PCI-listed encrypting secure card reader and mobile payment terminal. Payments sent via cellular network only.

Risk Profile: Lower

If you are using a PCI-listed Point-to-Point Encryption (P2PE) solution, go to Type 15.

12a

Where is your card data at risk?

12b

How do criminals get your card data?

12c-p-1600

How do you start to protect card data today?

Click on the icons below for the Guide to Safe Payments and information about these security basics.  For simple definitions of payment and security terms, see our Glossary.

ico-ask-vendor2x-p-130x130q80

Ask your PCI Qualified Integrator & Reseller (QIR) or your hardware/software vendor for help

ico-secure-payment2x-p-130x130q80

Use secure payment systems

ico-protect-card-data2x-p-130x130q80

Protect card data and only keep what you need

ico-protect-in-house-access2x-p-130x130q80

Protect in-house access to your card data

ico-protect-internet2x-p-130x130q80

Protect all systems from the Internet

ico-inspect2x-p-130x130q80

Regularly inspect your payment terminals for modification, changes, or other visual clues that suggest tampering or alteration

ico-limit-remote2x-p-130x130q80

Limit remote access for your vendor partners – don’t give hackers easy access

ico-install-patches2x-p-130x130q80

Install patches from your payment terminal vendor

ico-make-card-data-useless2x-p-130x130q80

Make your card data useless to criminals