Blog

No Evidence of Customer Credit Card Info Compromise in U.S.P.S. Data Breach

no-evidence-of-customer-credit-card-info-compromise-in-u.s.p.s.-data-breach-2.jpg

In a November 10, 2014 statement, the U.S. Postal Service® (USPS®) acknowledged a data breach that may have compromised the personal information of more than 800,000 employees, as well as data on customers who contacted its call center during the first eight months of this year.

Learn More

Gift and Loyalty Cards are Holiday Essentials

gift-and-loyalty-cards-are-holiday-essentials.jpg

Most everyone is familiar with reusable stored-value gift and loyalty cards. They look similar to standard credit cards and include a magnetic stripe that contains card information. They are popular with consumers year round — but even more so during the holidays.

Learn More

Emphasize Secure Payments to Support Cyber Monday Success

emphasize-secure-payments-to-support-cyber-monday-success.jpg

The National Retail Federation (NRF) has good news for retailers, forecasting holiday sales to increase 4.1 percent over last year’s sales in November and December.

Learn More

Best Practices to Ensure Your Mobile Device is Payment Acceptance Ready

best-practices-to-ensure-your-mobile-device-is-payment-acceptance-ready.jpg

All merchants who process, store or transmit credit card information must maintain a secure transaction environment — and with mobile payment processing — as with all forms of electronic payment processing, the best way to secure electronic payments transactions is through compliance with the Payment Card Industry Data Security Standard (PCI DSS). This widely accepted set of policies and procedures is intended to optimize the security of credit and debit card transactions and protect cardholders against misuse of their personal information.

Learn More

Rooted or Jailbroken Devices are Unsafe for Mobile Payments

rooted-or-jailbroken-devices-are-unsafe-for-mobile-payments.jpg

How much do you know about the mobile device you’re using? If you share your smartphone or if you purchased it used, you have a greater chance of having operating system security vulnerability. That’s because a used phone or one left in the hands of a curious teen might have been rooted or jailbroken. These terms refer to opening up a mobile device to allow the installation of third party apps.

Learn More

 < 1 2 3 4 5 >  Last ›

Sign Up for Free!

or call 888.845.9457
Do you accept credit cards?
Are you a U.S.-based business?
  • Your information is private and secure. We only accept U.S.-based businesses. We do not accept adult businesses

×

Chat with a Professional!

Your information is private
and secure.We only
accept U.S.-based
businesses. We do not
accept adult businesses.

© 2015 TransFirst. All Rights Reserved.

TransFirst, LLC is a registered ISO/MSP of:
Wells Fargo Bank, N.A., Walnut Creek, CA
Synovus Bank, Columbus, GA