SECURITY GUIDELINES FOR ATM S AND CARDS

Size: px
Start display at page:

Download "SECURITY GUIDELINES FOR ATM S AND CARDS"

Transcription

1 SECURITY GUIDELINES FOR ATM S AND CARDS

2 ATM security in Russia and in the world

3 According to the data from the worldwide ATM Industry Association (ATMIA), 2.2 mln ATMs are installed in the world now. The total volume of the production and operation expenses for these devices reaches $22.5 bln. According to the ATMIA statistics, the amount of the registered fraud cases with self-service machines increased by 32% in 2014 in comparison with 2013, and the losses resulting from these criminal actions were $159.6 mln. «$59,6 million dollars annual losses from ATM fraud in the world» As analysts note, increase of attacks with use of a new line of skimmers that continue to reduce in size and extension of geography of use of malicious software are the trends in the sphere of ATM fraud Skimming Gas & Explosive Types of attacks on ATMs have a tendency to rise Card & Cash-trapping Ram raids Malware & black box ATM burglary Vandalism Non-malware cyber... Attacks on customers Insider collusion Cash-in-transit «83% of cases were skimming registered in the USA» According to the official data from Association European ATM Security Team (EAST), most of the losses fall on skimming. Regarding this, 83% of them have been registered in the USA. Most of the losses incurred from ATM skimming of an international character (the losses caused by criminals who use the stolen card data outside the national territories of countries). The main part of these losses falls within the countries beyond Europe. 83% ATM losses associated with skimming 44% 44% In Russia in 2014, the number of bank-card frauds increased (on average) by 30%. According to experts estimates, over 57% of an unauthorized use of clients bank cards results from skimming. «57% of the unauthorized use of clients Bank cards results from skimming happens in Russia» According to the Central Bank data, the card fraud losses reach 0.01% of the total volume of card operations. Only in Quarter II of 2014, the volume of card operations of the Russian banks reached 7 tln rubles. The sum of fraud losses of banks and their clients constituted about 700 mln rubles. Therefore, skimming is the leader among all kinds of bank card frauds in Russia and in the world. 33% USA THAILAND INDONESIA DOMINICAN REPUBLIC 22% 22% CAMBODIA BRAZIL ATM security in Russia and in the world 4 5

4 «More than 700 million roubles the sum of the losses of Russian banks and their customers from skimming» The second popular type of ATM frauds (after skimming) is cash trapping capturing of cash with a special ATM trap at the moment of its dispense by an ATM. Cases when cash traps were used for capturing the cash dispensed to a client (cash trapping) have been registered in 12 out of 21 member countries of the Single Europe Payment Area (SEPA) of Association European ATM Security Team. Direct attacks on banking centers carried out (as a rule) with use of a heavy construction machinery (ram raids attacks) and targeted at stealing ATMs have been registered in nine countries of EAST. «Оver 50 cases of ATM robberies are registered in Russia every year: MasterCard Members Association» The ATM position sensors tracking the attempts of ATM burglary of different types are aimed at resistance to physical attacks at ATMs. The ATM video surveillance system is intended to solve another widespread problem - claim cases appearing in situations when the ATM does not dispense cash at all or dispenses it partially, and to provide protection of card holders against fraud, protection of bill collectors at loading/unloading the ATM, and against vandal actions. Another urgent problem is installation of skimmers directly on the doors of bank spaces in the 24/7 service areas. This type of fraud may be counteracted by an anti-skimming system of the ATM access restriction Anti-skimming Card Access intended for increase of clients security at performance of transactions and restriction of access to the ATM for unauthorized persons. Another type of fraud gaining popularity is cyber skimming: ATM infection with a virusware (ATM-Malware), and installation of malicious software for theft of cash by taking control of the ATM cash module (Black Box and ATM Jackpotting). Criminals infected over 50 ATMs in East Europe (including Russia), USA, India and China in An ATM service unit may be protected by an electronic lock with a remote monitoring and control function which restricts access with the help of secure contactless cards. Nine countries of SEPA have registered cases when banking centers were under direct attacks with use (as a rule) of a heavy construction machinery (ram raids attacks) that were aimed at stealing ATMs as well as cases of burglary of the ATM safes. Seven countries have reported about the incidents of ATM blasting with use of household gas; the number of such cases throughout Europe is steadily growing. Contactless payments are winning the payment market due to a high speed of transaction execution, high reliability of the payment tool and terminals (the level of mechanical wear is lower, vandalism protection) and low cost of micro payments in comparison with swipe cards. NFC technology in the sphere of banking applications makes possible use of a more modern solution (not limited by bank cards) instead of a magnetic stripe. Types of fraud with use of NFC technologies are also gaining popularity now. Last year Russia turned out to be the leader among the European countries by the rate of growth of losses from the fraud operations with bank cards. The volume of losses increased by 27.6% in comparison with 2012 (up to mln Euro) and constituted 4.6 billions rubles. Despite an imperfect security level, an online payment system has gained universal expansion in the world. In 2014, the number of chips in use exceeded 100 million. There are no actual analogues for the cards of such a standard. The only reliable method of protection against threats of an unauthorized access to NFC-cards is a protective coating made of the materials that prevent information reading. Client security is the key objective of any bank. At present, to avoid any installation on ATMs and payment kiosks of the devices for an unauthorized information reading from plastic cards, a great variety of anti-skimming devices is used: the passive fraudulent device inhibitors and the anti-skimming devices that cause an electromagnetic interference directly into the zone of possible location of the skimmer; these devices prevent correct copying of the data from a card magnetic stripe. However, as practice shows, the most efficient method of antiskimming protection (from a practical standpoint) is use of the devices of active countermeasures for an unauthorized reading of the data of a plastic card magnetic stripe when the card is used in ATMs and other self-service terminals. Their operational principle is based on creation of a protective field that causes interference and falsifies the data obtained by the skimmer. A series of the hi-tech anti-skimming solutions of Company PBF GROUP is the innovation that ensures a reliable protection of ATMs and payment cards. ATM security in Russia and in the world 6 7

