Monthly Archives: November 2016

Protecting Your Business (And Your Customers) from a POS Security Breach

Day after day, POS software companies are developing an increasing number of options to better protect and serve customers.

Though hackers are always innovating, there are steps you can take to protect your data and your customers.

By utilizing the tips mentioned in this article, you can work against these hackers and better serve your clientele.

1. Utilize End-to-End Encryption

Encryption is one of the most powerful security tools you can have at your disposal. Recently, Hewlett Packard Enterprise Security teamed up with Ingenico to create a product that will protect customer data from the most common cyber attacks.

So how does end-to-end encryption help keep your customers’ data safe?

Most malware is designed to steal information the moment a customer swipes their card. By retrieving credit card numbers from a POS machine’s RAM memory, the hacker can gain access to that unencrypted information.

If a company chooses to use end-to-end encryption, however, the credit card information will be protected from malware the moment it is swiped.

In other words, this process “locks” the customer’s payment info from beginning to end.

Since hackers are continuously working to better their own techniques, end-to-end encryption is a method of protection that prevents attacks and eliminates the vast majority of system vulnerabilities.

In an effort to offer even more security, businesses can also employ techniques such as “tokenization,” which work to store card information under digital alternatives within the company’s system.

2. Increase Monitoring

All too often, the only security put into place within a business’ system is an easily guessable password. Hackers have developed an array of tools to crack passwords, which can then be used to gain access to financial information.

By employing additional security precautions you can help prevent a data breach. Some of the most common methods are the following:

  • Anti-Virus Software
  • Firewalls
  • Two-Way Authentication

While utilizing these suggestions is a start, the most beneficial way of protecting your system is by monitoring all payment activity. As a business owner, it is your responsibility to look for suspicious activity or vulnerabilities at every computer and POS machine in your establishment.

Companies like Netsurion have begun offering security solutions such as these to small- and medium-sized businesses.

3. Test Your Procedures

Once you’ve decided to employ end-to-end encryption – or put into place security measures and monitoring techniques to work against cyber attacks – you need to make sure that they’re working efficiently.

Testing will help you find inconsistencies or missteps that could lead to a data breach.

If you have the budget, consider hiring a security specialist to test your POS system’s security measures. Since a POS product may be installed by a third-party provider who may not specialize in security, this simple step can help you and your customers stay safe.