Point of Sale Security Guide and Checklist
For retail businesses, the POS system is arguably their most important IT system.
This TechRepublic Premium guide and checklist, created by Mark W. Kaelin, will help you successfully secure a POS system for your business.
-
Featured text from the download:
ACCESS CONTROLS
The first line of defense in any POS system is the control of both physical and network access to the system devices.
All users of a POS system should be required to log in with a unique username and password combination. There should never be shared usernames and passwords. For extra security protection, two-factor authentication protocols should be implemented.
When not in use, all POS devices should be physically locked in a safe, separate room, or other difficult-to-access location. Unfettered physical access to POS devices, even when offline, can lead to compromises in security. Administrative access to POS devices and systems should also be severely limited. If a user does not need administrative rights, they should not have administrative rights.
Improve your POS security with our six-page PDF and spreadsheet. This is available for download at just $9. Alternatively, enjoy complimentary access with a Premium annual subscription.
TIME SAVED: Crafting this content required 14 hours of dedicated writing, editing, research, and design.
Resource Details
* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.
* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.