Merchant Warehouse, a provider of merchant accounts and credit card processing solutions, has a plan to keep shoppers' personal and financial information safe and secure this holiday season.
 
Protecting customer data starts with the IT and physical security practitioners, but restaurant and other retail operators should include a checklist for cashiers on the front line. Here are a few tips from the industry experts to keep consumers safe this shopping season:
 
Make sure the security software is on. Ensure all systems that access the Internet are protected with anti-malware technology.
 
Knowledge is power. Conduct awareness training. Awareness of common techniques and an understanding of how to identify malicious content can go a long way toward proactive prevention.
 
Monitor the networks. Comprehensive monitoring of both the network and the client will help you trend threats, identify weakness in your existing enterprise and if necessary, give you the tools to identify and contain a breach if one occurs.
 
Segment the networks. If you're a merchant bound by the requirements of the PCI security standard, you should be doing this anyway. The idea is to make it so hackers can't access the goods, even if they manage to break into another part of the network.
 
Bad things in store for those who store. Another basic requirement of PCI security is that companies store as little card holder data after transactions as possible. The more that's stored, the more damage companies and customers can suffer at the hands of data thieves.
 
Encrypt it. Verify that your company has an encrypted card reader to ensure PCI compliance and, more importantly, to ensure the bad guys can't use what they steal.
As Ronald Reagan used to say, "Trust but verify." Ensure address verification system and card verification values match (i.e. 3 or 4 digit in signature panel).
 
Verify signature block. Sure, cashiers get overwhelmed when there's a long line of impatient people in front of them. But an important part of stopping credit card fraud is to check the signature block, particularly if the signature is worn out.
 
PIN the tail on the transaction. As a rule, PIN debit transactions are more secure (and typically cheaper) than signature-based transactions.

Related Content

User Comments – Give us your opinion!
Products & Services

Features

http://global.networldalliance.com/new/images/products/4541.png

4541/Features

DriverAdvisor Fleet Monitoring

http://global.networldalliance.com/new/images/products/DriverAdvisor_iix.gif

1425/DriverAdvisor-Fleet-Monitoring

Restaurant Sales Builder

http://global.networldalliance.com/new/images/products/4286.png

4286/Restaurant-Sales-Builder

DriverSafe

http://global.networldalliance.com/new/images/products/keyboard_iix.gif

1424/DriverSafe

Self Serve iPad Ordering

http://global.networldalliance.com/new/images/products/5605.png

5605/Self-Serve-iPad-Ordering

Food Cost Management

http://global.networldalliance.com/new/images/products/6401.png

6401/Food-Cost-Management

Leapfrog POS App

http://global.networldalliance.com/new/images/products/4559.png

4559/Leapfrog-POS-App

FireFly Point-of-Sale

http://global.networldalliance.com/new/images/products/4282.png

4282/FireFly-Point-of-Sale

AquaCafe

http://global.networldalliance.com/new/images/products/6965.png

6965/AquaCafe

Distribution RFP’s & RFQ’s

http://global.networldalliance.com/new/images/products/6411.png

6411/Distribution-RFP-s-RFQ-s

Fast Casual Executive Summit
Request Information From Suppliers
Save time looking for suppliers. Complete this form to submit a Request for Information to our entire network of partners.