5 Our clients The anti-skimming solutions of Company PBF GROUP based on a reliable protection and ease operation have shown an excellent performance in many leading banks of Russia and the CIS countries. «7 out of top-10 largest Russian banks use the PBF GROUP products. Our clients: AO Raiffeisenbank, VTB 24 (PLC), Bank of Moscow, Credit Europe Bank Ltd., ZAO Citibank, JSC Alfa Bank, RosEvroBank (JSC), VPB bank, Gazprombank, Banca Intesa, Russian Standard Bank etc. StopSkimmer Product line 8

6 StopSkimmer an active anti-skimming protection. It is intended for protection of ATMs and payment kiosks. Hi-tech protection against cash theft and an unauthorized access to the ATM service area. What is unique about the StopSkimmer solution? The operational principle of StopSkimmer is based on a unique method for creation of a quasi-harmonic signal modulated by a noise signal. Adding of the noise component to the processor generated signal makes possible to make the electromagnetic field of the proposed device non-repeating (non-cyclic) and, as a result, it is impossible to reproduce such a filed, thus providing a reliable protection of the ATM against skimmers. A state-of-the-art multi vendor solution whose uniqueness is confirmed by patent No of ATM protection device, an external field generator of the device. Indication of the presence of attacks on ATM StopSkimmer Product line front panel Why do clients choose the active anti-skimming StopSkimmer from the PBF GROUP? Indication of power structure and functioning of the protective field At present, to prevent installation on ATMs and payment kiosks of the devices of an unauthorized information reading from plastic cards, a great variety of protection devices against skimming is used: the passive fraudulent device inhibitors and the anti-skimming devices that cause an electromagnetic interference directly in the zone of possible location of the skimmer; these devices prevent correct copying of the data from a card magnetic stripe

7 An anti-skimming active-passive protection device. A radiating active-passive module is integrated into the anti-skimming devices of a unique multi-planar shape. A super-thin card slot prevents inside installation of a skimmer. Proprietary technology of the radiating active-passive module does not influence the ATM standard operation. Variants of installation of an active anti-skimming protection: A radiator may be installed inside the ATM and be invisible to the client. To increase the solution security level, the radiator may be installed inside the anti-skimming device of a unique multiplanar shape. At an attempt of damaging or cutting the anti-skimming device and system dismantling, the ATM goes into the out of service mode and send an alarm signal to the ATM monitoring system or to the console of the bank security department. Skimmer detection system. Possibility of power off the card reader at an attempt of cutting Availability of the means that prevent dismantling of the protection device A multi-planar shape makes installation of skimmers significantly difficult. Аttractive rates The system for detection of vandal actions with the ATM detection of drilling the ATM, damaging of the ATM front panel for penetration into the ATM service module. Strengthened design A window for the client s logo The ATM position detection and an alarm system (tilting, theft). StopSkimmer Product line A narrow slot in the area of a probable installation of a skimmer Cutting protection An alarm system loop Multiplanar it eliminates the possibility of a form of geometric repetition intruders 12 13

8 No one but our clients is able to tell you better about the cost efficiency of our devices: «During the period of use of the StopSkimmer 3.0 system, there was not detected any confirmed fact of a bank card compromise at use of the skimmers intended for installation on ATMs and the self-service terminals». Golenischev A.A. Director E-Busines Monitoring, Alfa Bank «During use of the StopSkimmer 3.0 system, there was not detected any confirmed fact of the bank card compromise at use of the skimmers intended for installation on the ATM». Petrov A.A. Director of Processing at Promsvyazbank «The submitted device makes possible to reduce the risk of an unauthorized access to the information on the card details and its PIN-code, thereby securing a legal card holder against execution of fraud transactions, including an unauthorized cash withdrawal from the holder s card account through the ATM. In addition to the passive protection devices of the equipment manufacturer, this solution makes possible to significantly increase the security of devices». Novikov A.A. Head of Remote Banking at B&N BANK JSC The system of protection of the self-service machines against Cash Trapping «The StopSkimmer 3.0 device shows excellent results by reliably protecting the ATM against possibility of the bank clients card data theft. The price of this device is rather competitive, even in comparison with the other domestic manufacturers as the provided set includes an anti-skimming device. The StopSkimmer 3.0 device performs not worse than the ones of foreign manufacturers but the price is several times lower». Kazak A.A. Deputy Director of the information systems management and support board at Baltiyskiy Bank «When testing the active anti-skimmer StopSkimmer 3.0, no errors were detected in operation of hardware and software. The device proved to be reliable and failure-free in operation; there were not detected any conflicts with the ATM equipment». Peytchev D.A. Deputy Head of POS-Terminal Division Bank ZENIT 14

9 Solution of the PBF GROUP on protection against Cash Trapping efficiently counteracts cash trapping with a special ATM trap at the moment the ATM is dispensing the cash. It is based on installation of a specially developed system in the ATM presenter; the system prevents installation of the forks and does not damage the ATM internal parts and mechanisms. Why do clients choose the PBF GROUP solution on protection against Cash Trapping? Multi vendor solution Unique high security design Reasonable cost Ease in installation and maintenance The system of access restriction to the ATM service part StopSkimmer Controller ATM Advanced/Standard 16

