Mobile Card Processing Do’s and Don’ts

Credit Card Payment App Attached To Mobile Phone

Mobile Card Processing Do’s and Don’ts

Mobile credit card processing lets vendors take payments from almost anywhere and is becoming increasingly popular. According to a BI Intelligence report, the amount of businesses taking mobile payments will grow 80% from 2015 to 2020.

However, mobile processing brings with it unique challenges and potential weaknesses. By following a few key principles for mobile payment systems, users can ensure a smooth and secure process for both vendors and buyers.


1. Use Encryption

It’s important to only use fully encrypted credit card readers. Encryption at the point of transaction stops thieves from using skimming and hacking devices to steal credit card info.

2. Follow the PCI SSC Mobile Payment Acceptance Security Guidelines

Published by the Payment Card Industry Council, these guidelines include best practices for securing mobile devices along with other payment solutions. Knowing and following these guidelines goes a long way towards stopping many issues.

3. Train Employees on Mobile Security

Anyone who takes mobile payments should be trained on the basics of keeping purchases secure. Basic security training – such as locking up the mobile device locked between uses – will ensure secure mobile processing.


1. Use Rooted or Jailbroken Devices

Android devices that have been “rooted” and Apple devices that have been “jailbroken” have had factory settings overwritten. These devices may be considered more flexible. However, they are not supported by carriers, are far less secure, and are more likely to be involved in data breaches.

2. Store Credit Card Data

Some mobile payment processing systems allow for data storage on a mobile device when network service is not available. When the connection is re-established, transactions can be processed. This leaves that info – even when encrypted – more vulnerable to theft. This feature should be turned off when it is available in a mobile payment system.

3. Download Apps From Unofficial Sources

Mobile apps that come from official sources, like Google Play or the Apple App Store, have been reviewed for content and security. Apps that are downloaded to mobile devices from unofficial locations are not cleared through the same vetting process. Because of this, they may include malware and other security threats. These six principles ensure that mobile transactions are processed securely. Vendors who use these tips can take mobile payments without the worry of their data being compromised. If you want secured credit card transactions, contact the Austin offices of Authorized Credit Card Systems at 512-535-0120.

Leading through intentional change.


© 2023 Authorized Credit Card Systems