Point of Sale Software

Here are some Articles from the Blog Subject - security -

Staff Security levels

POS SOFTWARE

The mere presence of you having a correct security procedures system often deters theft. If a staff member sees cameras, if they see proper procedures in the POS software, then there is less likely to be trouble. It is essential that you do take retail loss prevention seriously.

I have, over the years, become very cynical about this issue. Too many retailers have told me stories which starts "He was in school with me... his family and my family....he was very good, my best employee ... and ends that he had been skimming my cash register for years.

Face it if an employee sees that you won’t care about a discrepancy of a few dollars in the cash drawer, some will note this and take advantage of this. If they see a third-party your POS Software monitoring this, it will give them something to think.

One of the clients to pick up almost $13,000 a year in extra revenue when a computer system was upgraded by simply running separate tills for every staff member and introducing a policy of counting each cash drawers after each shift.

 

Now it is straightforward to set up in our system. 

Firstly in the section "Staff maintenance", there is a section "Security Level."

 

Now the defaults are there which we have set up designed to work for 90% of the shops. However, like everything, each shop is different and what works in 90% of cases often does not work with your shop so you can fine-tune it for your situation.

There are heaps as you can see options here.

Set them up for you. Now enforce them.

Now make sure you have cameras facing the tills.

Security in retail is often treated as a joke, but it does not have to be and should not be.

 

 

 

 

 

 

 

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

Integrating video surveillance and the POS system

POS SOFTWARE

The best and most important area in the shop to install security cameras is at the point of sale as that is where the cash is located, so that is where most fraud takes place.

Integrating your video surveillance with the POS system makes a lot of sense. This example shows a skimmer being installed by some shop thieves. Your staff may not be involved in the fraud at the point of sale. This fraud took three (3) seconds. Nothing would show here on the computer if the cameras had never been installed on the tills, it would never have been found.

 

This is a bit exceptional; as most of the fraud involves actual transactions. Typically a brother of a staff member buys a $30 book, and it gets rung up as a $5 remainder book. 

With a camera, you have a video record of each transaction, the customer and the operator. So you can provide evidence that can be used to confirm the point of sale software. This is always a problem if the matter requires verification. For this, you need video e.g. you often hear this remark in court "The computer said that I did it, but many could have done it.." or "I gave you a $50 and you gave me a $20, okay the computer said $20, but I gave you a $50."   

The computer can and does give you alerts e.g. high dollar amount and other dubious transactions which can alert you to possible fraud. At the very least, it can enable you to identify common mistakes or misunderstandings that can be corrected with additional training.

Also just the fact it is there has been shown to reduce theft.

If your system is not integrated then the archived video needs to be searched by date and time, which is slower and a pain.

PS if you want to extend what the cameras can do e.g. facial recognition analytics to identify known individuals; counting analytics to ensure that occupancy limitations are not exceeded or demographic analysis we could do that too.

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

Staff passwords

POS SOFTWARE

Too often we see the passwords in our client's shops ignored and treated like a joke. It does not have to be and let me point out that many of you can be held responsible for misuse of the system. If you treat the matter lightly then so will your staff.

What you need to do is give your staff the resources to do their jobs, which means giving them access to your point of sale software. However you do not have to give them access to all the system. What out system allows you to do is select exactly what they can have access too.

Please go to

Main menu> staff > staff maintenance

Then click the Security Level tab on the top

 

Now you will see the user levels with our suggested functions for each level. Change them at will to suit your own particular needs.

 

Now click Staff Maintenance

This screen appears

 

 

Now set your staff with a suitable security level that they need to do their position making sure that you give them the functions and information they will need without compromising sensitive and dangerous functions and information.

This is not only a matter of protecting yourself but if your customers see that you treat the information they give you lightly they will remember that. What may be interesting to you is to read the Woolworths privacy statement here. It might give you some ideas

 

 

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

Computer chain security

POS SOFTWARE

Laptop security chain

 

What is popular now is to link into your point of sale system a laptop rather than a desktop. The cost is a bit higher, but it has a heap of advantages, e.g. you do not take over a computer at work, it is easy to move where you need it, and you can easily take your work home with you. I have been to meetings where we all have our laptops in front. It is the in-thing now.

