4 features every mobile POS system should possess
Four prerequisites for any POS provider evaluating a payments solution.
Protecting mobile POS
As cybercrime continues to plague the retail sector, POS developers need to be aware of the gravest threats they face and how to best defend themselves.
QIR certification: What’s required and why it matters
Why is QIR qualification so important for both merchants and POS providers?
Can you defend your POS systems against advanced persistent threats?
Advanced persistent threats are putting your POS environments – and the extremely valuable information within those systems – at risk. Is there a way to defend against them?
POS Security is a growing priority for retailers in 2016
Many of the data breaches we’ve seen in the past years could have been avoided, as errors, poor integration and a lack of experience with these matters so commonly cause the events, or at least open the door for them to occur.
Protection moves to center of payment processing discussion
In the past year or so, health care providers have been by and large the most widely discussed entities when it comes to IT security and data breach prevention, as hackers hit this industry far more frequently in that time frame than in the past.
POS security breaches still a problem in post-EMV world
The number of breaches and instances of fraud should begin to improve as the EMV protocol takes over and fewer cards use the old, magnetic strip technology. But retailers should still be ready and vigilant about their systems and the ways they are protected.
Extremely complex POS malware identified
Now that the holiday shopping season is in full force, some cybersecurity experts are warning of a new – and nearly undetectable – piece of malware that’s potentially infecting point-of-sale systems around the country.
Three steps to beef up your point of sale security
No amount of extra security staff or technology can prevent a cybercriminal from attempting to breach a point of sale system for the treasure trove of customer data that it holds, but with a few simple steps retailers can make it much harder on hackers.
A three-pronged approach to data security at the Point of Sale
EMV is a great start, but point to point encryption and tokenization should also be utilized to protect in-transit card data.