Infographic: 5 Lessons Learned From Recent Retail Data Breaches

Recent retail data breaches have put a spotlight on the frequency of these incidents. This infographic shows us the lessons learned and what you can do to protect yourself.

Type: Infographic

Sponsor: Vendor Safe Technologies


Webinar: So you think you're ready for mobility? Mobility Payment Trends and Network Security

With a push towards mobility, business owners are capitalizing on wireless technology to provide their customers with new customer loyalty and couponing programs. However, creating a mobile interface for your customers to interact with can create vulnerabilities in your system.

Type: Webinar

Sponsor: Vendor Safe Technologies


Maintaining Customer Trust with Payment Security

Firehouse Subs partners with VendorSafe to help secure customer payment information.

Type: Case Study

Sponsor: Vendor Safe Technologies


The Future of Data Security for Retailers

Learn how to keep legacy POS systems compliant without spending a fortune, what future systems will look like and the benefits of managing a system in-house or outsourcing.

Type: Guide

Sponsor: Vendor Safe Technologies


Webinar: How much is your brand reputation worth? The cost of PCI compliance

PCI is about more than having the necessary hardware for compliance, it's about ensuring your network across all channels of your payment options. And the more time you spend setting up your network up now, the more you can take advantage of the new technologies emerging in the marketplace.

Type: Webinar

Sponsor: Vendor Safe Technologies


Frequently Asked Questions about PCI Compliance

When ensuring PCI compliance, learn what pitfalls to avoid, how to get help when it’s needed and what it takes to develop a culture of security.

Type: Guide

Sponsor: Vendor Safe Technologies


Webinar: Data Security: How PCI Compliance 2.0 will impact your restaurant

In this webinar, sponsored by Vendor Safe Technologies, you will learn: * What is PCI? * Common PCI pitfalls and misconceptions...and how to avoid them. * How recent changes to PCI standards will impact your restaurant operation.

Type: Webinar

Sponsor: Vendor Safe Technologies


WiFi and Mobility in Retail Stores

Understanding how WiFi and Mobility affect a retail network

Type: White Paper

Sponsor: Vendor Safe Technologies


Targeting Small Retailers

Why Mom & Pop Locations Are at Risk and Why Cyber Thieves Focus on Them

Type: White Paper

Sponsor: Vendor Safe Technologies


Control Your Security, and PCI Will Follow

The four most vital actions to accelerate your network and credit card data security

Type: White Paper

Sponsor: Vendor Safe Technologies


Cloud Computing in a Restaurant Environment

How Restaurants Leverage New Cloud Computing Technologies to Achieve PCI Compliance

Type: White Paper

Sponsor: Vendor Safe Technologies


Boost Security in 3 Areas to Thwart Malware and Hackers

Recent electronic intrusions in some of the most well-known retailers have caused business owners around the country to question whether or not they are susceptible to cybercriminals, and what they can do to protect themselves.

Type: White Paper

Sponsor: Vendor Safe Technologies


Approved Software Does Not Equate to PCI Compliance

The four most vital actions to accelerate your network and credit card data security

Type: White Paper

Sponsor: Vendor Safe Technologies


Five PCI Security Deficiencies of Restaurants

The five major credit card brands (Visa, MasterCard, American Express, Discover and JCB), joined forces in 2004 to create the Payment Card Industry Data Security Standard (PCI DSS). Its sole purpose is to assist merchants in building a security program that meets the requirements expected by the card brands.

Type: White Paper

Sponsor: Vendor Safe Technologies


2011 FCES: Analysis of a Data Breach: Finding the Hidden ROI of PCI

While restaurant operators have taken the necessary measures to conform to payment card-industry standards, 23 percent of the hospitality industry experienced a data breach in 2009, with hotels and restaurants accounting for a majority of those cases. In this session...

Type: Presentation

Sponsor: Fast Casual Executive Summit


Cloud Computing in a Restaurant Environment

While there are more technical definitions used to describe it (one of best comes from the National Institute of Standards and Technology – NIST), Cloud Computing is basically the concept of using shared resources over a network, typically the Internet....

Type: White Paper

Sponsor: Vendor Safe Technologies


Five PCI Security Deficiencies of Retail Merchants and Restaurants

The five major credit card brands, Visa, MasterCard, American Express, Discover, and JCB, joined forces in 2004 to create the Payment Card Industry Data Security Standard (PCI). Its sole purpose is to help merchants build a security program that meets the requirements expected by the card brands.

Type: White Paper

Sponsor: Vendor Safe Technologies


Case Study: Fast Food Franchise Security Breach

A franchise relied upon the POS software reseller to be their de facto IT department. The reseller performed a standard installation of the POS software and associated hardware at each location. At some point, the environment was breached; malicious software,...

Type: Case Study

Sponsor: Vendor Safe Technologies


Case Study: Managed VPN vs Frame Relay in a 24 Store Franchise

For several years, the company relied on a Point-to-Point Frame Relay network that terminated to the corporate office and supported the individual stores. This allowed the IT support staff to securely communicate to the stores for supporting technical issues while managing all communications centrally.

Type: Case Study

Sponsor: Vendor Safe Technologies


Approved Software Does Not Equate to PCI Compliance

There is a misconception going around with many merchants dealing with how to become PCI complaint. Frequently, in our dealings with merchants, we have heard, “My software is approved, so that should make me compliant.” This is simply a fallacy,...

Type: Case Study

Sponsor: Vendor Safe Technologies


Control Your Security, and PCI Will Follow

In recent years, it seems that there has been a concerted media effort to warn the public about credit card and identity theft. What seems to be lost in those stories, until you do a little digging, is how often identity theft can be traced back to brick and mortar establishments that accept credit cards.

Type: White Paper

Sponsor: Vendor Safe Technologies


Wireless POS Makes Your Business More Efficient

There can be little doubt that technology has made nearly miraculous improvements to the operations in the hospitality market. Computers and the databases running on them allow for an unprecedented level of procedural control, customer support opportunities, and sales mechanisms...

Type: White Paper

Sponsor: Vendor Safe Technologies


  • 1 (current)

View all Topics View by Company

 

TRENDING

 

WHITE PAPERS