The Barcode Experts. Low Prices, Always.
Navigation

Barcodes,Inc.

Top 10 Reasons to Mount Your Payment Device

Posted April 26, 2017

ENS is the world leader in security stand mounts for payment devices. Mount your payment device today and enjoy peace-of-mind knowing that you and your customer’s valuable data have an additional level of physical protection.

1
#1 SECURITY
Mounting your payment device protects it against tampering and theft. Locking stands, custom security hardware, magnetic security features, along with data port covering back plates can all be utilized to protect you and your customer’s valuable data.

2
#2 ADA COMPLIANCE
Stands that tilt up a full 90° make it so much easier for wheel chair customers to access the device. Mounting the stand helps you meet ADA guidelines.
3
#3 PCI COMPLIANCE
Best practices of PCI compliance dictates that a payment device be secure. Securely mounting your payment device on a stand provides a physical barrier against tampering.

4
#4 EXTENDS DEVICE LIFESPAN
Mounting your payment device to a stand increases its life cycle, protects against accidental dropping and reduces tampering.

5

#5 ERGONOMICS & USABILITY
ENS payment terminal stands are designed to enhance the human interface with technology and optimize ergonomics for you and your users. A 180° swivel rotation allows for easy viewing between the customer and the associate

6

#6 PROTECT YOUR INVESTMENT
Glue pad systems allow you to mount to glass, granite or other surfaces without harming the surface. Does it need to move around the counter top and be stowed away at the end of the day? No problem! ENS has a weighted base with a rubber pad.

7

#7 CABLE MANAGEMENT
No more messy cables. Stands come with cable clips and a center-hole base to neatly route and organize the power and data cables.

8

#8 AESTHETICS
Our designs are created with form and function in mind. Low profile stands practically disappear underneath the payment devices while incorporating clean, neat and pleasing designs.

9

#9 REDUCED MAINTENANCE
Install the stand and forget it. No metal on metal contact. Easily field adjustable tension for tilt and swivel means you are in control.

10

#10 CUSTOM SOLUTIONS
Trust ENS to solve your most difficult technology mounting problem. With more than 100 years of combined engineering expertise, our team of experts will work with you through our simple four step process to Discover, Design, Develop and Deliver a solution for you on time and within your budget.

Don’t Let EMV Chargebacks Cut into Your Profits

Posted April 25, 2016

Avoid-EMV-ChargebacksWith EMV in full swing in the U.S., chargebacks have been on the rise – especially for restaurateurs. Following a successful co-hosted webinar with National Restaurant Association on the basics of chargeback management and best practices last month, we discovered a second installment was in high demand.

The webinar took a deeper dive into the rules of EMV and chargebacks and what you can do to avoid them. If you weren’t able to join us for the presentation, we’ve summarized the high points here to help you better understand chargebacks and the liability shift.

Why EMV, Why Now?

Protecting yourself against counterfeit fraud is one of the main benefits to implement EMV because it’s virtually impossible to recreate the chip. The October 1, 2015 shift has caused some serious headaches, but the ultimate goal is to fix the payment ecosystem by heightening card security. There is, however, a glitch—if your equipment isn’t EMV-compatible, then use of a fraudulent EMV card can go undetected.

Continue reading »

Infographic: Point-of-Sale Data Security Pressure Intensifies

Posted September 29, 2015

Lately we have been hearing more and more cases of retailers having their point-of-sale and payment processing systems being compromised putting their customer’s personal information in the wrong hands. Keeping your POS system secure is critical with today’s common use of online and mobile shopping which have opened up new types of security risks.

This infographic sheds some light the new security challenges retailers are facing today and how there is still a lot of room to improve.

posinfor

Infographic: Data Breaches – Is your Business at Risk?

Posted September 4, 2015

The impending EMV Compliance deadline has brought more attention to Point of Sale security in general for all retailers these days. This infographic brings up the key concerns and steps you can take to keep your business and customers safe.

securitypos

How Mobility and Connectivity Bring Value to Financial Services

Posted March 20, 2015

pr_1157When it comes to maintaining secure financial operations and providing top-notch customer service, success hinges on an organization’s ability to transform information into insight. Additionally, with fraud and theft on the rise, it’s critical that financial institutions constantly improve protection plans. And since no two financial organizations are alike, a variety of multi-level security options is needed. From print-on-demand (POD) technologies that enable “intelligent” access cards and radio frequency identification (RFID) to desktop printers and document and record tracking applications, organizations are capable of securing people, products and property across their operations—while maintaining a high level of customer service.

