Welcome!

News Feed Item

Time After Time Takes Action to Contain and Remedy Unauthorized Access to Payment Card Data

PHILADELPHIA, Aug 1, 2014 /PRNewswire/ -- On June 12, 2014, Time After Time was asked to investigate potential unauthorized access to the payment processing system at our Montgomery store.  In response, we immediately replaced the servers in that store and engaged a leading computer security company to examine the replaced servers. After signs of unauthorized access were found, we expanded the investigation to all of our stores. During the investigation, we worked with the forensic firm to implement enhanced security measures across all of our stores.

Now that the investigation is complete, we have determined that only credit and debit card transactions made in three of our stores during the following time frames were potentially affected:  (1) Montgomery:  January 28, 2014June 15, 2014; (2) Cherry Hill:  January 28, 2014July 18, 2014; and (3) Bridgewater Falls:  January 28, 2014 to July 18, 2014.  Please note that the investigation did not find any actual evidence of unauthorized access at Montgomery after June 12, Cherry Hill after April 30, and Bridgewater Falls after April 4.  However, we do not have enough evidence available to conclusively rule out the possibility of unauthorized access until the servers were replaced on June 15 at Montgomery and enhanced security measures were implemented across all other stores, including Cherry Hill and Bridgewater Falls, on July 18, 2014. Transactions made after June 15, 2014 at Montgomery and July 18, 2014 at our Cherry Hill and Bridgewater Falls stores were not affected.  Also, transactions at all of our other stores were not affected. 

For transactions at the Montgomery, Cherry Hill, and Bridgewater Falls stores during the dates listed, we believe that the unauthorized person may have used malware to obtain information from the magnetic stripe on the back of payment cards swiped in the store, which contains the card account number, expiration date, card verification number and in some cases the cardholder's name.

Because we cannot identify which specific cards or information was actually taken, we are notifying our customers whose cards were used during the listed time frame at each impacted store.  We do not have sufficient information to identify the name or address of the affected customers, and therefore, cannot mail letters to them. 

If you used your card in one of these three stores during the times listed and see a fraudulent charge on your card, please immediately contact the bank that issued your card.  Major credit card companies typically guarantee that cardholders will not be responsible for fraudulent charges. Please be on the lookout and review your account statements for any unauthorized activity.

We regret any inconvenience this may cause.  Keeping customer information secure is a top priority at Time After Time and we will continue to work to make our network more secure.  If you have questions, please call us toll free at 800-572-0986, Monday through Friday, 9:00 a.m. to 9:00 p.m. EST.

SOURCE Time After Time

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
"We were founded in 2003 and the way we were founded was about good backup and good disaster recovery for our clients, and for the last 20 years we've been pretty consistent with that," noted Marc Malafronte, Territory Manager at StorageCraft, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Announcing Poland #DigitalTransformation Pavilion
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...