NCR Counterpoint Blog

After the Equifax Breach: Counterpoint and Your Security

Posted by Weaver Ellard on Nov 3, 2017 11:00:00 AM

Talk of the Equifax breach has dominated headlines, blog posts, and dinner table conversations over the last few weeks. According to a post on the Federal Trade Commission website, hundreds of thousands of people’s names, Social Security numbers, dates of birth, addresses, credit card numbers, and, in some cases, driver’s license numbers were compromised in one of the largest data breaches in history. This has inspired small-to-medium businesses to take extra precautions in securing their own data, but many still feel overwhelmed and under-prepared.

Read More

Topics: Security, Counterpoint, POS, equifax, Firewall, SecurePOS

How Secure Is Your Mobile POS?

Posted by Kendall Reed on Jun 28, 2016 9:00:43 AM

Despite the many benefits a point of sale (POS) system offers your business, you may need to take some additional measures to ensure point of sale security. Here are a few simple ways to confirm that your POS and mobile payment solutions are indeed secure.

Read More

Topics: Security

The 3 Key Components of Payment Security for Retailers

Posted by Kendall Reed on Jul 22, 2015 1:25:00 PM

Data encryption, EMV, credit card storage, payment security threats…as retailer, we hear these words all the time but what do they mean and how do they affect us? With the threat of credit card breaches looming over the industry, navigating through the different credit card security features can be overwhelming. Below we’ll outline the top three components that can help you protect your business and your shopper’s card data. 

Read More

Topics: Security, EMV

EMV Myths Debunked: Myths 8 - 10

Posted by Kendall Reed on Jun 15, 2015 10:00:00 AM



On October 1, 2015, a liability shift is occurring as it relates to who is responsible for paying for chargebacks for counterfeit cards that are used at a retail store. Between the bank that issued the credit card, the retail store and the payment processor, whoever is least prepared to accept EMV-enabled payment cards will now be responsible to pay for the chargebacks. 

In this blog post series, we'll help make you aware of common EMV myths and help you stay in control of when and how you want to implement EMV in your store.

Read More

Topics: Security, EMV

EMV Myths Debunked: Myths 4 - 7

Posted by Kendall Reed on Jun 11, 2015 10:00:00 AM



On October 1, 2015, a liability shift is occurring as it relates to who is responsible for paying for chargebacks for counterfeit cards that are used at a retail store. Between the bank that issued the credit card, the retail store and the payment processor, whoever is least prepared to accept EMV-enabled payment cards will now be responsible to pay for the chargebacks. 

In this blog post series, we'll help make you aware of common EMV myths and help you stay in control of when and how you want to implement EMV in your store.

Read More

Topics: Security, EMV

EMV Myths Debunked: Myths 1 - 3

Posted by Kendall Reed on Jun 9, 2015 10:00:00 AM

On October 1, 2015, a liability shift is occurring as it relates to who is responsible for paying for chargebacks for counterfeit cards that are used at a retail store. Between the bank that issued the credit card, the retail store and the payment processor, whoever is least prepared to accept EMV-enabled payment cards will now be responsible to pay for the chargebacks. 

In this blog post series, we'll help make you aware of common EMV myths and help you stay in control of when and how you want to implement EMV in your store.

Read More

Topics: Security, EMV

What PCI Level Am I?

Posted by Marilyn Grant on Jun 4, 2015 1:46:00 PM


As retail merchants, we hear daily messages about business security and reducing risks for a credit card  breach. With one of these messages being PCI Compliance, you might as "What PCI Level Am I?"

Making sure your software is PCI compliant is one of the steps you can take to add another security layer onto your store.  Below, we've outlined what validation you'll need based on your store and steps you can take to complete your validation.  

Read More

Topics: Security

Securing Your Network with a Layered Security Approach

Posted by Paul Bishop on Jun 1, 2015 10:27:00 AM

Security and PCI compliance are a concern for everyone doing business today. How can you secure your system while making it harder for unauthorized users to gain access to financial information and perpetrate identity theft? The most important way a network can be secured is using a layered security approach. We'll take you through several steps to help minimize your risk for a security threat. 

 

Read More

Topics: Security