10 The system is intended for security increase of clients at performance of transactions, access restriction to the ATM service part for unauthorized persons, and prevention of vandalism acts. The system makes possible reduction of indirect costs for the bank facilities operation, and an increase of the comfort level of customer service The system includes: 3 3 A unique key lock for the ATM service part with a set of keys that was developed and installed instead of a manufacturer s standard lock (NCR, Diebold, Wincor-Nixdorf, OKI, Nautilus Hyosung etc.) An electromechanical lock that prevents the ATM opening with standard keys. The lock is opened with the electronic key (the reader) controlled by a controller The reader of contactless access cards of the EmMarin standard with a set of cards (keys); the reader is integrated into the ATM body The reader of contactless access cards of the EmMarin standard with a set of cards (keys); the reader is integrated into the ATM body Software Variants of the system completing: АТМ-Standart: : a unique key lock with a set of keys АТМ-Standart +: an electromechanical lock for the ATM service part, a contactless access cards reader with a set of cards (keys) of the EmMarin standard, a lock controller without connection to the online monitoring. АТМ-Advanced: an electromechanical lock for the ATM service part, a contactless access cards reader with a set of cards (keys) of the EmMarin standard, a lock controller, connection to online monitoring, remote downloading of allowed access cards, remote lock blocking/opening Possibilities and advantages: 4 5 ATM-Advanced options ATM-Standart+ options The tilt sensor Proximity reader 6 ATM-Standart options The system of access restriction to the ATM service part Possibility of the ATM access restriction for persons without the card (the key) required for getting an access to the ATM service part; Remote control over electronic keys A unique key lock cylinder Vibration sensor The door opening sensor (optional) Electromechanical lock Unique larva 18 19

11 The on-line system management and monitoring: Remote lock/release lock Remote configurable list of allowed/forbidden cards Viewing the event log Remote analysis of system health СONTROLLER Proximity reader identification cards with encryption An anti-skimming system for the ATM access restriction Anti-skimming Card Access Electromechanical lock The door opening sensor The tilt sensor ATM Vibration sensor The power supply 12 V The system of limiting access to the service of the ATM 20

12 Anti-skimming ATM Lobby Card Access Control defies any skimming attacks and offers intelligent networked capabilities Skimming is difficult to detect and card details will be copied with details used across the world with no immediate connection to where the card was skimmed. Card skimming is a major global crime where the fraudsters will continue to find new ways of illegitimately extracting cash. Once captured, the electronic data is put onto a fraudulent card and the captured PIN is used to withdraw money from accounts. Skimming is growing a world-wide problem. Nowadays, increasing facts of skimming attacks on ATM Access Control Rooms. Criminals set skimming devices near or over ATM Access Control Swipe or Insert Readers to capture data from the magnetic stripe. Anti-skimming ATM Lobby Card Access Control is designed for increasing safety and security of bank clients and to prevent access of unauthorized persons. This system allows to cut building maintenance cost and to bring up level of comfort of bank services. The withdrawal from readers in the ATM/bank access system cannot solve the problem, because intruders installs skimming device anyway and clients will use skimming reader and cards are skimmed. An anti-skimming system for the ATM access restriction Anti-skimming Card Access 22 23

13 Anti-Skimming magnetic stripe reader is designed for Track2 reading. Available to order in two cases: External StopSkimmer Reader OUT. Internal StopSkimmer Reader IN. What is StopSkimmer Reader? Anti-Skimming magnetic stripe reader is designed for Track2 reading. Rim lock bolt to hold down the reader. Specific frame-protective elements to prevent skimmer placement over the reader StopSkimmer Reader OUT Internal LED indication. Anti-vandal sensor. Built-in camera to analyze reading cards and monitor unauthorized scenarios of reader usage. Guarding blocks to prevent any possibility to place skimming reader close to system s reader. Reader status. Card always inside reader. StopSkimmer Reader IN allows to make Anti-skimming ATM Lobby system imperceptible and increases security. An anti-skimming system for the ATM access restriction Anti-skimming Card Access StopSkimmer Reader IN. Patent pending

14 What is StopSkimmer Reader Controller? Anti-skimming ATM Lobby Card Access Controller is used to Management and remote Monitoring. You can update the ATM lobby door, open and close schedule times, download card audit trail, lock or unlock a location, update accept tables, manually check the status of all. Software supports local and remote programming. Any number of controllers can be configured simultaneously on demand or by the schedule upload function, which allows batch programming to be performed during off peak hours. Possibilities and advantages Remote update accept tables. Remote programming. Real-time monitoring. Patent pending. High reliability Easy to install StopSkimmer Reader Controller Access to the ATM for plastic cards holders serviced at this ATM only. Access limitation to persons, who do not have plastic card(s) serviced at this ATM. Monitoring Motion sensor in the self-service area. Control time spent time client in the ATM service area.. StopSkimmer Reader Controller front panel Flexible system configuration, available add-ins for any customer aims. Option to connect controller to the internet with remote administration and configuration. An anti-skimming system for the ATM access restriction Anti-skimming Card Access 26 27

15 What is Monitoring System? Monitoring and Control server is a system of gathering, storage and presentation of statistics of Anti-skimming ATM Lobby Card Access Control network operation. Features and Benefits Real-Time alarms monitoring. Data export into the other applications, report preparation. On-line system info. Safe storage alarms, when your internet connection, between StopSkimmer Controller and Server was lost. Keep-Alive messages. Remote update accept tables. Remote programming. Friendly GUI. Available to use of lowproductive internet communication(gprs,cdma,3g). Access of system administrators to information in compliance with the accepted delimitation of rights and security strategies. The system of ATM protection against theft No one but our clients is able to tell you better about the cost efficiency of our devices: «There has not been any confirmed fact of the bank cards compromise with use of the skimmers intended for installation on the systems of access restriction to the ATM zones during two years of use of the Anti-skimming Card Access system (StopSkimmer). The Bank would like to express its gratitude to Company PBF GROUP for installation and implementation of the Anti-skimming Card Access system (StopSkimmer)». Danilevsky A.G. Executive Director of the Department of Investigations and Asset Protection of Raiffeisenbank 28

16 It makes possible to prevent the attempts of stealing the ATM from the place of its fixed installation. High resistance to physical impacts (tear off, unauthorized movement, ATM steal) Technological solution to ensure the maximum security Fast and simple installation for ATMs of all types Completely concealed installation of the fastening components of the protection set. A video surveillance system for ATMs and financial terminals SyVision A specially developed steel platform is screwed to the ATM and the floor. At attempt of tearing off the ATM, the platform with a unique flexible secure design is deformed and prevents from tearing the ATM from the fastening components. Contrary to the standard fastening with anchor bolts, the System possesses a sufficient flexibility and cannot be destroyed at a physical impact. 30

