Guest Column | September 21, 2015

5 Steps To Point Of Sale Device Security

By James Socas, Executive Chairman, iSheriff

Cybercriminals to payment card data are like moths to a flame … they just can’t stay away. 

In spite of large investments in security technology and top notch security personnel, retailers and hospitality firms have an Achilles Heel unique to their business — the point of sale (POS) device. With POS devices handling most of the payment card transactions around the world for retailers, restaurants, hotels and grocers, these systems are squarely in the cross-hairs of today’s cybercriminals. 

Compromised POSs were the source of recent, major data breaches at Target, Neiman Marcus, Subway and many others, and there are no signs that the security risks are slowing down.   

Given today’s growing security threat landscape, it’s a critical time for businesses to examine and enhance POS security capabilities. Taking the following five steps can mitigate your merchant IT clients’ risk of a compromised POS, while still enabling the powerful business benefits of these systems.

Please log in or register below to read the full article.

access the Guest Column!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of VAR Insights? Subscribe today.

Subscribe to VAR Insights X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to VAR Insights