SHARE
Facebook X Pinterest WhatsApp

Trump Hotels Data Breach: More of the Same

Study Finds Payment Executives at Security Crossroads It speaks volumes for the state of network security when my reaction to the news of an apparent credit card breach in the Trump hotel chain was, “yeah, so?” Credit card breaches are so yesterday, right? Lately, data breaches are all about personally identifiable information and intellectual property, […]

Written By
SP
Sue Poremba
Jul 6, 2015
Slide Show

Study Finds Payment Executives at Security Crossroads

It speaks volumes for the state of network security when my reaction to the news of an apparent credit card breach in the Trump hotel chain was, “yeah, so?” Credit card breaches are so yesterday, right? Lately, data breaches are all about personally identifiable information and intellectual property, or so it seems.

The Trump Hotel credit card breach is a reminder that financial data is still a hot commodity and, despite steps to improve credit card security and rethinking the way the information is encrypted, this is still an easy gateway theft for cybercriminals. What makes this one a little different than, say, a Target or Home Depot credit card breach, is that it hit multiple locations and entities.  Ken Westin, senior security analyst for Tripwire, explained in an email to me:

This is not an attack that targeted a single hotel or store.  Instead, this was the result of a larger more sophisticated and orchestrated attack. When a larger group of organizations appear to be involved, it usually indicates that the breach took advantage of shared network resources or applications. Many organizations share backend systems and payment gateways to reduce costs and increase operational efficiency, and the data on these shared systems are a very high value target for attackers.

However, another recurring concern also raised its ugly head in this particular breach. According to eSecurity Planet, the breach dates back to February, and as Ross Brewer, vice president and managing director for international markets at LogRhythm, told me in an email conversation, this is a serious problem:

One of the main themes we see time and time again is hacks going unnoticed for months on end. In this case, it is being suggested that five months may have passed before anyone was made aware and that is a problem. Not only does it negatively impact customers, but it does no favors for the reputation of the businesses themselves either. The sophistication of hackers today means that trying to prevent a breach from happening has almost become pointless and instead, organizations need to focus on detecting and responding to suspicious activity as quickly as possible.

Security

Brewer thinks it is time that businesses start taking a more holistic approach to security. It’s a suggestion that I’m hearing more often from security experts and evangelists. This means continuing a layered approach that has been done in the past, but with layers that will complement each other, rather than working as individual security checkpoints. It involves everyone being on board and working with each other – and that includes employees and decision makers.

Would a holistic approach have stopped the Trump breach? I have no idea. Would it have revealed the breach earlier? Quite possibly. What we learned, however, is that these security situations are repeating themselves, with just small individualistic quirks, and we aren’t getting any better at stopping them.

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom’s Guide. You can reach Sue via Twitter: @sueporemba

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

5G and Industrial Automation: Practical Use Cases
Kashyap Vyas
Apr 22, 2022
Understanding the Relationship Between 5G and Edge Computing
Collins Ayuya
Apr 19, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.