As we head into the new year, we reflect on our successes and share gratitude with our customers and partners who have helped us along the way. Your business has truly been a gift. We are excited to announce that our American Payment Solutions (APS) and North American Payment Solutions (NAPS) brands have a fresh new look in 2019. The brand change is one part of a transition that we are making to combine our two companies into one name for our global brand. APS and NAPS have been combined into one easily recognizable brand - APS Payments.
2 min read
Leading Payment Processing Provider Gets a Fresh New Look
By David Harper on Jan 8, 2019 6:45:24 PM
3 min read
Exciting Raffles Announced for Each 2018 Acumatica Road Show Location
By David Harper on Oct 3, 2018 2:57:35 PM
$7500 CASH! American Payment Solutions (APS), the leading integrated Acumatica payment processing solution and sponsor of 2018 Acumatica R2 Roadshows, Partners with Multiple Industry Leaders, Gives Attendees Multiple Opportunities for Cash prizes
2 min read
ClickToPay: Sage 100cloud Payment Processing and Repetitive Invoice Entry
By David Harper on Sep 25, 2018 2:06:55 PM
Service related companies may have a service contract, whereby a customer pays for recurring services. If you are using Sage 100cloud there is an easy way to set-up repetitive invoice entry for your customers depending on the billing cycle (weekly, monthly, quarterly etc.) Sage 100cloud users have the option of collecting payment for ALL invoices with Sage 100 ClickToPay Payment Processing.
4 min read
Credit Card Processing PCI Compliance in 12 Steps
By David Harper on Apr 30, 2018 11:08:00 AM
Credit Card Processing PCI Compliance: What can you do to protect cardholder data and meet security standards?
There is no easier way to become PCI Compliant than working with the experts at APS Payments. Back in the old days, criminals would rob banks and trains full of cold hard cash. These days, criminals try to steal credit and payment card data from exposed networks among other modern-day tactics that leave companies and card holders vulnerable. They are constantly searching for victims. Thankfully, the Payment Card Industry Data Security Standard (PCI DSS) was developed in accordance to credit card processing PCI Compliance standards with several layers of protection against theft. Here are 12 steps you can take to protect your cardholder data and facilitate the broad adoption of consistent data security measures on a global scale.
4 min read
SAP Business One American Express OptBlue Credit Card Processing: How to Get the Lowest Rate
By David Harper on Nov 2, 2017 6:24:52 PM
1 min read
Reduce Risk, Decrease Fees, Grow Revenue
By David Harper on Apr 6, 2017 2:03:54 PM
If you have 1 minute, watch the video.
2 min read
3 Reasons to Integrate APS with AccountMate ERP
By Liz Anderson on Apr 5, 2017 6:16:55 PM
This past month, our company announced our new integration for payment processing within AccountMate. This integration has added functionality and several key features that will increase the speed in which you process payments, automate the process, eliminate compliance issues, and drastically lower costs from the Card Brands.
2 min read
5 Considerations When Selecting a Credit Card Processor for Your Business
By Liz Anderson on Feb 8, 2016 6:30:47 PM
As a small to mid-sized business, accepting credit cards is paramount to your company success. Behind the scenes of accepting credit cards and keeping track of your inventory and/or services, you need a variety of solutions to run your business. A key aspect of accepting credit cards is selecting which credit card processing solution you should use.
3 min read
Urgent Reminder! PCCharge Ends Support 10/1/2015 - How to Stay PCI Compliant
By David Harper on Sep 11, 2015 5:04:00 PM
PCCharge has been providing a much needed service for ERP End-Users throughout the greater part of a decade, offering an on-site integrated credit card processing solution. The problem however is their solution is extremely vulnerable to hackers. The credit card data is not tokenized or stored in a vault and once a hacker gets access to the local server. Well at that point all the data is readily available for the taking.