17 In a time of high volatility and uncertainty, all banks look for ways to cut costs. A cost-benefit analysis is required to reduce costs, lower risks and increase client loyalty. An automated video surveillance system enables retaining a positive attitude towards a bank while enhancing the bank s image and prestige. Resolving disputes regarding non-dispensing cash or the failure to dispense the full amount of cash entails a complicated and unpleasant procedure, but it does happen, especially in the case of a financial crisis. In particular, a cash shortage at an ATM can result from actions by a dishonest client, who takes some bills from the middle of the roll of bills and then allowed the bills to spew out, after which he claims that he did not actually receive any money on that occasion. Investing in an automated video surveillance system can result in a significant reduction of unjustified payments to clients and, most importantly, it can improve a bank s competitiveness - your bank. A prompt and clear solution to disputes is a sign of a bank s importance. The SyVision video surveillance system for ATMs and Financial Terminals enables video surveillance recording and the subsequent search for videos according to event, thereby increasing the efficiency of video archiving. A range of turn-key solutions for NCR and Diebold Opteva ATMs. Why the PBF Group : The capability to equip any ATM from any manufacturer. A wide range of ready-made solutions for NCR and Diebold Opteva ATMs. Building systems using video recorders and video capture boards from leading venders. A variety of options in terms of video surveillance systems. Wide experience in installing the system. On-site system installation. Designs of all forms of decorative panels, colors, and with the bank s corporate brand logos. Components of the surveillance system may be located outside of the ATM in the BoxVision upper protective box. Features: Unique design, reliable performance of quality materials. The existence of a regular place for the StopSkimmer. The BoxVision color options correspond to ATM colors, the decorative vent perforation fits easily with ATMs design and customers take it as a whole. A large obverse mirror glass is an addition to the rear-view mirror, producing a wider picture behind the client and improving safety. The obverse mirror glass with the possibility of installing a portrait camera along the length of the glass, with an external support system, does not allow to squeeze the glass out. The flexible performance of internal filling and fixtures. A reinforced hinge arranged along the length of BoxVision with protection against being knocked out. A video surveillance system for ATMs and financial terminals SyVision 32 33

18 No one but our clients is able to tell you better about the cost efficiency of our device: Over 2,000 video surveillance systems SyVision has been successfully installed by now. Not less than 1,500 of them are installed at AO Raiffeisenbank and Credit Europe Bank Ltd. «Our more than a four-year-long experience of a successful use of the video surveillance system SyVision completely confirms the correctness of our choice. Composition of the functions and performance of SyVision allows us to speak about its full compliance with the up-to-date requirements for security imposed by the Bank on the ATM network operation and servicing. The system ensures protection of the card holders against fraud, protection of the bill collectors at ATM loading/unloading, and protection against vandal actions; it absolutely excludes appearance of claim cases in the situations when the ATM does not dispense cash at all or dispenses it partially». Protection system against blasting ATMs open with combustible gas «Due to use of the video surveillance system SyVision, Company PBF GROUP managed to reach high indices of the security level at ATM use and significantly reduce the Bank s financial losses related to the frauds at cash withdrawal from ATM». «Video surveillance system SyVision has passed a successful testing on the ATM OKI ATM Recycler G7. The product SyVision is recommended for OKI ATM commercial operation» Makeev D.S. Chief Expert of the European Innovation LLC 34 35

19 The system is intended for prevention of ATM burglary with use of a gas injection and its further explosion. It provides gas deteсtion and online transmission of an audible alarm signal to the guard console and the bank remote monitoring system still before the explosion. The integrated alarm horn and alarm light make a psychological effect on the intruders. The system includes: Gas analyzer Alarm horn Alarm light (option) АТМ tilt sensor Vibration sensor Gas analyzer Alarm horn Alarm light (option) АТМ tilt sensor Vibration sensor 5 Protection of the wireless NFC-payments The system of online control and monitoring Transmission of an audible alarm signal to the guard console Transmission of an audible alarm signal to the bank remote monitoring system Remote performance analysis of the system 36

20 At present, the tags on the base of the Near Field Communication (NFC) and radiofrequency tags (RFID) are provided for many everyday products, including the credit and payment cards, driver's licenses, identification cards, passports, subway passes and travel cards etc. An electronic theft (e-pickpocketing) is a new term to define information stealing from a card without making any contact with it. As technology RFID is based on a wireless communication, the signals may be read even when you are beyond visibility. Anyone who is at a short distance may read the information with a portable reader. REQA ATQA The picture above illustrates such a remote capture, showing data request from the ATM and return of the card data. This signal is recorded in a few meters away from the wireless card reader. The PBF GROUP solution for protection of the wireless NFC-payments: About Company A special coating developed with use of a unique technology. Blocks signals at the operating frequencies used for a contactless reading of information from the microprocessor. Ensures protection against threat of an unauthorized access to the NFC-cards. NFC

