Scanning Microsoft Outlook Exposes Cardholder Data on 80% of Merchants

Data breaches outlook

Are you emailing customer orders with cardholder data? Quit it! Don’t do that!

Cardholder data refers to information printed, processed, transmitted or stored in any form on a payment card. Organizations that accept cards are expected to protect cardholder data and in most cases are mandatory. PCI DSS requirement 3.x explicitly outlines the testing procedures that need to be met. So what’s the problem?

Given today’s glorified volume of data breach news related to cardholder data, this blows me away and is consuming 100% of my coffee break time. I would think that common sense would have been applied by now. It’s time for the industry to do something without a federal bill passing through Congress on who can carry Plastic, Square or Paper. Regardless of the call to action on encrypting, removing, or whatever remediation one chooses; identification and protection to only the “PCI Audit Zone” doesn’t work in my opinion.

After querying numerous compliance and security colleagues, the number one response was “we address the areas that are needed in order to maintain compliancy”. Many were referencing PCI DSS with a handful pertaining to HIPAA. What other challenges keep one from assessing all endpoints? As I lift my jaw from the ground, most responded with “DLP is too expensive”. Secondly, they were converting Outlook PST files to text and then running analysis. Rightfully so, I am now understanding one of many potential reasons of why cardholder breaches are still a problem.

My colleagues and I discussed the issues at hand. We decided to research and apply the Microsoft Outlook scanning feature with a deliverable for anyone to scan their Outlook PST files anytime, anywhere. In fact, we decided to add ZIP and Office file formats also, and I’m glad we did. Currently 80% of all customers are finding unencrypted credit card data in Outlook as well as the new formats.

See sample data discovery scan report (aka PAN Scanning) illustrating the file path, card brand, file format, and number of instances.

In summary, I am hoping this will contribute to mitigating cardholder data breaches. Now the question is, are your employees storing or emailing cardholder data? You can now find out easy and quickly, and a little hint, “don’t forget to scan your remote workers”. The results will be shocking if it is your first baseline data discovery scan assessment for cardholder data.

Happy scanning and wish all a secure February.

data cardholder breach fb

About Billy Austin

President & Co-founder of iScan Online, developers of the Cloud Security Scanning solution for Mobility and Computing.
This entry was posted in Cardholder Data, Data Breaches, PAN Scanning, PCI DSS. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s