|By PR Newswire||
|August 1, 2014 09:32 PM EDT||
PHILADELPHIA, Aug 1, 2014 /PRNewswire/ -- On June 12, 2014, Time After Time was asked to investigate potential unauthorized access to the payment processing system at our Montgomery store. In response, we immediately replaced the servers in that store and engaged a leading computer security company to examine the replaced servers. After signs of unauthorized access were found, we expanded the investigation to all of our stores. During the investigation, we worked with the forensic firm to implement enhanced security measures across all of our stores.
Now that the investigation is complete, we have determined that only credit and debit card transactions made in three of our stores during the following time frames were potentially affected: (1) Montgomery: January 28, 2014 – June 15, 2014; (2) Cherry Hill: January 28, 2014 – July 18, 2014; and (3) Bridgewater Falls: January 28, 2014 to July 18, 2014. Please note that the investigation did not find any actual evidence of unauthorized access at Montgomery after June 12, Cherry Hill after April 30, and Bridgewater Falls after April 4. However, we do not have enough evidence available to conclusively rule out the possibility of unauthorized access until the servers were replaced on June 15 at Montgomery and enhanced security measures were implemented across all other stores, including Cherry Hill and Bridgewater Falls, on July 18, 2014. Transactions made after June 15, 2014 at Montgomery and July 18, 2014 at our Cherry Hill and Bridgewater Falls stores were not affected. Also, transactions at all of our other stores were not affected.
For transactions at the Montgomery, Cherry Hill, and Bridgewater Falls stores during the dates listed, we believe that the unauthorized person may have used malware to obtain information from the magnetic stripe on the back of payment cards swiped in the store, which contains the card account number, expiration date, card verification number and in some cases the cardholder's name.
Because we cannot identify which specific cards or information was actually taken, we are notifying our customers whose cards were used during the listed time frame at each impacted store. We do not have sufficient information to identify the name or address of the affected customers, and therefore, cannot mail letters to them.
If you used your card in one of these three stores during the times listed and see a fraudulent charge on your card, please immediately contact the bank that issued your card. Major credit card companies typically guarantee that cardholders will not be responsible for fraudulent charges. Please be on the lookout and review your account statements for any unauthorized activity.
We regret any inconvenience this may cause. Keeping customer information secure is a top priority at Time After Time and we will continue to work to make our network more secure. If you have questions, please call us toll free at 800-572-0986, Monday through Friday, 9:00 a.m. to 9:00 p.m. EST.
SOURCE Time After Time
Oct. 27, 2016 11:00 AM EDT Reads: 139
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
Oct. 27, 2016 11:00 AM EDT Reads: 3,045
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Oct. 27, 2016 11:00 AM EDT Reads: 2,081
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Oct. 27, 2016 11:00 AM EDT Reads: 1,136
Oct. 27, 2016 10:30 AM EDT Reads: 2,074
Oct. 27, 2016 10:30 AM EDT Reads: 16,633
Oct. 27, 2016 10:15 AM EDT Reads: 2,025
Oct. 27, 2016 10:15 AM EDT Reads: 3,198
Oct. 27, 2016 10:15 AM EDT Reads: 1,397
Oct. 27, 2016 09:15 AM EDT Reads: 2,156
Oct. 27, 2016 09:00 AM EDT Reads: 2,048
Oct. 27, 2016 08:45 AM EDT Reads: 11,585
Oct. 27, 2016 08:15 AM EDT Reads: 523
Oct. 27, 2016 07:45 AM EDT Reads: 523
Oct. 27, 2016 07:30 AM EDT Reads: 1,952