Don’t let thieves use your retail establishment as the center of their operations. Here’s four quick tips from Sage Payment Solutions to give you some guidance from Rob Bertke, senior vice president of research & development
If the Whos Had Been PCI Compliant, The Grinch Wouldn’t Have Stolen Anything – It’s vital as well as required that any business accepting credit or debit cards is Payment Card Industry (PCI) compliant. A very easy way to lose customers is to allow their payment information to be pilfered when shopping at your store or your online website. Maintaining PCI compliance helps plug security holes, plus serves to significantly dampen the effects of a breach.
Your Holiday Cards Don’t Need Encryption, But Your Payment Information Does- Whether your organization is PCI-compliant or not – and hopefully it is — fully encrypting all points of payment is paramount to keeping vital company and customer information from being hacked. End-to-end encryption is the technical term for this practice, and it essentially boils down to scrambling the data sent from one device to another. A company’s mobile payment devices, credit card terminals, software applications, and online payment portals need built-in encryption functionality when transmitting customer information.
You Should Take In All the Holidays Have to Offer – Scammers frequently attempt to tamper with an organization’s credit card terminals in an effort to steal credit card information, often with a small piece of hardware attached to the actual terminal. Alert your employees to this possibility, and remind them to conduct regular visual assessments of all payment processing equipment. While these information-stealing devices can be concealed to look like a piece of the credit card terminal, attentive employees should be able to easily identify extraneous equipment.
Santa Isn’t the Only One Checking a List – Unfortunately, even with the best payment processing security, a breach can still happen. So, you should keep meticulous credit card sales records. If an issue does arise, it’s essential you have a means of retracing your steps in order to determine where the breach occurred, as well as to prevent any further theft. Not only will the ability to work backwards to determine the source of the breach allow your organization to plug any security holes and abate the possibility of additional customer information becoming exposed, but it can also often lead straight to the credit card fraudster.
Latest posts by Ramon Ray (see all)
- Advice from the 2017 SXSW Dell Experience: How to Pitch a Complex Business - March 30, 2017
- The Experience: Dell Showcases the Power of Technology at SXSW 2017 - March 28, 2017
- Accounting Gets Artificial Intelligence: Xero’s New Service - March 16, 2017