RSS Subscribe
Technology

Feature Story:

Here Comes October 1st: EMV Reader Deadline Looms For Franchisees »

By Tom Epstein

It's October 1, 2015 and a line of hackers is standing outside your store waiting for you to turn on your computer system. Why? So they can steal your customers' credit card data and sell it to the highest bidder, of course.
Okay, it might not be that bad (or at least that literal), but this is a date you can't afford to ignore: it's the deadline for merchants to have EMV-capable devices to read the new, EMV chip-embedded credit and debit cards--or face potentially ruinous consequences in the event of a data breach or hack.
EMV (Europay, Mastercard, and Visa), for years the card format standard in Europe, is now the standard for card issuers here in the U.S. Basically, the long-used magnetic stripe on the back of payment cards is being replaced with a chip that encrypts your data at the point of sale...

Feature Story:

It's Essential To Have A Strong Social Presence »

By Zach Wilson

Socialmediatoday.com claims, "there are over 2.206 billion active users, a global penetration of 30%." With nearly a third of the world's population interacting on social media platforms, you'll be hard pressed to find a brand that isn't active on social media. Some key reasons a brand would be wise to commit to a strong social presence are:

Brand Recognition
Social media puts you right in front of the consumer's eyes at a fraction of the price of a paid advertisement. Creating social content that speaks in a brand's unique tone and voice goes a long way.

Inbound Traffic
Having a large social following means more consumers are engaging with your promotions. More people seeing these promotions means more people actually visiting your site to get a better feel for your product or service...

Feature Story:

New Chip On The Old Card: October Deadline Looming For EMV Payment Readers »

By Tom Epstein

As you go about your day-to-day routine, you may have noticed some new ways to pay; and if you received a new debit or credit card recently, you also may have noticed the new chip embedded in it.
Grocery stores, coffee shops, pharmacies, and large national chains all seem to be installing new customer-facing devices to enter your credit and debit card information. For instance, you can now insert your card into a slot on the front of one of these new devices and enter a PIN. The device will read the encrypted information on your card's chip and pass that information, along with your PIN, to the card processor for decryption and authentication.
In essence, you are getting a double dose of security, unlike with a traditional swipe card, whose magnetic stripe data is easily read by any swiper in the event a physical card is stolen or lost...

Feature Story:

Multi-Unit Franchisee 'Strategies For Growth' Collection Available »

Multi-Unit Franchisee

Multi-unit franchisees who are looking to gain an edge on their competition have a new resource at their disposal. Franchise Update's Franchise Learning Academy has just released its "Strategies For Growth" Collection, a series of 14 video seminars, covering more than 20 hours of programming, and providing access to the insights, experience, and success stories of more than 40 multi-unit and multi-brand franchisees and franchising professionals.
The timely and topical information found on the videos comes straight from many of today's top multi-unit franchisees who have been there, done it, and successfully lived to tell the tale. Their invaluable advice can provide tips and insight for taking your business to the next level. All video seminars were produced at Franchise Update's Annual Multi-Unit Franchising Conferences in 2014 and 2015...

Feature Story:

Is Your POS System Safe?: 5 Critical Questions For Your POS Vendor »

By Brand Barney

While very skilled at installing systems, point-of-sale (POS) vendors often don't understand security basics and likely won't make your security their main priority. Obviously, this can lead to very poor organizational security. After all, your POS system harbors some of the most valuable information at your organization: customer credit card data.
Before hiring someone to set up your POS environment, there are five key questions you should ask. These questions are designed to help you weed out ignorant vendors that don't have your security best interests at heart.

Feature Story:

Cybersecurity Tips For Small Business Operators »

By Darren Guccione

From Target and Home Depot, to Apple's iCloud, Sony, and Anthem, it seems there's a new security breach announced every other week. Polls indicate that 50 percent of small- to medium-sized businesses believe they are immune to targeted cyber-attacks because criminals are more focused on large corporations. The reality is these companies are easy targets because they don't invest in new tools to defend against today's new breed of cyber attacks.  All companies, regardless of their size, are at risk.
Older, traditional security solutions are based on technologies that rely on knowing something about the attack, such as the vulnerability targeted, the malware used, or the reputation of the email sender. These tools may block basic known malware, but they are incapable of identifying today's dynamic, multi-vector, multi-stage attacks...

