Point of Sale Security Guide and Checklist
For retail businesses, the POS system is arguably their most important IT system.
This TechRepublic Premium guide, and the accompanying checklist, will help you successfully secure a POS system for your business enterprise.
From the guide:
ACCESS CONTROLS
The first line of defense in any POS system is the control of both physical and network access to the system devices.
All users of a POS system should be required to log in with a unique username and password combination. There should never be shared usernames and passwords. For extra security protection, two-factor authentication protocols should be implemented.
The download comprises a six-page PDF, Word document and spreadsheet.
Previously priced at $99, this is now available to download for $9. Or free with Premium annual subscription: click here to find out more.
TIME SAVED: It took 12 hours of writing, editing and research to create this content.
Resource Details
* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.
* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.