Point-of-Sale System Breaches: Threats to the Retail and Hospitality Industries

"Point-of-sale (PoS) systems have been around in one form or another for decades. Businesses in the retail and hospitality industries use these systems not only to accept payment, but to provide other operational information such as accounting, sales tracking, and inventory management.

From a security perspective, the most immediate risk to businesses and customers lies in accepting payments. The information customers hand over, if captured, can be used by cybercriminals to commit credit card fraud. Risk of exposure is the primary reason why the Payment Card Industry Security Standards Council (PCISCC) has established data security standards for organizations that handle the information of credit, debit, and ATM cardholders."

Spotlight

itWatch

itWatch is the world leader in secure device management. Therefore itWatch promotes IT security in Germany as the it-sa platinum sponsor and first it-sa Charity Member.itWatch stands for innovative software products with a focus on Endpoint Security and added value in IT operations. When developing our products, the cost of the customer is in the foreground. Before the reaction is carried out a detailed analysis of the client's interests, the quantity structures and business processes. The itWatch products always support the already established customer processes.

OTHER WHITEPAPERS
news image

Revolutionizing cybersecurity

whitePaper | October 31, 2021

FINX, a platform established since 2018 that is enabled by blockchain technology to create the world’s 1st comprehensive decentralized banking platform. FINX aspires to resolve the problem of high banking costs imposed by conventional banks and serve the unbanked market in Southeast Asia.

Read More
news image

File Upload Security: The Missing Category for a Comprehensive Security Posture

whitePaper | December 15, 2022

Applications are the backbone of modern business and must be protected. Yet, most organizations have an underserved attack vector — malicious files uploaded to their custom business applications. If internal, external, or third-party files contain malware, they pose a large risk as they traverse through an organization and are stored in local or cloud repositories. Public file sharing platforms are another area where malicious file uploads can cause widespread damage.

Read More
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

Security and Privacy White Paper

whitePaper | October 31, 2022

As cloud-based software solutions become prominent, discussions continue to revolve around security. When organizations implement a cloud-based solution, they put their trust in the solution provider to protect their data and deliver a secure platform.

Read More
news image

Cyber Threat Predictions for 2023

whitePaper | November 3, 2022

While “less is more” is the critical strategy behind consolidating networks and security, “more is more” seems to be the mantra cybercriminals continue to live by. The most troubling trend we’ve observed across the cyber landscape is one we see continuing into the future—that threats of all kinds are becoming increasingly ubiquitous. From Ransomware-as-a-Service (RaaS) to new attacks on nontraditional targets like edge devices to the emerging use of wipers, the volume and variety of cyberthreats will keep security teams on their toes in 2023 and beyond.

Read More
news image

Citrix Cloud Services Data Protection Overview

whitePaper | September 29, 2022

Citrix understands that data protection is one of the top priorities for our customers when selecting a cloud service. Data protection is also a rapidly-evolving domain and requires enterprises to assess more information over time about the data handling practices of their vendors.

Read More

Spotlight

itWatch

itWatch is the world leader in secure device management. Therefore itWatch promotes IT security in Germany as the it-sa platinum sponsor and first it-sa Charity Member.itWatch stands for innovative software products with a focus on Endpoint Security and added value in IT operations. When developing our products, the cost of the customer is in the foreground. Before the reaction is carried out a detailed analysis of the client's interests, the quantity structures and business processes. The itWatch products always support the already established customer processes.

Events