POS Fraud Prevention

Protecting revenue is vital to your business. The increase in fraudulent payment activity is one of the most critical issues facing business owners today.

There are general methods to help you prevent fraud, as well as more specific tips based on how and where you accept credit card payments.

In addition to our own tips, the individual payment brands may have best practices and guidelines that may benefit your business.

 

Tips to avoid face-to-face fraud

 

Protect your POS equipment

Track your POS hardware and serial numbers; routinely inspect credit card terminals and PIN-entry devices to confirm serial numbers and ensure there are no signs of tampering

Safeguard your POS equipment and the surrounding area

Use secure stands, tethers or security cables to prevent equipment "swaps;" check the retail environment for unauthorized hidden recording devices; install security cameras

Train your staff on POS equipment tampering prevention

Help employees recognize the noticeable signs of equipment tampering; validate all POS equipment service and repair technicians

Work with your vendors to manage your POS equipment

It's important that you alert your third-party contacts of vulnerabilities related to remote access to the POS. You should require your vendor to take steps to secure and maintain your POS systems in accordance with the Payment Card Industry Data Security Standard (PCI DSS). In addition, the following security practices should be implemented to mitigate your risks of fraud from remote access to your POS:

Security practices to mitigate your risks of fraud from remote access to your POS

  1. Disable remote access from the Internet, or turn it on only when necessary.
  2. Only use remote management applications that offer strong security controls.
  3. Use the most current version of a remote access product or service.
  4. Always change the system (or manufacturer) default passwords.
  5. Restrict remote access credentials only to third parties who need access.
  6. Enable data encryption and logging features.
  7. Implement a hardware-based firewall with advanced security features.