21 The PBF GROUP was founded in 2002 to provide professional services to banks and other banking organizations. Our company s range of capabilities and our staff s skills and experience is such that they allow us to contribute to such efforts at any phase, beginning with problem identification and goal setting to providing maintenance and technical support for all components delivered. We do not apply standard solutions all of our products are the result of the proprietary designs of our professional team, which are suitably customized. You can be confident in the quality of our products thanks to our multi-level quality assurance procedure, which each of our devices goes through. About Company FADEEV Evgeny Founder and Executive Director PBF Group Graduated from the Moscow Aviation Institute in 1970 with a major in radioelectronic devices. In 2002, the PBF Group introduced a line of ConnecTR communication equipment for the transaction routing of Verifone (Hypercom) POS-terminals. In 2005, the PBF Group became the official dealer of Verifone (Hypercom), a leader in the development of secure electronic transaction technologies. In 2006, the Company, together with Raiffeisen Bank Austria, completed the transition to the new generation of Verifone (Hypercom) POS-terminals. Since 2006 the Company has been analyzing ATM and financial POS-terminals protection methods, and developing a new individual video surveillance system for Opteva Diebold automatic teller machines without established video surveillance positions. In 2010, PBF Group integrated unique technologies and researches in antiskimming device - StopSkimmer. Nowdays, more than 2000 units of has been installed globally and has a fast growing. In 2012 we introduced Anti-skimming ATM Lobby Card Access Control. Security and technical system benefits were developed with close cooperation with security experts of JSC Raiffeisenbank, based on large knowledge in skimming problems. In 2015 PBF Group introducing unique security solutions: anti Cash-Trapping solution, anti Wire - Tapping, NFC antifraud solution and solution stopping super thin skimmer (micro blade skimmind devices). Graduated from the Moscow Aviation Institute in 1970 with a major in radioelectronic devices. Created various radio electronic device constructions. In the mid 1980s, Mr. Fadeev became keenly interested in microprocessors and related equipment, which, in turn, led to focusing on automation within the banking sector. In 1994, Evgeny Fadeev participated in the process of software installation and the adaptation of NCR automatic teller machines, which were among the first ATMs in Russia. In 1996, Verifone (Hypercom), one of the world s leading developers of banking solutions, opened the Moscow engineering office and Mr. Fadeev was appointed as Technical Director. Evgeny Fadeev continued to work at Verifone (Hypercom) until 2002 and oversaw the implementation of many technical solutions during his term there. Mr. Fadeev served as Director General (CEO) during his last three years of employment with Hypercom. After leaving Hypercom, Evgeny Fadeev founded the PBF Group. О компании 40 41

Anti-skimming ATM Lobby Card Access Control

Anti-skimming ATM Lobby Card Access Control Anti-skimming ATM Lobby Card Access Control READER Anti-skimming ATM Lobby Card Access Control Skimming is growing a world-wide problem. Nowadays, increasing facts of skimming attacks on ATM Access Control

More information

PCI and EMV Compliance Checkup

PCI and EMV Compliance Checkup PCI and EMV Compliance Checkup ATM Security Jim Pettitt Director, ATM Security Diebold Incorporated Agenda ATM threats today Top of mind risk PCI Impact on Security U.S. EMV Migration Conclusions / recommendations

More information

Video Intelligence Platform

Video Intelligence Platform Security Whitepaper Five Tips to Fight ATM Skimming ATM skimming is a global crime that incurs annual losses of $1 billion. At the basic level, thieves seek to extract cash from bank accounts; however,

More information

ATM FRAUD AND COUNTER MEASURES

ATM FRAUD AND COUNTER MEASURES ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

Using Contactless Smart Cards for Secure Applications

Using Contactless Smart Cards for Secure Applications Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,

More information

INTRUSION ALARM SYSTEM

INTRUSION ALARM SYSTEM INTRUSION ALARM SYSTEM Case studies reveal most burglars are deterred by the mere presence of an alarm system. Burglars attack unprotected premises considerably more often than ones protected by alarm

More information

COMITÉ EUROPÉEN DES ASSURANCES

COMITÉ EUROPÉEN DES ASSURANCES COMITÉ EUROPÉEN DES ASSURANCES SECRETARIAT GENERAL 3bis, rue de la Chaussée d'antin F 75009 Paris Tél. : +33 1 44 83 11 73 Fax : +33 1 44 83 11 85 Web : cea.assur.org DELEGATION A BRUXELLES Square de Meeûs,

More information

Using Contactless Smart Cards for Secure Applications

Using Contactless Smart Cards for Secure Applications Best Practices Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005e-en Edition: 04.2012 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse

More information

Policy for Protecting Customer Data

Policy for Protecting Customer Data Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees

More information

Preparing for EMV chip card acceptance

Preparing for EMV chip card acceptance Preparing for EMV chip card acceptance Ben Brown Vice President, Regional Sales Manager, Wells Fargo Merchant Services Lily Page Vice President, Wholesale ereceivables, Wells Fargo Merchant Services June

More information

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard Table of Contents For more than 40 years, merchants and consumers have used magnetic stripe credit cards and compatible

More information

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online. 1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful

More information

Protecting the POS Answers to Your Frequently Asked Questions

Protecting the POS Answers to Your Frequently Asked Questions Protecting the POS Answers to Your Frequently Asked Questions PROTECTING THE POS What is skimming? Skimming is the transfer of electronic data from one magnetic stripe to another for fraudulent purposes.

More information

What is a Smart Card?

What is a Smart Card? An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types

More information

Physical Security Checklist and Inventory

Physical Security Checklist and Inventory Tool 1: Assessing Robbery Risk Physical Security Checklist and Inventory Any assessment of robbery risk begins with an evaluation and inventory of the measures you are already taking as a financial institution.

More information

You will already have read and understood the following documentation, however do go back to any of these if you are unsure of what they cover:

You will already have read and understood the following documentation, however do go back to any of these if you are unsure of what they cover: Pay Payment Card Industry Data Security Standards (PCI DSS) Quick Reference Guide Overview You should have already been trained, and possibly refreshed, in PCI DSS requirements, and how the standards relate

More information

ATM Fraud and Security

ATM Fraud and Security WHITE PAPER ATM Fraud and Security Minimizing loss, mitigating risk and maintaining consumer confidence in the ATM channel Since the introduction of the first automated teller machine (ATM) in 1967, perpetrators

More information

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction. Getting a Handle on Debit and Credit Cards Plastic Fraud State-of-the-art thieves are concentrating on plastic cards. In the past, this type of fraud was not very common. Today, it is a big business for

More information

Electronic Security. For Financial Institutions

Electronic Security. For Financial Institutions A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from

More information

Data Security for the Hospitality

Data Security for the Hospitality M&T Bank and SecurityMetrics Present: Data Security for the Hospitality Industry Featuring Lee Pierce, SecurityMetricsStrategicStrategic Accounts Dave Ellis, SecurityMetrics Forensic Investigator Doug

