POS security breaches typically start with a breach of the corporate network. The first step in protecting POS devices is to ensure baseline security practices are being followed. Are your users creating strong passwords? Are they changing them regularly? Are your network connections protected by a firewall? Is your network traffic filtered for malware? Are your employees’ BYODs screened before coming onto your network? While these read like standard operating procedures, buttoning them down will substantially reduce your risks. A 2015 industry report found nearly 30% of data breaches are attributable to weak passwords. These measures are particularly important for POS devices. During installation, POS vendors often use system default passwords for simplicity but fail to change them later. And the default passwords can be easily obtained online by criminals.