article thumbnail

PCI Validated P2PE – 3 Years in North America, What Has Changed?

PYMNTS

While hackers got into the POS systems through a faulty firewall or third-party vendor, once in they were able to install malware that located unencrypted credit card information — which was then sent to remote servers, packaged and resold on the black market. Specifically the webinar will explore: The State of Payment Security.

article thumbnail

Bypass CEO: Dining’s Big Digital Disruption

PYMNTS

He further remarked that it really doesn’t matter what POS system the restaurateur decides to use, since any and all of those technologies will help merchants respond more efficiently to new tech trends, know their customers better and allow third-party vendors a way to plug into POS more easily — and at a fraction of the cost.