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

Euronet s Contactless Solution

Euronet s Contactless Solution Serving millions of people worldwide with electronic payment convenience. Euronet s Contactless Solution Fast, Secure and Convenient Transactions with No Swiping, PIN or Signature Copyright 2011 Euronet

More information

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost

Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations

More information

A Brand New Checkout Experience

A Brand New Checkout Experience A Brand New Checkout Experience EMV Transformation EMV technology is transforming the U.S. payment industry, bringing a whole new experience to the checkout counter. Introduction What is EMV? It s 3 small

More information

A Brand New Checkout Experience

A Brand New Checkout Experience A Brand New Checkout Experience EMV Transformation EMV technology is transforming the U.S. payment industry, bringing a whole new experience to the checkout counter. Introduction What is EMV? It s 3 small

More information

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on

More information

1.4 The banking entities that provide customer service will keep controls of access to the premises.

1.4 The banking entities that provide customer service will keep controls of access to the premises. RULE No. 01-2007 1 (dated November 21, 2007) "Whereby Minimum Security Standards are stipulated for the Banking Entities" THE BOARD OF DIRECTORS using its legal authority, and WHEREAS: Pursuant to Numeral

More information

SECURITY SOLUTIONS BANKING AND FINANCE

SECURITY SOLUTIONS BANKING AND FINANCE SECURITY SOLUTIONS BANKING AND FINANCE Pacom has developed a distinguished reputation as a global leader in the field of remote security management for the banking and financial market. Over 25 years of

More information

SECURITY IS EVERYONE S RESPONSIBILITY. Group Security. ATM Card Skimming and PIN Capturing Customer Awareness Guide

SECURITY IS EVERYONE S RESPONSIBILITY. Group Security. ATM Card Skimming and PIN Capturing Customer Awareness Guide SECURITY IS EVERYONE S RESPONSIBILITY Group Security ATM Card Skimming and PIN Capturing Customer Awareness Guide What is ATM Card Skimming and PIN Capturing? ATM Skimming and Personal Identification Number

More information

Kaspersky Security for Mobile

Kaspersky Security for Mobile Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months

More information

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Serving millions of people worldwide with electronic payment convenience. Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Copyright 2011 Euronet Worldwide, Inc. All

More information

PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett

PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett PCI (Payment Card Industry) Compliance For Healthcare Offices By Ron Barnett Dr. Svenson thought he was doing both his patients and his practice a big favor when he started setting up monthly payment arrangements

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Target Security Breach

Target Security Breach Target Security Breach Lessons Learned for Retailers and Consumers 2014 Pointe Solutions, Inc. PO Box 41, Exton, PA 19341 USA +1 610 524 1230 Background In the aftermath of the Target breach that affected

More information

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V.

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V. EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

16 th European Report on Bank Robberies. Executive Summary. EBF ref. 2283. Brussels, November 2008

16 th European Report on Bank Robberies. Executive Summary. EBF ref. 2283. Brussels, November 2008 EBF ref. 2283 Brussels, November 2008 16 th European Report on Bank Robberies Executive Summary The problem of robberies is constant and will remain as long as money exists. Recently, countries have had

More information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved

More information

IS-TG501MS IS-TG100MS L-TG700 XS-PLINTH01

IS-TG501MS IS-TG100MS L-TG700 XS-PLINTH01 The Aspects ARTS system is a wireless tracking, audit and security system for works of art and people. The system operates 24/7, which from a security perspective is very important as perimeter or intruder

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004L Payment Card Industry (PCI) Physical Security (proposed) 01.1 Purpose The purpose

More information

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Whitepaper on AuthShield Two Factor Authentication with ERP Applications Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password

More information

A better way to secure your business. Vodafone Power to you. White paper: M2M for business security. m2m.vodafone.com

A better way to secure your business. Vodafone Power to you. White paper: M2M for business security. m2m.vodafone.com A better way to secure your business White paper: M2M for business security m2m.vodafone.com Vodafone Power to you M2M for business security What this paper is about Security is an industry in flux. While

More information

Name of the Project: e.g. Organization Development. By Roland Cheung @HKCERT

Name of the Project: e.g. Organization Development. By Roland Cheung @HKCERT Name of the Project: e.g. Organization Development By Roland Cheung @HKCERT Agenda Malware Trend Security Risk on Industry Sector Case Study Security Mitigations Malware Trend Reason Fun Profit Direct

More information

ASERIES ATM Access Management System

ASERIES ATM Access Management System ASERIES ATM Access Management System Increase Security. Reduce Operation Costs. Reduce Liability. The A-Series ATM Access Management System from Sargent & Greenleaf increases security and management efficiency

More information

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted

More information

Guide for Non-Profit Housing Societies Security Guide Table of Contents

Guide for Non-Profit Housing Societies Security Guide Table of Contents Guide for Non-Profit Housing Societies Security Guide Table of Contents Chapter 1 - General Security Guidelines Chapter 2 - Target hardening Chapter 3 - Security window bars Chapter 4 - Anti-Graffiti solutions

More information

Changing Consumer Purchasing Patterns. John Mayleben, CPP SVP, Technology and Product Development Michigan Retailers Association

Changing Consumer Purchasing Patterns. John Mayleben, CPP SVP, Technology and Product Development Michigan Retailers Association Changing Consumer Purchasing Patterns John Mayleben, CPP SVP, Technology and Product Development Michigan Retailers Association Michigan Retailers Association! Michigan Retailers Association is trade

More information

PAYMENT SECURITY. Best Practices

PAYMENT SECURITY. Best Practices PAYMENT SECURITY Best Practices At VeriFone, the protection of cardholder information is a top priority. To ensure merchants have secure payment solutions for their customers, and to help protect merchants

