Inc., MasterCard and its other peers in the PCI comprise the main governing body that's responsible for policing the consumer and business-to-business retail transaction sector. However, mounting evidence of breaches -- such as what happened at Hannaford Bros. -- coupled with the fact that there have been more than 218 million records compromised since January 2005 suggest that the current structure isn't working.

"The issue is twofold," said Christian Phillips, chief security officer at Regulus, a transaction processing and remittance service provider. "Either merchants have to put more money into compliance and IT security controls or a third-party with not-so-obvious interests has to step in and set uniform IT security standards."

Phillips, who calls the control matrices he works up for IT security related to PCI a "large pile of Jello," contends that the problem with current PCI standards is the lack of uniformity.

"That's because I can't predict what Visa or MasterCard will ask us to change or what appliances and software will be in compliance one moment and out the next," he said.

Visa and MasterCard did not return calls.

Compliance with a Small 'C'?
The Hannaford case comes in the wake of the largest breach ever at TJX Cos., the parent company of discount clothiers T.J. Maxx and Marshalls. TJX last year reported at least 45.7 million cards were exposed, while banks' court filings put the number at more than 100 million. But IT security compliance in that case was shoddy at best.

Court records in a federal lawsuit over those breaches reveal that Visa knew about the extensive security problems at TJX as far back as late 2005, but decided to give TJX permission to remain non-compliant through Dec. 31, 2008. Visa's leniency, critics contend, had a lot to do with the high volume of credit card processing at TJX stores from which Visa stood to gain.

In the biggest irony imaginable, TJX and Hannaford Bros. both have their headquarters in the same state as the Boston-based PCI Security Standards Council, the non-profit organization that -- with the blessing of credit card companies -- sets security standards for the industry. The group in late February published a detailed set of "self-assessment questionnaires" for small and medium-sized retailers, who typically aren't required to have their data security reviewed by outside IT and financial auditors. The guidance addresses hundreds of scenarios and, according to PCI, will go a long way toward simplifying the self-assessment process for merchants and security consultants worried about PCI compliance.

But critics of the current informal regulatory structure have suggested that the burden placed on merchants to retain customer data is what's making them prime targets for hackers.

In a letter submitted to PCI late last year, National Retail Federation CIO David Hogan pointed out that credit card companies typically require retailers to store credit card numbers anywhere from one year to 18 months to satisfy card company retrieval requests. He argued retailers should have a choice as to whether they want to store credit card numbers at all.

"Instead of making the industry jump through hoops to create an impenetrable fortress, retailers want to eliminate the incentive for hackers to break into their systems in the first place," Hogan wrote.

Beth Givens, director of Privacy Rights Clearinghouse, a research and consumer advocacy group based in San Diego, Calif., calls data storage "a double-edged sword" for retailers and other merchants, and said that for consumers and banks, long, costly investigations into breaches can cost money.

"When you look at Hannaford and what happened, it might be the straw that breaks the camel's back," she said. "You think that perhaps state legislatures should follow Minnesota's lead on PCI compliance laws but [it] has to be something with some teeth so that merchants, security consultants and credit card companies know the stakes involved."

Security Solutions in Merchants' Hands
For merchants running a Windows architecture to process data, integration and streamlining of the data flow is key. To that end, for small merchants, Microsoft's Point of Sale application can serve as the interface for logging sales data while the pertinent information should probably be stored on an off-site SQL Server-based system or farmed out to a third-party for storage and archiving, if not periodic oversight.

"Companies are in a difficult position because right now, it's either you comply or don't accept credit cards," said Michael Gavin, a security strategist at Security Innovation, a consulting firm in Boston that conducts annual and quarterly security audits for its PCI clients. "I think the key here is to eliminate the low-hanging fruit, meaning the points of entry or vectors for fraud that are just obvious."

Chris Schwartzbauer, vice president of field operations for IT security firm Shavlik Technologies in St. Paul, Minn., agrees, saying customizable software and manual and automated controls are needed to protect data. He added that everyone needs to take care of their own house and remember that PCI is still in its infancy; its rules and methodologies will take time to catch up with technology.

"Right now, PCI is one of the greatest drivers for increased IT security for service organizations and companies themselves," he said. "Ultimately, though, it's the merchants' responsibility to make sure the environment is locked up tight."

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.


  • The 2022 Microsoft Product Roadmap

    Microsoft has a lot in the docket for 2022, including new products like SQL Server 2022, Exchange Subscription Edition and Visual Studio 2022 for Mac.

  • OpenSSF Adopts Microsoft Open Source Software Security Guidelines

    The Open Source Security Foundation (OpenSSF) announced on Wednesday that it has adopted the Secure Supply Chain Consumption Framework (S2C2F) for ensuring the secure use of open source software (OSS) by developers.

  • Microsoft Releases PowerShell 7.3

    PowerShell 7.3 is now at the "general availability" (GA) commercial-release stage.

  • Report: Cloud Services Mostly Used for Data Protection

    Most organizations have turned to the many cloud services to protect their data, according to a survey commissioned by Veeam Software