Unfortunately, one problem is that one of my clients went looking for a price for an item, so left his laptop alone and in seconds someone grabbed it and was out the door in seconds. When he came back and wondered where it was?  By the time anyone realised it was long gone.

So if you are going to use a laptop in the shop, I would suggest that you get a laptop security cable lock. You can pick one up for about $10.  That should stop your average thief looking for something easier to steal. Of course, it will not prevent the guy with the bolt cutters, but he is a much less credible threat.

I have seen some security footage of some thieves hitting a shop after hours, and it shows them pulling the cable trying to get the laptop and giving up, so here the cable worked.  Remember these guys have only got a few minutes before the police come.

Here are some tips for the cables from a guy that has had a few.

Make sure they are solid.

I had a cheap one whose combination failed on me and in desperation, I tied to pull it out and was shocked to discover that under pressure, it just fell apart. I gave the next one a few big tugs to make sure that it worked. Also, make sure that the chain looks solid if it seems solid thieves will probably not even try.

Bolt properly

Make sure that the chain is adequately bolted. After all the chain is only as good as what it is attached too and how strongly it is held to that object. 

Long chain

Make sure the chain is relatively long, a short chain will be hard to move around unless you have a stand.

Easy to use

Make sure the chain and lock does not interfere with the laptop operations, e.g. you do not want to lose a port or struggle with a switch. You also need to be able to put the laptop on a desk, some chains are designed to be used with a stand and so do not let the laptop sit on a desk.

Good lock

Finally, for the lock, it has to be easy to use, I had one that could only be opened by picking up the computer and turning it upside down, it was a pain to unlock.

For the lock, I prefer combination, but I warn you that cheap combination locks are easy to break. If you are going to use a key, make sure you have spares. I doubt you can get a spare.

 

Comments

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

Anti virus and old versions of windows

POS SOFTWARE

Microsoft antivirus no longer supports XP, AVG anti-virus no longer supports XP, AVAST no longer supports XP,  etc. Most no longer support Windows 7 either. 

As such some of our clients, of our point of sale software are running into a problem that old versions of windows are no longer supported and now it appears that most of the antivirus companies are not supporting XP either.  This leaves them open to most viruses and ransomware. 

For these users, I am recommending

 

360 total security

 

Details here

 

It is a free product for commercial use, it has no licenses, no expiration and no hidden fees. It is also a first-class product which runs on just about any computer and is fast. 

 

 

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

Importance of good cameras

POS SOFTWARE

I spoke yesterday about good cameras, today the issue came up about skimmers which turned out to be an excellent example of why I do believe that all businesses need good cameras.

A skimming device

These come in many types and are widely available on the web. What a skimming device is, is an electronic device used by criminals that generally are put on an EFTPOS reader to read (skim) the information off on the magnetic strip of a credit card and then to capture the PIN number.

The idea is that a criminal comes to your shop, in a few seconds installs a skimmer then returns in a few days to your shop and retrieves the skimmer with your customers' credit card details on it.

Skimmers have been regularly caught around Australia.

 

Cameras

These people would never be caught without decent cameras.

Take a look, I think you will find it interesting. Two guys come into the shop, the guy in front distracts the cash operator, now look at the guy in the white shirt installing a skimmer. He took about three (3) seconds to install the skimmer.

Here is a discussion about the incident.

 

What to do.

I always give a test pull on any EFTPOS reader before I use it.

My suggestion to everyone is to put a marker all around the EFTPOS reader with texture, this can help as a skimmer would need to cover the mark and be in your handwriting, always have a camera on your EFTPOS unit and try to monitor it at all times. If something looks off, call your EFTPOS provider immediately.

 

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

EFTPOS warning

POS SOFTWARE

One of my clients had the following happen to them.

 

They got a query from the credit card that one of their customers is claiming that a transaction was rung up twice and so they have charged the customer twice for the same thing.

When they investigated in their POS systems what they discovered was that they had done two purchases on the same day for different items but the value was the same as the amount claimed. 

Now what they had to do was show clearly that both these transactions were for something different and that they were different transactions.  The security footage was very useful here.

What it does show is how important it is to include enough detail to show that even though the transactions are for the same amount, that they are a different purchase.

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

Booster bags

POS SOFTWARE

A "booster bag" or "magic bag" has been used by professional shoplifters for years to beat security detectors. 

