What’s Scarier than the Bates Motel? A Lesson in POS Software Security

Decades after Norman Bates and his mother initially arrived on the scene and convinced psychothe majority of us to opt for chain hotels like Marriotts and Hiltons, Hitchcock’s legacy and several subsequent iterations of Psycho continue to scare the living daylights out of us. What does this have to do with POS software, you might ask? Well, just as Janet Leigh’s character would have done well to take the proper check-in precautions, even the best POS software for restaurants and retail stores can be vulnerable to nefarious outside forces.

The odds hacked against us

Software is, in its nature, prone to potential hackers and other types of mischief makers. This is why unnamed sums are spent on virus protection programs like Symantec and McAfee, whose namesake John McAfee could have used some protection of his own, judging from the bizarre story of his being wanted for murder and on the lam in South America. Even the once-impervious Apple computers have more recently been targets of viruses (Carrie Bradshaw’s Sad Mac turned out to be quite prescient). Like any other software program, even the most secure POS software for small businesses can be susceptible to those looking to exploit weaknesses.

No one is immune

The Subway franchise, famous for their foot-long sandwiches and Jared, who subsisted only on Subway sandwiches in what appeared to be a successful campaign to lose a massive amount of excess weight, was recently in the news for its POS software hack. Thirteen POS systems, to be more precise, were breached in Subway locations across the nation. The story took an additional twist when the POS systems were used to fraudulently add untold balances to Subway gift cards. The lesson here is this: regardless of the size of your business, POS software can be subject to hacks and viruses just like any other type of software. So, how might you choose the securest POS software for your business?

Avoid the Norman Bates of POS software by:

  • Finding intuitive POS software that encrypts all information (so if there is a virus attack, all the hacker will obtain is useless data).
  • Safeguarding secure data via PCI compliance.
  • Filtering out POS software bundles that are isolated from other networks.
  • Ensuring that your software speeds up the customer service process and comes engineered to work with hardware that cannot easily be infected by more traditional malware.