Supermarket chain CISO John Kirkwood speaks out about the latest evidence of why physical security and information security can't be approached separately. Thirty seconds. That’s about how long it took for criminals to subvert both the information security and physical security precautions put in place by the supermarket chain Stop & Shop.As you probably know by now, Stop & Shop is warning customers in Rhode Island and Massachusetts that it had a security breach. Not a huge one (at least by the look of it so far), but still a doozy, in which criminals went into at least six stores and tampered with Electronic Funds Transfer units. These are the point of sale devices, more commonly known as PIN pads, where credit and debit card customers swipe their cards and enter personal identification numbers.John Kirkwood, global information security officer for Royal Ahold, Stop & Shop’s Amsterdam-based parent company, says that it took criminals, operating late at night when the store was thinly staffed, about half a minute to replace a legitimate check-out device with a phony one that, in addition to doing what the legit device was supposed to do, also captured card numbers and PINs for the criminals to retrieve later. It’s a scam similar to cash machine “skimming,” in which criminals tamper with automatic teller machines to nab bank account information from unsuspecting users.“They would come in and replace a machine that was a perfectly good encrypted machine with a machine that was designed to be able to harvest and store the information,” Kirkwood says. “You don’t think that people are going to come in and, in a concerted, gang-like way, target PIN pad machines.” Except that’s exactly what happened. So Stop & Shop failed, right? Well, not exactly. The whole point of risk management is to do your best and adjust as you go. When you find a problem, you fix it. That’s exactly what Stop & Shop is doing now. [Also read Security convergence: the basics | Enterprise Risk Management: Get started in 6 simple steps]For one thing, Kirkwood says, the company has completed awareness training for employees about this PIN pad threat. In fact, it was employees who noticed “suspicious activity” at the front of the store in Coventry, Rhode Island, one night last week and contacted the local police. The Coventry police department then arrested four men who had, it seems, come back to reclaim the tampered-with machines and retrieve the information they held. (The men were from California, and the Secret Service is investigating; I can only speculate that the full extent of the damage extends far beyond six grocery stores in New England.)At the same time, Stop & Shop is protecting all its PIN pads from high-tech fraudsters with a decidedly low-tech device: Bolts. Big bolts, ones that make it take a lot longer than 30 seconds to swap out a PIN pad. I’d wager a guess that a month ago, had Kirkwood proposed this solution, he would have been met with howls of laughter, and perhaps some defensiveness from the physical security department.All of which is further proof that it simply doesn’t make sense to approach physical security and information security separately. Kirkwood says that Stop & Shop is compliant with the Payment Card Industry’s Data Security Standard, with the exception of some work it is still doing on data retention. That means that the information captured on the legitimate PIN pads was encrypted, and that certain information, including personal identification numbers, are not saved on company systems. It means, in essence, that the company was—or should have been—well protected from people looking to commit credit card fraud. (Stay tuned for CSO’s upcoming coverage of this industry attempt at self-regulation.) In all fairness, the PCI standard does include a nod or two to physical security, including a requirement that companies restrict physical access to cardholder data. However, it is primarily an information security standard. That means it has gaps where there are physical ways to circumvent high-tech protections. Like physically swapping out devices.[Learn about Restaurant loss prevention and cash management]“That’s why you need to do a comprehensive, uber-assessment,” says Kirkwood, now with the benefit of hindsight. “Do it from the way a hacker would think. It’s not following the rules of PCI; it’s thinking out of the box and going backward and going sideways. You don’t follow the rules when you’re trying to break into something.” So the usual “rules” for security must adapt: Who knows, but maybe the CISO will need to add a few bolts to his toolbox. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe