How Software is Making Your POS Secure
2014 has been dubbed the year of the data breach and undoubtedly merchants are looking for ways to better secure their consumers’ data (1). One of the best ways to go about this is to incorporate software into your point-of-sale (POS) to ensure that it, and any information that enters it, is protected. Here are two technologies that can help keep your customers card data and personal information secure.
Merchants want to protect sensitive information and reduce credit card fraud. Point-to-point encryption (P2PE) is a combination of secure devices, applications and processes that encrypt data from the point of interaction (when the card is swiped) until the data reaches the solution provider. The card holder data is encrypted with an algorithm prior to performing an electronic payment transaction, making the data useless and unreadable to a potential theft or anyone without a decryption key. Even if the POS is compromised, the stolen data is useless without this key. The purpose of P2PE is to reduce the risk of the data being intercepted while in motion during the transmission from the POS terminal to the payment processor. With end-to-end encryption, card data are encrypted when the card is swiped at the point-of-sale and not decrypted until the transaction is forwarded to the card networks for settlement.
Tokenization is the replacement of credit card numbers by a random number, or token, helping to reduce the threat of it being accessed. Tokenization along side end-to-end encryption reduces the vulnerability of the data before the transaction is sent and after it arrives at the processor. With tokenization, card numbers can’t be fraudulently used for purchases.
Tokens can either be transaction-based or card-based. Transaction-based tokens refer to individual transactions and card-based tokens refer to individual card numbers and are reused every time the corresponding cards are used. Tokenization is recognized as one of the best ways of securing data in payments. Tokens reduce the number of points where sensitive information is handled and can be exploited. If an attacker manages to gain access to a merchant’s system, only tokens can be stolen, not actual payment information.
In this day and age, it is essential for merchants to advance their data security practices. By using EMV, encryption and tokenization technologies to store and transmit card numbers more safely, you not only protect your POS but also your customers’ sensitive data.
EMV is a registered trademark of EMVCo, an unaffiliated third party that does not endorse or sponsor Vantiv Integrated Payments, LLC.
1 “2014 So Far: The Year of the Data Breach” by Tara Seals. Infosecurity Magazine. Aug. 12, 2014. Web: http://www.infosecurity-magazine.com/news/2014-the-year-of-the-data-breach/
Get An eBook All-Access-Pass
- eBook About POS
- Grow Your Business Guide
- Improve Your Business
- 5 Steps Secure Your Business
Subscribe to our blog and get an all access pass to our past, present, and future eBooks for FREE.
At Your Fingertips
It's a big job to buy the perfect POS System. This is a robust guide to get you equipped to ask all the right questions to potential providers.
With this FREE service we can point you in the direction to providers who can meet your needs, and potentially exceed your expectations.