Those smaller merchants can't even necessarily protect themselves by opting to not have a Web site, as the thieves are grabbing credit card information as its transmitted over the Internet to POS servers.
"In general, the smaller retailers, whether they're operating E-Commerce sites or physical stores, don't have the resources to think about security," said Gartner Group retail security analyst Avivah Litan.
Many of the POS programs used by smaller retailers "have vulnerabilities. (Criminals) can log into these systems using programs like PCAnywhere and, lo and behold, they can get the credit card and debit card data and sometimes there's even magstripe data being stored," Litan said. "A small retailer doesn't have the time or the resources or the inclination to know about all this."
A recent Washington Post story highlighted the issue, but it?s been common knowledge in the law enforcement world for years that smaller retailers are very attractive targets.
The goal of the thieves is typically not to use the data to create bogus credit cards as much as is it to collect a large number of numbers and authentication codes and to sell that collection of data to support fraudulent E-Commerce purchases or to purchase stored-value cards and use those to make brick-and-mortar purchases.
Gartner's Litan said some global cyber crooks have gotten fairly sophisticated in selecting their victims. "I was told by a forensics analyst that there are some thieves in VietNam who have figured out which Point of Sale cash registers are vulnerable," she said. "They go to the manufacturer's Web site, find out who the big customers are and they may even find out small customers. They then go attack those terminals. They may not even know how vulnerable they are. For example, they may not have an E-Commerce site, but they may use a terminal program that the vendor maintains through an Internet protocol."
This trend has started to impact consumer E-Commerce purchasing habits, as consumers tell surveys that they are much more comfortable buying from larger E-Commerce because they feel safer doing so. The dream of every large retail marketing exec?who initially feared those young startups undercutting their price?is being realized.
Not that the feds aren't doing as good a job as could be expected against cybercrime, with a recent major Secret Service probe a good example of the kinds of techniques today's law enforcement agent is using.
Much of the problem, though, resides with software vendors pushing POS options for smaller retailers. Greg Buzek, president of the IHL Consulting Group, estimates that there are some 2,000 POS vendors pushing products for the small-retail market, which is a dramatically larger number than service the world's largest retail chains' POS needs.
In Buzek's opinion, the biggest cause of the security weakness for smaller retailers is that much of it "is bad software."
Another belief is that smaller retailers do not always rigidly abide by accepted security rules, such as the PCI rules forbidding the retention of key credit card information. Many retailers disobey that rule so that they can more easily handle product returns, where the customer will want the credit applied to the credit card that was used, he said.
But many smaller retailers also don't fully understand what their POS software can and cannot do, which is what the cyberthieves are counting on.
Another suspect in the "who's at fault" game are security auditors and consultants who tell smaller sites?after an audit?that they're safe when they're not.
Buzek and Litan discussed the small retailer security situation with analysts from Forrester, the Lakewest Group and the Retail Systems Alert Group this week during StorefrontBacktalk's Week In Review audiocast. To listen to the small retail security discussion, please click here.