Magic booster bags

Although you can buy them, which does present a problem that the bags look legit if empty as a rule, shoplifters prefer to make their own. What you do is take a bag although a pocket in pants can be used too, put metal foil inside and so shield the security tag from the detectors in the gate. Using it often they can put something in a bag and walk out of a shop.

One shoplifter just got caught using one by one of our clients. What he noticed was someone walking in with a larger sized bag from a well known retail shop, but it appeared to be empty which did not look right. So he watched the person and noticed as the person was passing out, the bag was not empty. When he examined the bag later, he saw that it was lined with aluminium foil.

If you want to know more click here.

If you find them, you know you have a serious security problem.

 

 

 

 

 

 

 

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

WARNING ON YOUR FACEBOOK BUSINESS PAGE

Facebook point of sale

You have a Facebook page for your business!

The way Facebook works is that the business pages are connected to the person who created it. So if you got someone to make you a facebook page for your business, that Facebook page is linked to their account, it is their property. Now say they leave your business, there can be problems as even if the person gives you admin access to that page, as it is still technically connected to and owned by them. In today's case, the separation has not been a happy one, and they refuse to even talk to the owner of the business.

The only way around this if they wish to continue with Facebook is to start a new page and start again. They then have to report to Facebook that the old one is impersonating the business which is messy as I am sure that Facebook does not want to get involved in disputes regarding the admin position of this page.

If you have such a Facebook page now, make sure that it is linked to your account. Also, consider giving someone else your passwords just in case something happens to you, and so the business can still use its Facebook page. If you are reluctant for some reason to do this, consider setting up a “legacy contract” for that someone who will take over an account is for some reason you cannot.

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

OUTDOOR CAMERAS WITH NIGHT VISION AND WIFI

Outdoor security cameras

 

Unlike many other point of sale software, our system talks directly to the cameras which mean we get involved in security cameras, which I do not mind as I find these fascinating.

The first point is cameras seem to be the best form of evidence in a theft that judges accept today in retail. So it is important to get it right.

Some of our clients have installed these type of cameras to protect the outside of their shop. Say you put them in a spot guarding the rear of the shop.

If you are thinking of getting some of these cameras, here are some points to note.

) As they are outside, they need to be waterproof. Avoid plastic ones as they need to be sturdy so metal is better. Plus if they are metal, you can nail them in.

) Its best to get ones that have a lot of flexibility in their stands as you will need to aim them.

) Test the motion detection. When we tested some and found that the motion detector did not work well at all.

) The installation seems to be quite easy. I would say that someone that is reasonably handy with their hands and tools should be able to install them. Since they are outside, they can be an eyesore so they do not need to be professionally installed as would be the case in the shop. In fact, it is better its an eyesore as it will be noticed by thieves.

) You do need to find a good spot to put them. Make sure this spot has some wind and rain protection. Strong winds are often a real pain as they set up false signals. The spot will need a powerpoint and a decent WiFi signal. In shopping centres we have seen problems are there seems to be a lot of interference on the WiFi if so you may need to move it closer to the shop although another possibility is to install a WiFi extender.

) Once installed you need to check the picture quality both in the daytime and at night.

) Check the frame rate, most defaults are one picture in ten seconds. In ten seconds a thief can be long gone from the camera's view. I would recommend one picture in three seconds.

) One of my clients reported that they found if they walk on a certain path it did not set off the motion detector in the camera. This problem is common so you may want to consider more cameras.

) As with most videos systems today you need a decent size hard drive to keep the images.

) Lastly, you will generally only get a few years out of these cameras before they need to be replaced. They need to be tested every few months.

 

Overall they do appear to be very good at deterring thieves. One client had a shed in the back, which was burgled a few times, they put in these cameras and no-one has come back.

I hope this all helps.

 

 

 

Post a Comment

Add new comment

Restricted HTML

  • Allowed HTML tags: <a href hreflang> <em> <strong> <cite> <blockquote cite> <code> <ul type> <ol start type> <li> <dl> <dt> <dd> <h2 id> <h3 id> <h4 id> <h5 id> <h6 id>
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions. Image CAPTCHA
Enter the characters shown in the image.

Shoplifting - booster bags

POS SOFTWARE

 

A few people asked me after I wrote my article discussing among other things booster bags (often called magic bags or faraday bags) often used in shoplifting with particular emphasis on bypassing the security tags.

