The first line of defense in any POS system is the control of both physical and network access to the system devices. All users of a POS system should be required to log in with a unique username and password combination, with the implementation of two-factor authentication for extra security.
When not in use, all POS devices should be physically locked in a safe, separate room, or other difficult-to-access location. Unfettered physical access to POS devices can lead to compromises in security.
Collection
[
|
...
]