Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

How to Sell mPOS Solutions to Security-Conscious Business Owners

August 31, 2017

How to Sell mPOS Solutions to Security-Conscious Business Owners

Even as mobile technology becomes more commonplace, both merchants and consumers can be skeptical about data security.

When consumers hand over a card to make a purchase, they want to be sure that personal account information can't be stolen. At the same time, business owners want to ease customer fears and protect themselves from data theft.

Is mPOS less secure than a non-mobile system?

In today's fraud climate, there isn't much evidence that mobile solutions can be breached more easily than traditional fixed systems. After all, many large businesses have experienced data losses because of security lapses not linked to mPOS.

But payment transactions can be exposed when business owners don't build the strongest wall securing customer information. That's why you'll want to focus on a few crucial questions when talking with your clients about mPOS security:

Are the mobile devices secure?

When mPOS was first introduced, many solutions were designed to operate using consumer-grade smartphones. The convenience factor was high, but device security wasn't always the best.

With the evolution of tablets and mobile devices targeted for use by business owners, standards have improved. But your clients need to take these five steps in order to secure mobile devices used for mPOS:

  1. Limit physical access to payment devices by locking them away when not in use.
  2. Enable device security with complex passwords and multi-level verification.
  3. Restrict access to mobile devices.
  4. For devices without built-in vendor verification, require every user to enter a PIN in order to gain access.
  5. Require full disk encryption on mobile devices used for payment, preventing anyone from bypassing the security features.

Are the networks secure?

An mPOS solution requires access to a wireless or cellular network in order to process payments. But not all wireless networks are equally secure.

mPOS payments should never pass across unsecured networks or those used by the public. More and more industry experts recommend deploying wireless networks via wireless access points connecting to a wired backbone.

Are the payment devices secure?

Along with mobile devices, merchants need portable terminals to accept credit and debit cards. With the recent US EMV transition, these card readers should accept both chip and magnetic-stripe cards. Here are five best practices for keeping these devices safe:

  1. Protect payment devices with anti-malware software.
  2. Update anti-virus software to the latest version and buy only from recognized vendors.
  3. Check regularly and install needed software security patches.
  4. Don't add unnecessary software.
  5. Choose card readers that encrypt data from the initial card swipe.

By asking these questions and ensuring that your customers understand how to put these security features in place, you'll show clients that mPOS solutions offer just as much protection as fixed systems can.

What strategies have worked best for you when selling mPOS to security-conscious business owners?

Ingram Micro is solution focused and wants to help you! Contact Ingram Micro at DCPOS@ingrammicro.com and ask to talk about mPOS and the security opportunity and you will be in contact with the best specialist in the industry!