SlideShare a Scribd company logo
1 of 2
Download to read offline
SecuringSales
InRetail
Safeguarding Your
Point-Of-Sale System
IfyoususpectyourPOSsystemhasbeen
compromised,contactthenearestlocal
SecretServiceFieldOfficeorplease
visittheU.S.SecretServicewebsiteat
http://www.secretservice.govformore
detailsandacompletelistofresources.
U.S. Department of
Homeland Security
United States
Secret Service
U.S. Department of
Homeland Security
United States
Secret Service
die cut for business card!
UseAntivirus
Cyber Criminals may
attempt to attack
a POS system by
installing malicious
software which allows
them access to the
network. Antivirus works
by recognizing software
that fits its definition of being
malicious, and attempts to
restrict its access to a system.
Antivirus must be updated
continually for it to be effective on a
POS network.
RestrictAccesstoInternet
Computers used in a POS system must not be used for
general surfing on the internet. Restrict access to POS system
computers or terminals to prevent users from accidentally
exposing the POS system to security threats. POS systems
should be utilized online to conduct POS related activities
only.
DisallowRemoteAccess
Remote access allows a user to log into a system as an
authorized user without being physically present. This
feature is often used by POS system installers to allow them
to remotely service POS systems. Cyber Criminals exploit
remote access configurations on POS systems to gain access
to these networks. Disallow remote access to the POS
network at all times.
UseStrongPasswords
Many business owners mistakenly rely on the POS
system vendor handling the installation to provide the
necessary security for their systems. For simplicity,
many POS system installers utilize the default passwords
on POS systems which can be easily obtained online
by Cyber Criminals. Business owners must change
passwords to their POS system on a regular basis, using
unique account names and complex passwords.
UpdatePOSSoftwareApplications
Ensure that POS software applications are using the
latest updated software applications. This is similar to
a computer running antivirus software. A computer is
vulnerable to malware attacks when required updates are
not downloaded and installed on a timely basis. Similarly,
if one does not update (patch) POS software applications,
it leaves the system vulnerable to criminals who seek to
exploit known software design flaws.
Installafirewall
To protect a POS system from outside attacks, a firewall
should be installed. A firewall is a software or hardware
device that prevents unauthorized access to or from
a private network. It screens-out traffic from hackers,
viruses, worms, or other malware, specifically designed
to compromise a POS system. Firewalls provide security
to POS systems that may be operating in an unsecure
environment (i.e. the internet). It acts as the “first line of
defense” against hackers or those wishing to compromise
the security of your POS system.
Point-Of-Sale
Point-Of-Sale (POS) is a term used for all applicable
retail, store, checkout, or cashier systems that process
the electronic transfer of payments (i.e. credit cards/
debit cards) for goods or services.
The POS hardware may include cash registers, receipt
printers, touch-screen displays, barcode scanners,
scales, and credit card swiping devices that interface
with an online computer system to process credit card
payment information.
This design is extremely efficient for both the retailer
and the customer, but can quickly become a liability, if
the following safe practices are not followed:

More Related Content

More from - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 

Securing Sales in Retail: Safeguarding Your Point-of-Sale System

  • 2. UseAntivirus Cyber Criminals may attempt to attack a POS system by installing malicious software which allows them access to the network. Antivirus works by recognizing software that fits its definition of being malicious, and attempts to restrict its access to a system. Antivirus must be updated continually for it to be effective on a POS network. RestrictAccesstoInternet Computers used in a POS system must not be used for general surfing on the internet. Restrict access to POS system computers or terminals to prevent users from accidentally exposing the POS system to security threats. POS systems should be utilized online to conduct POS related activities only. DisallowRemoteAccess Remote access allows a user to log into a system as an authorized user without being physically present. This feature is often used by POS system installers to allow them to remotely service POS systems. Cyber Criminals exploit remote access configurations on POS systems to gain access to these networks. Disallow remote access to the POS network at all times. UseStrongPasswords Many business owners mistakenly rely on the POS system vendor handling the installation to provide the necessary security for their systems. For simplicity, many POS system installers utilize the default passwords on POS systems which can be easily obtained online by Cyber Criminals. Business owners must change passwords to their POS system on a regular basis, using unique account names and complex passwords. UpdatePOSSoftwareApplications Ensure that POS software applications are using the latest updated software applications. This is similar to a computer running antivirus software. A computer is vulnerable to malware attacks when required updates are not downloaded and installed on a timely basis. Similarly, if one does not update (patch) POS software applications, it leaves the system vulnerable to criminals who seek to exploit known software design flaws. Installafirewall To protect a POS system from outside attacks, a firewall should be installed. A firewall is a software or hardware device that prevents unauthorized access to or from a private network. It screens-out traffic from hackers, viruses, worms, or other malware, specifically designed to compromise a POS system. Firewalls provide security to POS systems that may be operating in an unsecure environment (i.e. the internet). It acts as the “first line of defense” against hackers or those wishing to compromise the security of your POS system. Point-Of-Sale Point-Of-Sale (POS) is a term used for all applicable retail, store, checkout, or cashier systems that process the electronic transfer of payments (i.e. credit cards/ debit cards) for goods or services. The POS hardware may include cash registers, receipt printers, touch-screen displays, barcode scanners, scales, and credit card swiping devices that interface with an online computer system to process credit card payment information. This design is extremely efficient for both the retailer and the customer, but can quickly become a liability, if the following safe practices are not followed: