• Services
    • Technical Services
    • Cloud & Data Centers
    • Internet Access
    • Internet Security
  • Cities
    • City of Industry
    • City of Commerce
    • Los Angeles
    • Santa Fe Springs
  • Promotions
  • Customer portal
  • Global IT Home
  • Services
    • Technical Services
    • Cloud & Data Centers
    • Internet Access
    • Internet Security
  • Cities
    • City of Industry
    • City of Commerce
    • Los Angeles
    • Santa Fe Springs
  • Promotions
  • Customer portal
  • Global IT Home
info.globalit.com / Computer Security / Best Practices for Cash Register and PoS Security

Best Practices for Cash Register and PoS Security

08/18/2014Tony Rare1 CommentComputer Security, Internet Security, IT Services

image_galleryBest Practices for Cash Register and PoS Security

Security policies should be implemented for all aspects of a network from top to bottom. Here you will find the best network security practices for cash registers and POS systems. While not all the policies listed below may be necessary, it is recommended that you properly understand all network vulnerabilities and implement a series of policies based on potential exposure.

  • Implement hardware-based point-to-point encryption. It is recommended that EMV-enabled PIN entry devices or other credit-only accepting devices have Secure Reading and Exchange of Data (SRED) capabilities. SRED-approved devices can be found at the Payment Card Industry Security Standards website.
  • Install Payment Application Data Security Standard-compliant payment applications.
  • Deploy the latest version of an operating system and ensure it is up to date with security patches, anti-virus software, file integrity monitoring, and a host-based intrusion-detection system.
  • Assign a strong password to security solutions to prevent application modification. Use two-factor authentication (2FA) where feasible.
  • Perform a binary or checksum comparison to ensure unauthorized files are not installed.
  • Ensure any automatic updates from third parties are validated. This means performing a checksum comparison on the updates prior to deploying them on PoS systems. It is recommended that merchants work with their PoS vendors to obtain signatures and hash values to perform this checksum validation.
  • Segregate payment processing networks from other networks.
  • Disable unnecessary ports and services, null sessions, default users, and guests.
  • Enable logging of events and make sure there is a process to monitor logs on a daily basis.
  • Implement least privileges and ACLs on users and applications on the system.

Resources: US-CERT – Department of Homeland Security

See related links:

Backoff Point-of-Sale Malware US-CERT Alert (TA14-212A)

Best Network Security Practices for Merchant Processing

 

Leave a reply

Cancel reply

Your email address will not be published. Required fields are marked *

Prev Post
Next Post
Facebook X-twitter Yelp Instagram Linkedin
  • Technical Services
  • Cloud & Data Centers
  • Internet Access
  • Internet Security
  • Global IT Home
  • Technical Services
  • Cloud & Data Centers
  • Internet Access
  • Internet Security
  • Global IT Home

© 2025 Global IT™ All Rights Reserved with Trademark

  • Visit Us – 5150 Wilshire Blvd, Suite 400. Los Angeles, CA 90036
  • Acceptable Use Policy
  • Privacy Policy