Installing malicious software created to breach brick-and-mortar POS components and software and acquire card info during transactions Create firewalls and router benchmarks, which set rules for permitting and denying use of your systems. Firewall configurations needs to be reviewed bi-on a yearly basis to ensure there aren't any defective accessibility https://www.nathanlabsadvisory.com/blog/tag/sama-cybersecurity-framework/