Point of Sale Security Guide and Checklist

For retail businesses, the POS system is arguably their most important IT system.
This TechRepublic Premium guide, and the accompanying checklist, will help you successfully secure a POS system for your business enterprise.

For retail businesses, the POS system is arguably their most important IT system.

This TechRepublic Premium guide, and the accompanying checklist, will help you successfully secure a POS system for your business enterprise.

From the guide:

ACCESS CONTROLS

The first line of defense in any POS system is the control of both physical and network access to the system devices.

All users of a POS system should be required to log in with a unique username and password combination. There should never be shared usernames and passwords. For extra security protection, two-factor authentication protocols should be implemented.

The download comprises a six-page PDF and Word document.

Previously priced at $99, this is now available to download for $9. Or free with Premium annual subscription: click here to find out more.

TIME SAVED: It took 12 hours of writing, editing and research to create this content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.