More information

HOW TO OPTIMIZE THE CONSUMER CONTACTLESS EXPERIENCE? THE PERFECT TAP

HOW TO OPTIMIZE THE CONSUMER CONTACTLESS EXPERIENCE? THE PERFECT TAP HOW TO OPTIMIZE THE CONSUMER CONTACTLESS EXPERIENCE? THE PERFECT TAP CONTACTLESS PAYMENTS COULD BE 50-60% FASTER THAN PAYING WITH CASH.* By accepting contactless payments, merchants open the door to the

More information

PCI DSS 101- The background you need for understanding the PCI DSS

PCI DSS 101- The background you need for understanding the PCI DSS PCI DSS 101- The background you need for understanding the PCI DSS Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies www.nntws.com

More information

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world

More information

ican facilitates top-up and cash acceptance and payments through self-service kiosks and centralized management software. http://ican.w2b.

ican facilitates top-up and cash acceptance and payments through self-service kiosks and centralized management software. http://ican.w2b. ican facilitates top-up and cash acceptance and payments through self-service kiosks and centralized management software. 1 Problem, Need, Solution 2 Introduction ican is a fully-automated cash acceptance

More information

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information

More information

welcome to liber8:payment

welcome to liber8:payment liber8:payment welcome to liber8:payment Our self-service kiosks free up staff time and improve the overall patron experience. liber8:payment further enhances these benefits by providing the convenience

More information

Need to be PCI DSS compliant and reduce the risk of fraud?

Need to be PCI DSS compliant and reduce the risk of fraud? Need to be PCI DSS compliant and reduce the risk of fraud? NCR Security lessens your PCI compliance burden and protects the integrity of your network An NCR White Paper Experience a new world of interaction

More information

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions. Tahoe Tech Group LLC Cyber Security Briefing Truckee Donner Chamber of Commerce March 6, 2015 Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

More information

Hills wireless security alarm DIY range

Hills wireless security alarm DIY range Hills wireless security alarm DIY range EASY TO INSTALL DIY system PEACE OF MIND Receive SMS/calls when alarm is armed INTERACTIVE Arm and disarm by SMS or via smartphone app Control your alarm via smart

More information

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology: //DATASHEET XS4 Mini Cutting-edge design + Amazing technology: Stylish design is a SALTO trademark and with the XS4 Mini, we raise the bar on this already high standard thanks to the XS4 Mini s small,

More information

EMV Acquiring at the ATM: Early Planning for Credit Unions

EMV Acquiring at the ATM: Early Planning for Credit Unions EMV Acquiring at the ATM: Early Planning for Credit Unions EMV Adoption Recent data breaches and planned Network Liability shifts have increased the interest in EMV at the ATM and have affected the planned

More information

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4 CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY

More information

FIS/Payment Monitor. A low-cost, application and system monitoring tool with specific focus on the EFT transaction environment

FIS/Payment Monitor. A low-cost, application and system monitoring tool with specific focus on the EFT transaction environment A low-cost, application and system monitoring tool with specific focus on the EFT transaction environment Feature highlights: Monitor Switching environments performance and state of various application

More information

March 2014. Skimming Prevention Kit. For Business Owners 1

March 2014. Skimming Prevention Kit. For Business Owners 1 Skimming Prevention Kit For Business Owners 1 Contents Introduction:... 3 Debit Card Fraud:... 3 What is Debit Card Skimming?... 3 Who is Affected?... 3 Impact on Consumers... 3 Impact on Financial Institutions...

More information

SAS EuroBonus. Travel Cash. Frequently Asked Questions

SAS EuroBonus. Travel Cash. Frequently Asked Questions SAS EuroBonus Travel Cash Frequently Asked Questions YOUR MOST COMMON QUESTIONS ABOUT TRAVEL CASH 5 Q. How can I request a EuroBonus member Card with Travel Cash? 5 Q. Does it cost anything to get Travel

More information

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008 Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities

More information

White Paper How are thieves stealing modern vehicles?

White Paper How are thieves stealing modern vehicles? SECURITY WHITEPAPER How are thieves stealing modern vehicles? SBD/SEC/2288 1 Introduction Developments in vehicle security over recent years have made it increasingly difficult for thieves to steal vehicles

More information

GET THE ALARM.COM ADVANTAGE.

GET THE ALARM.COM ADVANTAGE. BETTER SECURITY REMOTE WEB CONTROL MOBILE APPS GET THE ALARM.COM ADVANTAGE. STAY SECURE. STAY CONNECTED. WIRELESS TECHNOLOGY VIDEO MONITORING INTERACTIVE SERVICES HOME AUTOMATION ENERGY MANAGEMENT Alarm.com

More information

A RE T HE U.S. CHIP RULES ENOUGH?

A RE T HE U.S. CHIP RULES ENOUGH? August 2015 A RE T HE U.S. CHIP RULES ENOUGH? A longer term view of security and the payments landscape is needed. Abstract: The United States is finally modernizing its card payment systems and confronting

More information

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7

UBC Technical Guidelines Section 17900 2015 Edition Secure Access: General Standards Page 1 of 7 Page 1 of 7 1.0 GENERAL 1.1 Related UBC Guidelines.1 Section 17910, 17920 and 17930.2 Section 17100 Cable Infrastructure Overview, sub sections 1.4.9 and 1.5.3 Section 17110 Communication Rooms, sub section

More information

The Evolution of EFT Networks from ATMs to New On-Line Debit Payment Products *

The Evolution of EFT Networks from ATMs to New On-Line Debit Payment Products * The Evolution of EFT Networks from ATMs to New On-Line Debit Payment Products * Stan Sienkiewicz April 2002 Summary: On June 15, 2001, the Payment Cards Center of the Federal Reserve Bank of Philadelphia

More information

International Journal of Engineering Research & Management Technology

International Journal of Engineering Research & Management Technology International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of

More information

Financial Sector Cybersecurity: who s in charge? Aquiles A. Almansi Lead Financial Sector Specialist WBG-Finance & Markets

