For retail businesses, the POS system is arguably their most important IT system.
This TechRepublic Premium guide, and the accompanying checklist, will help you successfully secure a POS system for your business enterprise.
From the guide:
ACCESS CONTROLS
The first line of defense in any POS system is the control of both physical and network access to the system devices.
All users of a POS system should be required to log in with a unique username and password combination. There should never be shared usernames and passwords. For extra security protection, two-factor authentication protocols should be implemented.
The download comprises a six-page PDF and Word document.
Previously priced at $99, this is now available to download for $9. Or free with Premium annual subscription: click here to find out more.
TIME SAVED: It took 12 hours of writing, editing and research to create this content.