{"id":28514,"date":"2016-08-10T04:00:00","date_gmt":"2016-08-10T08:00:00","guid":{"rendered":"https:\/\/goebt.com\/https-blog-cdesolutions-com-2016-08-securing-data-devices-from-start-to-finish\/"},"modified":"2025-05-20T10:55:27","modified_gmt":"2025-05-20T14:55:27","slug":"securing-data-devices-from-start-to-finish","status":"publish","type":"post","link":"https:\/\/goebt.com\/securing-data-devices-from-start-to-finish\/","title":{"rendered":"Securing Data &#038; Devices From Start To Finish"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><em><strong>As a total solutions provider, we handle POS devices from purchase all the way to the time that they have to be recycled.<\/strong><\/em>\u00a0 We understand the importance of maintaining security throughout the entire life cycle of a device.\u00a0 We also understand that there are a lot of factors that go into ensuring the device\u2019s protection at every stage.\u00a0 Although we cannot completely control what happens to a transactional device after it\u2019s placed in a merchant\u2019s business, we\u2019re sure that they are best set up for completing secure transactions when we deploy the equipment.\u00a0 In our fully PCI compliant building and offices, we keep data and equipment security top of mind at all times.<\/p>\n<p><!--more--><\/p>\n<p><strong>Security at Arrival<\/strong><\/p>\n<p>When devices arrive at our facility, we thoroughly check them and account for them in inventory as quickly as possible. This includes returns, repairs, and even those to be recycled.\u00a0 The sooner we are able to document devices and place them in a secure place, the less chance there is for the equipment to be compromised by unauthorized activity or even environmental factors before we prepare them for deployment.<\/p>\n<p>While equipment is housed in our facilities, it is also locked down properly with select persons having controlled access.\u00a0 When protecting equipment that belongs to our partners, we work to minimize the amount of unnecessary handling which minimizes the opportunity for misplacement or mishandling.\u00a0 Even recycled devices are properly documented and certified.<\/p>\n<p><strong>Moving Parts<\/strong><\/p>\n<p>Every time that a piece of equipment moves through production processes in our warehouse, we maintain security by tracking the equipment\u2019s placement at all time.\u00a0 Even equipment being repaired is documented as it moves through various stations so that we can be sure that there is record of every device even when they are not being used or stored.<\/p>\n<p>Knowing who is in possession of POS equipment and when is not only to protect devices through good inventory practice, but also to help the internal team understand the trail of the equipment, should anything happen later in the process of repair or deployment. \u00a0The visibility into this information via our online partner website portals allows partners the ease of quick updates or insight into their success.<\/p>\n<p><strong>Data Protection<\/strong><\/p>\n<p>Today, cyber security and data integrity practices constantly become stricter due to the continued work of hackers and thieves.\u00a0 These ever-changing standards can become a challenge to large organizations.\u00a0 As we continue to evaluate and update our processes, we also ensure that our partners have the opportunity to take advantage of the latest in security efforts through technology such as <a href=\"https:\/\/cdesolutions.com\/2016\/02\/what-is-p2pe\/\" rel=\"noopener\">P2PE<\/a> and other encryption methods.<\/p>\n<p>Our encryption room is always locked and only accessible to those who are authorized to handle the encrypted devices and keys.\u00a0 Even after devices have been fully encrypted, we guarantee their protection by locking them in caged storage units that are never left open.<\/p>\n<p><strong>Speedy Shipments<\/strong><\/p>\n<p>Part of our efforts to protect the critical POS devices that our partners and their customers rely on is to ship them quickly and safely.\u00a0 We ship equipment via trusted couriers only and always use the fastest shipping methods.\u00a0 With high shipping standards, we can better guarantee that deployed equipment is tracked properly and arrives to the correct destination unharmed.<\/p>\n<p>Partners and their customers are always supplied with shipping details and signatures are always required upon delivery so that partners can rest assured that their valuable assets are in the hands of the right people.\u00a0 The more visibility companies have into their inventory and its location, the better they can continue to plan and execute their operations.<\/p>\n<p>Understanding the security of your POS and transactional devices and the data they store or transmit while they are stored, repaired, shipped, and even while they are being used is a crucial part of providing payment processing.\u00a0 Merchants and other end users want to be sure they are using equipment that can be trusted and that their data is secure.\u00a0 Don\u2019t risk a bad reputation by allowing any part of your operation to be anything less than absolutely secure.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; As a total solutions provider, we handle POS devices from purchase all the way to the time that they have to be recycled.\u00a0 We understand the importance of maintaining security throughout the entire life cycle of a device.\u00a0 We also understand that there are a lot of factors that go into ensuring the device\u2019s [&hellip;]<\/p>\n","protected":false},"author":244,"featured_media":28515,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1],"tags":[227,205,218,217],"class_list":["post-28514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-important-announcement","tag-best-practices","tag-industry-news","tag-security","tag-technology"],"_links":{"self":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/28514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/users\/244"}],"replies":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/comments?post=28514"}],"version-history":[{"count":2,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/28514\/revisions"}],"predecessor-version":[{"id":31865,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/28514\/revisions\/31865"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/media\/28515"}],"wp:attachment":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/media?parent=28514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/categories?post=28514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/tags?post=28514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}