The quickest and I think the best way to test them is to do what shoplifters do, grab a few of your tags, and see whether your security poles will pick them up. Try looking for weak spots that the labels close to the poles, put the labels very low or straight, etc. What an experienced shoplifter often does is take a few labels from inside your shop. As no-one is looking for those labels, they are not hard to take, and as no-one is going to do anything to him/her coming into the shop so they can test your security all they like. Be worried if someone comes into your store and the security alarm goes off, its quite possibly not a malfunction but a test run.

As far as testing for booster bags, make one yourself and try it out with a few items. One of my clients found a person with a booster bag with over $240 worth of books of their books in it. A useful app "MD Faraday Bag Tester" that can help you test the bag and will give you a pretty good idea of how effective is available in the google play store

 

This app can also be used to check whether you have label security on an item. As a test, I went into a large shop, walked around with this app, tested many items and no-one said anything.

 

Update 05/07/2020: Details on how to make a booster bag to test your security system can be found here.

 

Update: 6/10/20

One of my clients was shown by a salesman of a security system that was claimed could detect if someone came into the shop with a booster bag and then went on to show that when a booster bag came into the shop that it set off the alarm. The idea is that the would-be thief hears the alarm and runs away.

However, when we tested it with the booster bag as above, it did not set off the alarm. I am sure it has to do with the density of the material. Our booster bag may not have been as dense as his. The problem here is that many items use aluminum,  you cannot have an alarm going off every time a pram comes into the shop. 

So I would suggest anyone thinking of purchasing such an alarm system to test it with their own booster bag. 

 

Cash Register cameras

POS SOFTWARE

All cash registers should be observed by a camera always as its one of the few pieces of evidence the courts do accept. If possible, this cash register camera should be behind the cashier on the wall, so it is out of immediate reach. It needs to display all the activities taking place at the cash register, including transactions, money counting and refunds. Too much information is never a problem.

If it cannot be done with one camera consider having more than one camera.

Here is a video of such a system.

Note you can if you want to put the text on the screen from our point of sale software too. This is something I do suggest as it makes it much faster and easier to match up the computer records to the video.

Another Major data breach this one at Cloudflare

POS SOFTWARE

 

Cloudflare it has been recently claimed has suffered a large security breach, and a number of major sites were affected such as Uber, Fitbit, OkCupid, etc. and we too. We use Cloudflare ironically as a security layer. Now some have started to spread nasty rumours about our point of sale site because some people like to do that about us a lot. Let me explain why I really doubt anyone needs to worry about us.

1) With this data breach, it is not yet clear that any hack ever happened. What we know is that it might have happened. It is very theoretical at the moment. It is a maybe hack. Say you left your security code for the shop on a sheet of paper at work. Did anyone read it, did anyone write them down, did anyone know about it and did anyone realise its significance? This is the situation with this hack.

2) Cloudflare was only an extra layer for extra protection, not our primary defence. Even if the Cloudflare layer was broken, a hacker would not get into anything. An example above might say that a person above now has your security codes for the shop, they still need a key to get in. At no stage did we give the key. Unlike many others, as recent events have shown who just use standard software, so get frequently hacked we are very careful about security here so we have never had a hack, touch wood!

3) Cloudflare is now contacting sites that they believe are affected by this possible hack, and we have not been contacted, suggesting that they think we are probably not affected.

4) We have only used cloudflare for a very short time, for much of the period in question with this data breach our website was not using cloudflare.

However, just in case, every user on our site has received from me an email about the situation, and we are now enforcing a forced password reset campaign so any user who wants to continue using our site as before must reset their passwords

Anyone wants to talk about it more, anyone wants to discuss further, I am more than happy to do so.

 

 

Your Retail Protective Key Performance Indicators

POS SOFTWARE

It's a good idea every month to check your Retail Protective Key Performance Indicators, to see what people at the point of sale are using. What these indicators do is gives you among other points a detailed breakdown for each operator on how many and how much no sale, voids, count, totals, refunds, negative items and discounts they are doing. Pay particular attention to unusual large numbers of voids.

To call it up, go to cash register reports. (see orange arrow)

Then select Staff and click on "Sales security indicators" (see blue arrow)

 

Select required period, you wish; I recommend doing it monthly.

As the report comes out with lots of indicators.

