Endpoint

7/19/2017
12:55 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Netsurion, EventTracker Launch Free Self-Assessment for Ransomware Risk

FT. LAUDERDALE, Fla. and COLUMBIA, Md., July 19, 2017 (GLOBE NEWSWIRE) -- As point-of-sale (POS) malware continues to pummel retailers and brands, ransomware attacks are aggressively increasing in scope and frequency around the globe.

If cybercriminals put the two trends together, they can impact most or even all locations of large chains by locking up the POS system itself—the mission-critical nerve center of payment card-accepting merchants and service providers—while holding the company hostage until a ransom is paid.

Now, any business can find out its risk level and measure the impact of POS ransomware with an online POS Ransomware Risk Self-Assessment, offered at no charge from Netsurion, a leading provider of managed data and network security services for multi-location businesses, and security information and event management (SIEM) leader, EventTracker.

To date, the primary motivation of POS attacks has been to steal credit card data that can be sold on the black market for $5 to $30 per account, depending on the data’s value. However, all payment card-accepting organizations need to anticipate that criminals might switch to POS ransomware, attracted to the possibility they can receive more money, more quickly by holding a company virtually hostage with a new attack vector. One for which few merchant organizations are prepared.

“If ransomware attackers turn their attention to the already heavily targeted POS systems, and choose instead to hold a merchant hostage by preventing them from making transactions, victims could bleed millions of dollars in lost revenue daily until they recover the function of the POS systems,” said Netsurion and EventTracker Global CISO John Christly. “With the POS Ransomware Risk Self-Assessment, companies can immediately see just how at-risk they are against potential ransomware threats, and what specifically they need to do to ensure they are protected.”

The POS Ransomware Risk Self-Assessment can be accessed at no charge from both Netsurion and EventTracker. The online app provides:

  • The risk level for ransomware, and other malware, and what factors could escalate it
  • An estimate of how long the business may be down if ransomware at the POS is encountered
  • An estimated total revenue loss to show the real, concrete impact that ransomware can have
  • Customized POS ransomware protection recommendations that are emailed and can be shared with management
  • ROI guidance to help security pros evaluate recommended security measures

Netsurion and EventTracker are committed to equipping businesses with the knowledge and tools necessary to protect their brands, bottom-line, and customers. In addition to providing the self-assessment, Netsurion and EventTracker are hosting a POS ransomware educational webinar, in which Netsurion and EventTracker’s global CISO will present a detailed explanation of the threat, the potential impact, and recommended solutions.

The webinar will take place on Aug. 1 at 1 p.m. CT. To register and receive a first-look at the companies’ upcoming POS ransomware whitepaper, visit  https://register.gotowebinar.com/register/5176067918608210179.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
The Fundamental Flaw in Security Awareness Programs
Ira Winkler, CISSP, President, Secure Mentem,  7/19/2018
Number of Retailers Impacted by Breaches Doubles
Ericka Chickowski, Contributing Writer, Dark Reading,  7/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14492
PUBLISHED: 2018-07-21
Tenda AC7 through V15.03.06.44_CN, AC9 through V15.03.05.19(6318)_CN, and AC10 through V15.03.06.23_CN devices have a Stack-based Buffer Overflow via a long limitSpeed or limitSpeedup parameter to an unspecified /goform URI.
CVE-2018-3770
PUBLISHED: 2018-07-20
A path traversal exists in markdown-pdf version <9.0.0 that allows a user to insert a malicious html code that can result in reading the local files.
CVE-2018-3771
PUBLISHED: 2018-07-20
An XSS in statics-server <= 0.0.9 can be used via injected iframe in the filename when statics-server displays directory index in the browser.
CVE-2018-5065
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
CVE-2018-5066
PUBLISHED: 2018-07-20
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.