3 Steps to Overcoming Security Challenges in POS Systems