Blog

Defend Against Dollar Stores: C-stores can protect their turf against value retailers by focusing on strengths and differentiation

This article originally appeared in a print edition of Convenience Store News, written by contributor Tammy Mastroberte. Convenience Store News' online content can be found here. Convenience Store Operators face competition from within the industry, as well as outside of it. This includes quick-service restaurants, drugstores and the expanding dollar...

Touchpoints: The New Point of Sale

The following has been reposted from Convenience Store Decisions. The original post can be found here. New touchpoints are challenging traditional point-of-sale (POS) systems used in the convenience/petro retail industry, as customer-experience-driven technologies, global solution providers and industry leaders look to move their companies forward. For example, as more convenience...

Generational Consumer Preferences: What Does It Mean for Your Business?

              We hear it all the time – “Millennials are killing ___”, with any number of products or services filling in the blank. Millennials are currently the largest generation of spenders, and will continue to be for at least the next 10 years [1]. For merchants, this means that the...

What Happened to Cryptocurrency?

In early 2018, in an email to a colleague, I wrote this about cryptocurrency, and it remains prescient even today: “Regardless of when this is being read, the cryptocurrency market will have wildly shifted within the last few days. As cryptocurrency remains prevalent in the news, merchants and all others...

Multi-Factor Authentication and Security Practices Within Office 365

Nearly all organizations experience incoming security threats. Whether it’s via email, malware, or otherwise, organizations must equip themselves with the set of tools to be proactive in blocking and defending themselves against such threats. Organizations in the financial and payment processing sector are unfortunately targeted at a higher rate than...

The Evolving Data Revolution

The following has been reposted from Convenience Store Decisions. The original post can be found here. Not so long ago, scan data meant monitoring how many of which items sold. It gave category managers a new response to vendors using purchase data to allocate shelf space. It relieved store employees from...

Visa and MasterCard Offer Rules Changes

The following article comes to us courtesy of Brian Kehn from HomeServeUSA, and describes rule changes that are current as of August 12, 2019. Visa and MasterCard have new rules related to merchants who provide introductory offers, up-sells and free trial offers that turn into an ongoing subscription.  The program...

Move Aside, CCPA?

It’s been about 2 months since we have posted about data privacy, and with the speed in which this ever-changing topic moves, that is far overdue. This article will highlight some of the latest developments in data privacy, including the scope of the legislation in Maine, Nevada, and New York,...

Mitigating Mobile Fraud via Machine Learning

Many retailers have been making the shift towards applications that allow users to shop and pay for products directly through their phones. This modern way of transacting creates new avenues for tech-savvy fraudsters to benefit. There are many ways to fraud a mobile payment app; reinstallation, dummy emails, multiple devices,...

Will Big Tech Become a Payments Disrupter?

In the payments industry we regularly hear rumors about the next big disrupter. Some of these disrupters materialize, some take a while (cough, cough, contactless card acceptance[1]) and some fizzle as fast as the rumors start. One of the latest and more interesting disrupter discussions is Facebook’s proposed cryptocurrency, Libra....

Circumventing Mobile Fraud Protections

With many payment channels, bad actors seek to take advantage of vulnerabilities to secure goods or funds at little to no cost to them; the same holds true for mobile payment applications. With each merchant mobile app implementation, different combinations and permutations of entry points for fraudsters arise, and in...

Verified by MonsterInsights