“Security breach” is the last phrase any hospitality business owner wants to hear, yet breaches continue to make headlines. Where owners are taking steps to keep their customers’ data secure, chances are they are not fully covering themselves and are unknowingly exposing themselves to risks and cyber criminals if they are not working with a security professional.Staying secure requires a broad and constant review of your business. ...Continue Reading → Share
This week an employee at Hewlett-Packard Company (HP), Matt Oh, published a post on the HP Security Research Blog titled “Hacking POS Terminal for Fun and Non-profit” which reviewed the security of a used Aloha Point of Sale (POS) terminal purchased from eBay®. The dates noted, the functions highlighted, and applications referenced tell me that this is a very old system that NCR no longer ...Continue Reading → Share
Both a doctor and a lawyer by trade, Win Froelich doesn’t think he’ll ever retire. Win got into restaurants because he and his wife were looking to start the next professional chapter of their lives together. “We were looking for an investment,” recalls Win, “and explored multiple options that would allow us to work together.” Win and his wife found what they were looking for with Bungalow ...Continue Reading → Share
Today is the last post in a series on Loyalty. Over the last few blog posts we have been discussing building a loyalty program for QSRs. It began with the challenges of offering loyalty, we then took a look at consumer payment options and last week looked at disruptions in consumer behavior and expectations . Today we’ll discuss how NCR is making everyday easier:
At NCR, we believe ...Continue Reading → Share
It’s not every day you get four brands in a room discussing your business. At the International Restaurant and Foodservice Show in New York this past Tuesday, we did. We hosted a panel on 6 Technologies Successful Restaurateurs Can’t Live without. Panelists included:
Dean Jankelowitz, Jack’s Wife Freda; Michael Chernow, The Meatball Shop; Bobbie Lloyd, Magnolia Bakery; Giancarlo Fiorarancio, Shake Shack
And posed the questions: What are the ...Continue Reading → Share
Today, we’re finishing our series on Security with a throwback Thursday (#tbt) post where we discussed the “Top 5 Data and Network Threats for Restaurants… And What To Do About Them.” Be sure to also read our Security posts on how to Segment Your Network to Protect Data and Avoid Inconvenience and Checking your Locks: 5 Myths About Safeguarding your Data.
The Internet can be a scary ...Continue Reading → Share
For Throwback Thursday (#tbt) we’re continuing our theme of Security and re-posting this blog where we discussed how to safeguard your data. Click here to read last week’s post on segmenting your network to protect your data.
If you are the one closing your restaurant for the night, a part of your routine is to physically lock up the property. That may involve arming a security system and, at the ...Continue Reading → Share
Whether online or in the “physical” world, the strength of security measures should depend on the importance of the items they safeguard. We can use this principle when establishing network security in your store or restaurant to protect data and address PCI DSS requirements.
You probably store cash in a safe to protect it from theft, while you might not worry about leaving toothpicks or menu handouts on the counter or ...Continue Reading → Share