Charles Leaver – 30 Restaurants Impacted In 8 Months After PF Chang Data Breach

Written By Charles Leaver Ziften CEO

The PF Chang dining establishment chain recently released brand-new information about the security breach of its credit card systems throughout the nation. The dining establishment chain revealed that the breach impacted more than 30 restaurants in 17 states and went on for 8 months prior to being discovered.

While the investigation is still ongoing, in a statement PF Chang’s reported that the breach has actually been contained and customer monetary data has actually been processed securely by the dining establishment since June 11. The compromised systems used by the chain were removed till it was clear that their security could be ensured, and in the meantime credit cards were processed by hand.

Rick Federico, CEO stated in a statement “The potentially stolen credit and debit card data consists of the card number and sometimes likewise the cardholder’s name and/or the card’s date of expiry.” “However, we have not identified that any particular cardholder’s credit or debit card data was stolen by the attacker.”

PF Chang’s was notified of the breach, which they referred to as a “extremely advanced criminal operation,” in June when they were called by the Secret Service about cyber security concerns. As soon as they were informed, the restaurant worked with third-party forensic investigators to find how the breach was able to happen, at which time they discovered that harmful actors had the ability to exploit the chain’s credit card processing systems and potentially gain access to customer charge card details.

Organizations concerned about similar data breaches affecting point-of-sale terminals must implement endpoint threat detection to keep very important systems safeguarded. Endpoint protection involves monitoring delicate access points – like POS systems, bar code readers and staff member mobile phones – and reducing risks that appear. Constant endpoint visibility is necessary to recognize dangers before they compromise networks and guarantee business security.