Experts predicting a “tsunami of viruses” as operating system support ends.
Let’s face it, the media loves a technical disaster story. In 2000 we had Y2K, and a plethora of security breaches and viruses and worms (Remember Nimda?) that seem to never be as big as what we are told they will be. These items caused lot of inconvenience and in some cases some serious damage but nothing that wasn’t patched, and repaired. We adapted, learned and moved on. So why should we get concerned about XP end of life when other technical “disasters” that either happened or were looming turned out to be much ado about nothing? It’s simple really. The people in charge of updating, patching and preventing are not going to be doing it anymore as of April 8, 2014.
XP is still being updated and security holes are still being patched. Between January 1 and March 30 of 2013 Microsoft released patches for 34 security vulnerabilities 28 of these were network related. So without these patches there were 28 ways a hacker could have created something to harm systems running on the XP Operating system. The Windows XP operating system in April is going to be “as is” there will be no more patching, no more updates. This will make the machines that are currently operating on Windows XP vulnerable and a soft and relatively easy to exploit target. Even currently with patches, the malware infection rate for a Windows XP machine is over 2 times greater than that of Windows 7 machine and it will get worse. Additionally with the install base for Windows XP being as high as 43% from some reports, XP will be a major target of those looking to exploit systems for financial gain. Additional reports even speculate that more sophisticated groups are withholding code in hopes that the vulnerabilities they have discovered remain unpatched after end of life in April. For more information read Microsoft’s own Security Intelligence Report
For most Point of Sale customers on a modern touch screen point of sale system the problem is not the front of house POS system. Many but not all run XP embedded which has another couple of years of life with end of life set for that on December 31, 2016. The issue is in the back office computers. Many back office systems even those deployed in the last few years run XP Pro and most are exposed to the internet. Firewalls, PCI compliance and other solutions can only protect so far and an outdated system like this is likely to cause you to fall out of PCI compliance no matter what other safeguards are in place.
There are other reasons that an update should be in the works for any machine you have still on XP. Technology changed. Windows XP just doesn’t work with many newer and peripherals like printers, scanners, scales, and other devices. Why? It’s more than a decade old and the machine it was designed to be installed on just doesn’t have the horse power to drive these new devices. Not to mention the leaps and bounds software has taken. Newer programs just don’t work on a machine that was designed to surf the web, check email and run a few programs. To put it in perspective… 12 years ago when it was released the PC it was designed for had less power than an iPhone does now.
If you have questions or concerns about the risk your business may be taking with your current operating environment please visit our windows XP end of life page at www.rdspos.com/xp or call your local office.
Studies show that 75% to 90% of employees will steal from their employer. Theft can take many forms, from the coffee that the cashier “forgot” to ring up, the produce that the cashier let lean on the side of the scale to give a friend a lower price on those steaks, theft of product from the stock room or just out-and-out skimming from the register. So as a store owner how do you deter theft in a way that will allow you to run your business without turning into a full-time store police officer?
One way that is rapidly gaining popularity due to its ease of use, time savings and rapid return on investment is an integrated store surveillance system. Although more expensive than the off the shelf products that sell for a few hundred dollars, these products allow the t-log information from the POS to be burned into the video image allowing the transaction log and the video to always be in sync. Integrated systems also allow for intelligent monitoring where only transactions where a void or over ring can be quickly viewed. They also can be set up in high theft areas to monitor when someone moves into the video frame. Additionally these products can be monitored remotely and securely so an owner does not have to be in the store at all times.
Studies are showing that integrated video surveillance systems are one of the top technology purchases for 2013 due to their proven effectiveness.
Are integrated video surveillance solutions right for you? Possibly not. Your local RDS representative can help you evaluate your potential ROI to determine if one of these systems is right for your business.
Join the conversation….
Some examples of their value some of our many customers with these systems have shared with use are:
A fraudulent slip and fall lawsuit that was avoided after video was reviewed.
A thief stealing from the office safe that was caught.
A cashier that was not ringing up items for friends and family.
A stock boy who was stealing merchandise from the storage room during his night shift.
The unprofessional behavior of a bartender towards customers.
A cashier that was giving free drinks and food items to her friends.
The shoplifter that was caught stealing baby formula.
A C-store cashier giving away beer.
Many, many more
If you have a something to share about how video surveillance has helped your business please post in the comments below.
“White House sources partly confirmed an alarming report that U.S. government computers — reportedly including systems used by the military for nuclear commands — were breached by Chinese hackers. This was a spear phishing attack ….”
That shocking news was reported Monday. And it should make every American think hard about their own cyber security.
Whether you are a business owner or individual you should be very concerned about cyber security. If the White House can get hacked, so can you.