What you are looking for is that most thieves, have a method which works for them, and so they tend to use it almost all the time, as such one indicator is generally up. So what you are looking for is someone who has one item that is very high so what I do is, in the report ask it to divide the Item_Void_Total and the Refund_Total by the total number of transactions the person has done and compare those figures to the average that everyone's else has done. Anything significantly up on that average figure might mean something, Also another point to look for is that generally with an operator no-sales and voids tend to be linked, a high no-sales result tends to go with high voids and vice versa, but if one is high and the other is low it's worth investigating. This is actually shown nicely on the graph you can make from the report.

 

 

 

 

 

 

 

EFTPOS Skimming

POS SOFTWARE

 

Your EFTPOS unit can be skimmed in seconds, I have seen a video of two people skimming a unit in less time then it took you to read this, they skimmed a unit. If they had succeeded everyone who in that shop uses their EFTPOS on that unit will have their card details and pin numbers recorded by the thieves. The merchant would have probably spent the next few years in court and it would be expensive. Studies show most small businesses do not survive long a major skim.

It's a worry, in a recent discussion that I attended, we talked about this matter of EFTPOS security. I could not get an overall answer as few EFTPOS providers handle the units themselves as this is generally subcontracted. You really need to talk to your EFTPOS provider to find out, however, I could get an answer out of Tyro because they do not subcontract this out.

There is a series of systems in place to protect against these attacks although they do occur.

Sometimes they can be detected by the terminals. Tyro has a system of tamper resistance built-in. In the event the unit detects any hardware tampering; they will refuse to perform any transactions.

Depending on the type of attack, the terminals if it picks it up will display one of several messages, but generally, you would get something like this.

 

If this happens, the unit will no longer work and will need to be replaced.

 
The main unit used is a Yomani
 
 
 

now if you notice they are curved everywhere part of the reason for this is to prevent skimming hardware from being attached on top of this unit. Still you cannot be too careful.

Three tips that I do recommend you consider is

1) Use a highlighter and writing something like "Property of West Footscray Gift Shop" around on the EFTPOS unit. It just makes it harder for the skimmer to put his unit on top of yours as they need to duplicate your writing too.

2) Run your hand around the unit and make sure that there is nothing on it. I do that before I put any card on a terminal.

3) If you have an old EFTPOS unit, get it replaced, Tyro users can do this free of charge. They are just too dangerous these old units.

 

 

 

My cash register security tips for you

POS SOFTWARE

Here are a few security tips that over the years, that over the years I have found.

1) Do not use the same password for every cashier. Making them have separate passwords can enable you to track who was manning the register. Furthermore, have them regularly change it, including your own. A good tip here is write in your diary say once every year that all passwords are to be changed on this date.

And please do not use your name, everyone who works in the shop knows that.

If you want to check out how good, your password is, check it out here.

Do not put your password exactly in but a slight variation say instead of "aa" put in a "bb"

2) Check any transactions that were voided or canceled. This is a common method used to make stock disappear from a store. An alarm bell should ring, if someone returns an item that you have no record of selling.

3) Set up password-protected security on all computers. The computer without security is the one people wanting to hack are looking for.

4) Regularly go over your stock reports to make sales figures match with the computers.

5) Set up security cameras not only covering the shop but also the cash register too.

6) It is not enough to check your computer for virus; you need to check your router/modem. This is what actually takes you to the Internet. What happens is some virus will change the setting in your router allowing them to take control of all of your Internet usage.

I would suggest you test your router too.

I hope this helps.
 

Fingerprint scanners

POS SOFTWARE

Fingerprint scanners

The best security now for your point-of-sale system is fingerprints. I do admit that they do take some getting used to, you need to learn how to put your press your finger into the device but after a short time, you will find them a delight to use.

Here are three advantages of fingerprint scanners are.

1) It is the only identification system widely in use in retail that can verify with near certainty the identity of an individual. Security on passwords is always dubious. People you work with may know your passwords, but they certainly do not have your fingerprints. Unlike ID cards and passwords, people cannot steal them to gain access to places where they should not go.

2) It is faster, much faster than entering in passwords. We also tested it against swiped employee cards and found that it's about 1.4 seconds fasted then swiped cards.

3) Saves money and time as you no longer have to issue ID cards, which often tend to get forgotten, lost or stolen. In fact, you can stop producing such ID cards.