{"id":28465,"date":"2016-10-11T04:00:00","date_gmt":"2016-10-11T08:00:00","guid":{"rendered":"https:\/\/goebt.com\/https-blog-cdesolutions-com-2016-10-connected-culture-managing-risk-at-the-point-of-sale\/"},"modified":"2025-04-02T14:54:55","modified_gmt":"2025-04-02T18:54:55","slug":"connected-culture-managing-risk-at-the-point-of-sale","status":"publish","type":"post","link":"https:\/\/goebt.com\/connected-culture-managing-risk-at-the-point-of-sale\/","title":{"rendered":"Connected Culture: Managing Risk at the Point of Sale"},"content":{"rendered":"<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" style=\"\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><\/p>\n<p><span style=\"font-weight: 400;\"><em><strong>The payments industry is evolving at an incredible rate of speed. Social media and online accessibility have revolutionized the way consumers and businesses interact.<\/strong><\/em> In our connected culture, it\u2019s crucial to understand the ever-changing data security challenges merchants face. Adhering to protocols such as EMV and PCI are a start, but compliance alone is not enough to keep your merchants secure. You need to understand your merchants\u2019 vulnerabilities, so that you can develop effective strategies to maintain data integrity. <\/span><\/p>\n<p> <!--more--><\/p>\n<p><strong>Challenges for the Mobile Market<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Consumers expect the convenience of electronic payments in nearly every part of daily life. Manufacturers have responded with innovative mobile payment technologies, from simple encrypted card swipe readers to NFC-enabled devices. Now merchants of all sizes and settings can offer card payments. In 2015, mobile payments topped 8.7 billion dollars in the US alone, and that number is expected to triple in 2016.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mobile payments are convenient for both consumers and merchants. Smartphone and tablet-based payments are designed to be especially easy to setup and use. However, this user-friendly approach can lead to potential risks for merchants. Because electronic transactions are part of everyday life, it\u2019s easy to become complacent about data security. Without proper training, mobile merchants, just like the general population, may approach security too casually. <\/span><\/p>\n<p><strong>Prevent Malware Infections<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Some merchants use their smartphone or tablet for both personal and professional needs. It\u2019s a priority to make these merchants aware of how to protect their devices from malicious apps or other sources of malware. The most useful steps for security are also the most obvious: make sure to download operating system updates, download secure apps, never open unknown email attachments, and transmit data only over secure networks. These steps may seem like common sense, but it\u2019s vitally important to reinforce them. &nbsp;<\/span><\/p>\n<p><strong>Avoid Hacker Attacks<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Nearly every week, we hear about large-scale hacker attacks. Home Depot, Target, and Wendy\u2019s have been hit. And just last week, HEI Hotel group, parent of Hyatt, Marriott and several more upscale brands, uncovered malware lurking in its POS terminals for over a year. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">With EMV and PCI compliance standards, it seems like consumer data ought to be nearly impenetrable. So why, then, do we hear about so many breaches? Manufacturers aren\u2019t asleep at the wheel, and neither are industry security watchdogs. Security protocols are continually being improved and implemented, and yet the problem remains.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The weak link is often human error. Hackers are good at figuring out new ways to steal data. And they\u2019ve learned that social engineering attacks are easy, effective, and hard to detect. With social engineering attacks, hackers don\u2019t have to work on defeating encryption; they simply bypass the controls. &nbsp;By convincing an employee to download an official-seeming file, hackers can install malware to access a wealth of customer data. And it can take weeks or months for businesses to find the leak.<\/span><\/p>\n<p><strong>Keep Your Merchants Secure<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The good news is that there is actually quite a bit you can do to protect your merchants. With right practices, you can maintain a secure processing environment at the point of sale. Of course, the first step is to follow the strictest security protocols in software and equipment provided to merchants. But the second half of the equation is merchant training. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because human error is the cause of many payment security breaches, it\u2019s crucial to educate your merchants. There is no substitute for thorough training, followed by ongoing support and training. Merchant boarding is the ideal opportunity to begin this process. <\/span><\/p>\n<p><strong>How CDE Can Help<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">CDE Services provides comprehensive merchant boarding, tailored to the needs of your particular merchant base. We believe that if you educate your merchants well from the start, and continue to provide ongoing support, you can prevent many opportunities for security breaches. We realize the importance of education during initial merchant training, and we combine that training with ongoing call center support. In our next article, we\u2019ll talk more about how CDE\u2019s unique boarding and training process can benefit your merchant base.<\/span><br \/> <span style=\"font-weight: 400;\">Our connected culture brings new risks to the payments industry, but also amazing potential. There\u2019s no need to limit your business or your merchants by avoiding innovation. With a combined program of security compliance and merchant training, your merchants will continue to thrive in our ever-changing payments industry. <\/span><\/p>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The payments industry is evolving at an incredible rate of speed. Social media and online accessibility have revolutionized the way consumers and businesses interact. In our connected culture, it\u2019s crucial to understand the ever-changing data security challenges merchants face. Adhering to protocols such as EMV and PCI are a start, but compliance alone is not [&hellip;]<\/p>\n","protected":false},"author":244,"featured_media":28466,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1],"tags":[227,205,218,217],"class_list":["post-28465","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-important-announcement","tag-best-practices","tag-industry-news","tag-security","tag-technology"],"_links":{"self":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/28465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/users\/244"}],"replies":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/comments?post=28465"}],"version-history":[{"count":1,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/28465\/revisions"}],"predecessor-version":[{"id":31260,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/28465\/revisions\/31260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/media\/28466"}],"wp:attachment":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/media?parent=28465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/categories?post=28465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/tags?post=28465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}