Financial information, assets and communications are mission critical. It’s vital that solutions and devices enable officials to locate, track and manage personnel, confidential materials and high-value assets in real time—after all, the best security is proactive, not reactive. Furthermore, it’s crucial that only authorized individuals have access to secure locations. In addition to leveraging the value of mobile devices and printers, organizations can take advantage of opportunities afforded by the Internet of Things (IoT) by utilizing a set of enabling technologies to connect, capture and then analyze the data to make more informed decisions. Connecting devices to one cloud platform will enable them to gain actionable insight into their operations and processes—providing the asset intelligence they need to stay competitive.
Continue reading »

Barcodes, Inc. partners with My Digital Shield to provide Point of Sale cyber-security solutions to its customers

Posted December 22, 2014

my-digital-shield-blueshieldSecurity-as-a-service provider’s cloud-based solution will be marketed to Barcodes’ customers across multiple industries, including manufacturing, retail, healthcare and government

My Digital Shield (MDS), a leading provider of Security-as-a-Service (SECaaS) for small businesses, recently announced its partnership with Barcodes, Inc., (“Barcodes”) a recognized leader in the delivery of Automated Identification and Data Capture (AIDC) solutions in North America. Under this agreement, Barcodes will promote and sell MDS’ security solution packages to current and prospective customers across various industries including manufacturing, retail, healthcare, government, education and libraries, logistics, hospitality, and utilities.

Continue reading »

Label Features to Solve Common Retail Problems

Posted November 21, 2014

2014-11-21_0906Most people don’t realize how many choices there are when it comes to designing a label or tag. Even the simplest of features can be cost-effective and can make a big impact in improving the overall retail store environment from back-office to customer experience.This white paper focuses on several features that can reduce shrink and improve customer satisfaction.

Shrink Management

To cut back on stolen merchandise, retailers are often required to implement expensive solutions like EAS (Electronic Article Surveillance) systems and trained security. However, there are less expense ways to deter theft.

Continue reading »

Axis’ New A4011-E Reader

Posted November 11, 2014

a4011-eAxis has introduces their new A4011-E Reader for their Network Door Controller systems. The reader has an ergonomic design with an illuminated keypad and clearly identifiable symbols. It supports touch-free entry with most entry card formats and is suitable for both indoor and outdoor installation.

The A4011-E is a future-proof and generic reader that supports several different card formats in order to meet specific system requirements. It can handle two different card formats simultaneously, which simplifies system expansion and enables easy migration from one card technology to another

Continue reading »

10 Industry-leading Enhancements and Upgrades for the Zebra ZXP Series 7 Card Printer

Posted March 24, 2014

Zebra ZXP Series 7 Card PrinterZebra’s fast and reliable ZXP Series 7 card printer now offers 10 industry-leading enhancements and upgrades to provide customers with even more options to meet their card printing needs.  Known for its photo-quality card printing in medium- to high-volume applications, the ZXP Series 7 card printer provides maximum performance at an exceptional value.

Customers can easily and conveniently upgrade their existing ZXP Series 7 printers to benefit from new options designed to enhance print quality and card protection, provide additional security, reduce waste and minimize downtime.

Continue reading »

5 Ways To Improve Security In Your Point-of-Sale System

Posted January 2, 2013

Many business owners think that meeting the basic requirements of the Payment Card Industry Data Security Standard (PCI DSS) protocols will keep their point-of-sale systems from being hacked. But here’s the truth: hacking into retailer POS systems is a recurring problem worldwide, even for retailers who meet PCI DSS standards.

In just the last couple of years, several high-profile cases have received media coverage:

  • In late 2011, a scheme was discovered that involved hackers from Romania stealing credit card data from hundreds of POS systems, including those from 150 Subway franchises. More than 146,000 cards were compromised, and losses have been estimated at up to $10 million.
  • In September 2012, hackers got into POS systems in 63 Barnes & Noble stores in nine states. The company removed POS card readers from all its stores while the incident was investigated.
  • In December 2012, an Israeli security firm found a strain of malware infecting hundreds of POS systems in 40 countries. By injecting malware into a system’s iexplore.exe file on Windows servers, the malware hijacked data that could be used for cloning credit cards.

Countless other cases of POS “hacking” come from insiders: your employees. Keeping on top of POS security is essential for every business. Here are 5 ways to improve your POS security.

Continue reading »

Older Posts »