After the Equifax Breach, Advice From  Counterpoint Regarding Security


Given all the recent security scares, we wanted to share this informative blog from NCR Counterpoint regarding security and your point of sale system:


After the Equifax Breach: Counterpoint and Your Security

Talk of the Equifax breach has dominated headlines, blog posts, and dinner table conversations over the last few weeks. According to a post on the Federal Trade Commission website, hundreds of thousands of people’s names, Social Security numbers, dates of birth, addresses, credit card numbers, and, in some cases, driver’s license numbers were compromised in one of the largest data breaches in history. This has inspired small-to-medium businesses to take extra precautions in securing their own data, but many still feel overwhelmed and under-prepared.

As a leader within your business, you know that keeping your customers’ information safe is paramount to your success - Inc. reports that 40% of companies that lost customers following a breach saw the departure of more than a fifth of their base. As the technologies we depend on on a daily basis continue to advance, the ways we do business digitally continue to increase, making the world far more interconnected than it has ever been. With this new convenience, flexibility, and choice comes the responsibility to also protect sensitive consumer data. This can be a daunting task when you’re already wearing many hats in running your business, but Counterpoint can help.

As a part of  NCR, a leader in technology and omni-channel solutions, Counterpoint offers solutions to help retailers thrive in an increasingly digital world and navigate the complexities of a shifting industry landscape. This includes providing enterprise-quality security capabilities to maintain the trust and peace of mind your shoppers expect. .

Below, we outline some basic steps to improving security:

  1. Your Firewall
    This is the first and most basic setup for security, and it cannot be overlooked.
  2. Anti Virus Software
    Like the firewall, this may seem obvious, but you’d be surprised how easily this important step is overlooked!
  3. Whitelisting
    Now that you’ve locked down your perimeter it’s time to let trusted applications back in.
  4. Password Best Practices
    Network administrators are insistent about using complex passwords and changing them regularly, and there’s a good reason why! Read Google’s post about secure passwords for great tips on creating and managing passwords.
  5. Network Segmenting
    This involves splitting your system into sub-networks. As it relates to security best practices, it means keeping your Wi-Fi separate from the POS segment of your network.
  6. Security of Other Tools within your System
    Locking down your system will only go so far if the remote access tools that system administrators use are vulnerable. Analyze each point of entry into your system to insure your and your customers’ information stays secure.

Want to learn more about Counterpoint’s Security Features?

Skurla's Point of Sale Solutions is your local NCR Counterpoint Reseller, and we are here to help you with your security concerns.

Please call us at 907-243-2683, or fill out the form below:

Contact our Customer Support Department


About The Author

Lynn literally grew up in the point of sale and cash register industry – and is now at the helm of the family business. She enjoys working with local Alaskan businesses, especially restaurants, grocery stores, and retail operations - helping them control costs and increase revenues through well managed point of sale solutions. Besides running the company, Lynn has also served on the Board of Directors, and as Chairman of the Board, for the Retail Solutions Provider Association.