Feature Story:

Are You Ready?: New PCI Security Rules Will Require Changes »

By Giles Witherspoon-Boyd

Hopefully, you've heard that the Payment Card Industry Data Security Standard (PCI DSS) has changed... again. In November 2013, the PCI Council released PCI DSS version 3.0 and set the compliance deadline for January 2015. With only a few busy months remaining, many businesses (including franchisees) aren't even close to compliance with the new standard.
Why change the standard? Changing technologies often improve business efficiency, but aren't bulletproof to the weaknesses consistently found and exploited by hackers. New security regulations like PCI 3.0 are released to protect new technologies against recent hacking trends.
In my opinion, Requirement 4.1 is the biggest PCI 3.0 change for franchisees. Many franchises and chains use satellite communications to connect locations...

Feature Story:

Techniques To Hook Customers Online »

By Eric Groves

Before picking a date for a promotion or event it's important to understand how the various online resources at your disposal can work for your business. Since you want to attract and catch the attention of new customers, it's important to understand how they find information and -- more importantly -- how to ensure information shows up when and where they are looking.
When individuals look for information about events and promotions that might be of interest, they typically look in one of two places: online search engines (ponds of information) and social media (rivers of information).

Search Engines - Fishing in a Pond
Google and other search engines are constantly crawling websites for relevant content for their users...

Feature Story:

Businesses Unite!: Three Ways To "Share Local" And Make Your Business Stronger »

By Eric Groves

Local businesses are stronger together than alone. Your competitive advantage is derived from the local and industry knowledge you possess along with the market power (resources that enable you to attract and retain customers) built. As you forge relationships with other local businesses, you all grow stronger by gaining access to the collective knowledge and power of each other.
One of the simplest ways to demonstrate support for local business, while encouraging other local businesses to lend support back to you, is to "Share Local."
Share Local is the simple act of sharing something another local business is doing with residents. Successful local businesses have resources (typically email lists or Facebook followings) for sharing interesting content with customers...

Feature Story:

Phishing - Don't Get Hooked!: The Basics On Avoiding This Old-School Scam »

By David Ellis

Phishing may be old news, but it still works. Ongoing education about phishing scams is essential for anyone who uses your system. It doesn't matter if you have the most secure security system in the world. It only takes one untrained employee to be fooled by a phishing attack and give away the data you've worked so hard to protect.
As part of your security awareness program (PCI requirement 12.6.1), your personnel should be trained at least annually on phishing. I recommend sending monthly memos, or displaying a poster outlining the telltale signs of a phishing attempt. (You can also hang this article in your break room!)
Phishing continues to remain a lucrative criminal profession in our email-packed world. Hackers send out more than 150 million fraudulent emails daily, hoping just a few will click on attached links, documents, or pictures (80,000 people fall victim to these scams each day)...

Feature Story:

Social Media Tweaking: 3 Ways To Benefit From Paid Ads And Boosted Posts On Facebook »

Multi-Unit Franchisee

Social Media Tweaking: 3 ways to Benefit From Paid Ads and Boosted Posts on Facebook

It seems nothing changes faster than the big social media platforms - Facebook, Twitter, and Google+. No sooner do marketers figure out how to best promote a product or business than they change the rules!
That's been especially true for Facebook, which had to find new ways to make money after going public two years ago. Twitter has also been making changes since its IPO in November, but most of them - including a visual redesign, tagging people, and uploading multiple photos - are geared toward user friendliness. Even Google+, owned by Google, which went public way back in 2004, is constantly tweaking.
But the tweaks bringing the most squeals of protest are those being made by Facebook...

