Point of Sale Security Guide and Checklist

For retail businesses, the POS system is arguably their most important IT system.

This TechRepublic Premium guide, and the accompanying checklist, will help you successfully secure a POS system for your business enterprise.

From the guide:

ACCESS CONTROLS

The first line of defense in any POS system is the control of both physical and network access to the system devices.

All users of a POS system should be required to log in with a unique username and password combination. There should never be shared usernames and passwords. For extra security protection, two-factor authentication protocols should be implemented.

The download comprises a six-page PDF, Word document and spreadsheet.

Previously priced at $99, this is now available to download for $9. Or free with Premium annual subscription: click here to find out more.

TIME SAVED: It took 12 hours of writing, editing and research to create this content.

Subscribe to the TechRepublic Premium Exclusives Newsletter

Save time with the latest TechRepublic Premium downloads, including customizable IT & HR policy templates, glossaries, hiring kits, features, event coverage, and more. Exclusively for you! Delivered Tuesdays and Thursdays.

Subscribe to the TechRepublic Premium Exclusives Newsletter

Save time with the latest TechRepublic Premium downloads, including customizable IT & HR policy templates, glossaries, hiring kits, features, event coverage, and more. Exclusively for you! Delivered Tuesdays and Thursdays.

Resource Details

or

* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.

Provided by:
TechRepublic Premium
Published:
September 24, 2023
Topic:
TechRepublic Premium
Format:
PDF
or

* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.