NCR Counterpoint Blog

After the Equifax Breach: Counterpoint and Your Security

Posted by Weaver Ellard on Nov 3, 2017 11:00:00 AM

Talk of the Equifax breach has dominated headlines, blog posts, and dinner table conversations over the last few weeks. According to a post on the Federal Trade Commission website, hundreds of thousands of people’s names, Social Security numbers, dates of birth, addresses, credit card numbers, and, in some cases, driver’s license numbers were compromised in one of the largest data breaches in history. This has inspired small-to-medium businesses to take extra precautions in securing their own data, but many still feel overwhelmed and under-prepared.

As a leader within your business, you know that keeping your customers’ information safe is paramount to your success - Inc. reports that 40% of companies that lost customers following a breach saw the departure of more than a fifth of their base. As the technologies we depend on on a daily basis continue to advance, the ways we do business digitally continue to increase, making the world far more interconnected than it has ever been. With this new convenience, flexibility, and choice comes the responsibility to also protect sensitive consumer data. This can be a daunting task when you’re already wearing many hats in running your business, but Counterpoint can help.493802217.jpg

As a part of  NCR, a leader in technology and omni-channel solutions, Counterpoint offers solutions to help retailers thrive in an increasingly digital world and navigate the complexities of a shifting industry landscape. This includes providing enterprise-quality security capabilities to maintain the trust and peace of mind your shoppers expect. .

Below, we outline some basic steps to improving security:

  1. Your Firewall
    This is the first and most basic setup for security, and it cannot be overlooked.
  2. Anti Virus Software
    Like the firewall, this may seem obvious, but you’d be surprised how easily this important step is overlooked!
  3. Whitelisting
    Now that you’ve locked down your perimeter it’s time to let trusted applications back in.
  4. Password Best Practices
    Network administrators are insistent about using complex passwords and changing them regularly, and there’s a good reason why! Read Google’s post about secure passwords for great tips on creating and managing passwords.
  5. Network Segmenting
    This involves splitting your system into sub-networks. As it relates to security best practices, it means keeping your Wi-Fi separate from the POS segment of your network.
  6. Security of Other Tools within your System
    Locking down your system will only go so far if the remote access tools that system administrators use are vulnerable. Analyze each point of entry into your system to insure your and your customers’ information stays secure.

We’re here to support you too; our team can help you confidently keep your POS secure. We work with you to implement security, streamlining processes and automating updates to make it easier for you to manage long-term. And that means you can keep your customers’ information safe today while preparing to defend against new threats tomorrow.

Want to learn more about Counterpoint’s Security Features?

Have more specific questions? Contact a member of our team to find out how Counterpoint can help by making the enjoyment of multiple security levels good for business.

Topics: Security, Counterpoint, POS, equifax, Firewall, SecurePOS