Feature Story:

What's Going Online?: Multiple Studies Outline How Millennials Use Social Media And The Web »

Multi-Unit Franchisee

More and more Millennials are leveraging their social media platforms and the Internet for nearly everything. From news to updates on their friends' whereabouts, Millennials are more active with their social networks and communities than any other generation. Their activity on social media shows their true digital native capabilities.
A study by eMarketer shows the time Millennials and Millennial mothers spend with applications on their smartphones and mobile sites. With an average of 1,850 minutes spent using smartphone applications per month, Millennials ages 18 to 32 are the most active users. Specifically, mothers with young children, in 2013, the highest percentage of smartphone users are actively using their weather, social, and maps/GPS applications...

Feature Story:

Lights, Camera, Action: First-ever Multi-Unit Franchising Conference Video Collection »

Multi-Unit Franchisee

This 2014 first-ever Multi-Unit Franchising Conference Video collection includes 11 key featured sessions and over 12 hours of video. You can bring the conference home with you and enjoy these educational programs anytime, anywhere as it is cloud-based.

Cameras were on the scene at this year's Multi-Unit Franchising Conference April 23-25 at Caesars Palace in Las Vegas. That's because Franchise Update's Franchise Learning Academy was documenting the educational sessions throughout the event.
The Franchise Learning Academy, which was launched last fall, is developing a series of instructional and informational video programs about all aspects of building and operating a franchise business.
Therese Thilgen, Franchise Update's CEO says, "With the development of the Franchise Learning Academy, attendees and non-attendees of our events can take the conferences back to their office and share the information and presentations with their staff, while possessing access to the speakers and materials from the conference...

Feature Story:

Prevent Hacking Horror Stories: 3 Online Security Failures To Learn From »

By David Ellis

We hear hacking horror stories every day. Businesses around the world call us in a panic, needing to decipher what went wrong with their security. Unfortunately, for many franchisees and franchisors, these miscues are common. My hope in sharing some details from three actual security failures is that you will discover actions you can take to enhance your own IT security practices.
1) Pass the pepperoni and passwords, please. Several small pizza chains used the same restaurant management software and POS system. Sadly, hundreds of those restaurants were hacked.
Once each restaurant's POS system was configured, the local restaurant owners did not change the default password set by the payment application vendor. A hacker easily deduced the password, infiltrated each POS system, and installed a memory scraper (malware designed to "scrape" sensitive information from system memory)...

Feature Story:

Protecting Customer Data: Identify And Remediate Online Vulnerabilities Now! »

By Luke Engelhardt

Do you know there's an easy way to identify and predict how cybercriminals might get into your organization? Fortunately for already-busy franchisees, the process isn't as complicated as you may think. Vulnerability management is the simplest way for franchisees to locate and patch security holes before would-be data thieves find and exploit them.
Vulnerability management is the process, implementation, and controls that identify the location of weaknesses in an infrastructure that could act as secret tunnels into your network. Ultimately, it's a critical foundation on which to build your business's network security.
While there is no such thing as being hack-proof, data thieves and cybercriminals are notoriously lazy. They would much rather go after low-hanging fruit than invest the time and trouble to break into a secured network or website...

Feature Story:

Technology Backlash: Good Old-Fashioned Personal Touch Can Bring Business Success »

Multi-Unit Franchisee

Hello? Is anybody there?
One of the biggest problems sales people face with social media and technology is the lack of real, meaningful contact and communication.  Sure, it's quick and easy. But when it comes to closing deals, does it really produce the results you need? These lessons can also apply to franchisees and their employees.
Joanne S. Black, author of the new book Pick Up the Damn Phone! How People, Not Technology, Seal the Deal, is on a mission to help people learn the importance of personal contact.  Her manifesto is simple - to make a real connection and achieve true, meaningful communication, you have to make a personal and even in-person contact. Her goal is to get people to tweet less and talk more to the customers and contacts who really matter...


Learn More

2016 Mega 99    

Multi-Unit Franchisee Magazine

Issue I, 2016

Multi-Unit Buyers Guide    

2015 Multi-Unit Buyers Guide

Special Edition

Top Opportunities »

A Franchise Update Media Group Production
Franchise Update Media | P.O. Box 20547 // San Jose, CA 95160 // PH. (408) 402-5681
Copyright © 2001 - 2016. All Rights Reserved. Site Hosting Provided By: wishVPS on FUMG3

In Loving Memory Of Timothy Gardner (1987-2014)