Point of Sale Security Guide and Checklist
For retail businesses, the POS system is arguably their most important IT system.
This TechRepublic Premium guide, and the accompanying checklist, will help you successfully secure a POS system for your business enterprise.
From the guide:
The first line of defense in any POS system is the control of both physical and network access to the system devices.
All users of a POS system should be required to log in with a unique username and password combination. There should never be shared usernames and passwords. For extra security protection, two-factor authentication protocols should be implemented.
The download comprises a six-page PDF, Word document and spreadsheet.
Previously priced at $99, this is now available to download for $9. Or free with Premium annual subscription: click here to find out more.
TIME SAVED: It took 12 hours of writing, editing and research to create this content.
Subscribe to the TechRepublic Premium Exclusives Newsletter
Save time with the latest TechRepublic Premium downloads, including original research, customizable IT policy templates, ready-made lunch-and-learn presentations, IT hiring tools, ROI calculators, and more. Exclusively for you! Delivered Tuesdays and Thursdays