Financial Sector Cybersecurity: who s in charge? Aquiles A. Almansi Lead Financial Sector Specialist WBG-Finance & Markets Financial Sector Cybersecurity: who s in charge? Aquiles A. Almansi Lead Financial Sector Specialist WBG-Finance & Markets Issues in the Governance of Central Banks (BIS 2009) Financial Sector Cybersecurity:

More information

PROTECT YOUR AUTOMATIC TELLER MACHINES AGAINST LOGICAL FRAUD FROM SKIMMING TO THE LOGICAL FRAUD, THE NEW COMING ATM AND KIOSK RISK

PROTECT YOUR AUTOMATIC TELLER MACHINES AGAINST LOGICAL FRAUD FROM SKIMMING TO THE LOGICAL FRAUD, THE NEW COMING ATM AND KIOSK RISK PROTECT YOUR AUTOMATIC TELLER MACHINES AGAINST LOGICAL FRAUD FROM SKIMMING TO THE LOGICAL FRAUD, THE NEW COMING ATM AND KIOSK RISK ABSTRACT 4 WHICH ARE THE RISKS ASSOCIATED TO AN ATM NETWORK 4 ATM EMERGING

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

Securing Critical Information Assets: A Business Case for Managed Security Services

Securing Critical Information Assets: A Business Case for Managed Security Services White Paper Securing Critical Information Assets: A Business Case for Managed Security Services Business solutions through information technology Entire contents 2004 by CGI Group Inc. All rights reserved.

More information

PLC Security for Water / Wastewater Systems

PLC Security for Water / Wastewater Systems INDUSTRIAL INTERNET IN ACTION CASE STUDY PLC Security for Water / Wastewater Systems EXECUTIVE SUMMARY You have likely never worried about the possibility of a high school geek doing some programming that

More information

Palm Beach County Sheriff s Office

Palm Beach County Sheriff s Office Palm Beach County Sheriff s Office Business Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for hundreds of thousands of people who live, work and visit

More information

Newtek, The Small Business Authority 855-2thesba www.thesba.com. thesba.com 855-2thesba

Newtek, The Small Business Authority 855-2thesba www.thesba.com. thesba.com 855-2thesba thesba.com 855-2thesba EMV Chip Technology, Secure Electronic Payments The world of payments is evolving. We are starting to see an evolution from typical static magnetic strip cards to more intelligent

More information

Cyber Security Response to Physical Security Breaches

Cyber Security Response to Physical Security Breaches Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically

More information

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next CONTENTS 1. OPEN ALL HOURS...2 Page 2. MOBILE DEVICE MANAGEMENT

More information

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE. About Identiv Identiv is a global security technology company that establishes trust in the connected world, including premises, information, and everyday items. Global organizations in the government,

More information

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems

ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems ABB Stotz-Kontakt GmbH ABB safe&smart Project planning of security systems Content Introduction Preventing unauthorized access by perimeter surveillance Monitoring unauthorized access by indoor surveillance

More information

Guideline on Debit or Credit Cards Usage

Guideline on Debit or Credit Cards Usage CMSGu2012-04 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Debit or Credit Cards Usage National Computer Board Mauritius

More information

Sage 100 ERP I White Paper. Payment Processing Trends, Tips, and Tricks: What You Need to Know

Sage 100 ERP I White Paper. Payment Processing Trends, Tips, and Tricks: What You Need to Know Sage 100 ERP I White Paper What You Need to Know Over the past few years, credit and debit card acceptance has come on the scene as a required payment option. Similarly, the number of customers using credit

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

PCI Wireless Compliance with AirTight WIPS

PCI Wireless Compliance with AirTight WIPS A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use

More information

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The

More information

Learning Outcomes. Physical Security. Zoning systems. Zone 1 Open areas. Information Security

Learning Outcomes. Physical Security. Zoning systems. Zone 1 Open areas. Information Security Learning Outcomes Physical Security Information Security Dr Hans Georg Schaathun After this week, students should be able to identify threats and useful controls in the physical environment of an information

More information

Practically Thinking: What Small Merchants Should Know about EMV

Practically Thinking: What Small Merchants Should Know about EMV Practically Thinking: What Small Merchants Should Know about EMV 1 Practically Thinking: What Small Merchants Should Know About EMV Overview Savvy business owners know that payments are about more than

More information

In Table 1 we present an overview of international standardization activities in M2M. Table-1 Standard bodies working on M2M Standard-bodies

In Table 1 we present an overview of international standardization activities in M2M. Table-1 Standard bodies working on M2M Standard-bodies Title: M2M communication and Indian market needs Company: NEC Corporation Purpose: Approval Doc number: IOT2-20100007 Meeting: GISFI#2, Allahabad, India, 15 17 Sept, 2010 1. Abstract Machine to Machine

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL PAYMENT CARD INDUSTRY COMPLIANCE (PCI) Effective June 1, 2011 Page 1 of 6 (1) Definitions a. Payment Card Industry Data Security Standards (PCI-DSS): A set of standards established by the Payment Card

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER SHAZAM, Senior Vice President Agenda The Ugly Fraud The Bad EMV? The Good Tokenization and Other Emerging Payment Options

More information

True Protection To The Core

True Protection To The Core True Protection To The Core Intelligent Security Solutions from VeriFone Every Day. In Everything We Do. VeriFone Builds Absolutely The Highest Transaction Data Security Into Our Business. And Yours. We

More information

CREDIT CARD PAYMENTS ARE NOT ACCEPTED FOR STUDENT TUITION PAYMENTS

CREDIT CARD PAYMENTS ARE NOT ACCEPTED FOR STUDENT TUITION PAYMENTS Basic Credit Card Processing Procedures The following is intended to provide basic procedures that departments or units can use as a starting point to develop specific procedures for their department or

More information

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation June 2009 Cairo, Egypt Joanna P. Crane Identity Theft Program Manager Senior Attorney The views

More information

Merchant Payment Card Processing Guidelines

Merchant Payment Card Processing Guidelines Merchant Payment Card Processing Guidelines The following is intended to provide guidance that departments or units can use to help develop specific procedures for their department or unit. If you have

More information

ATM SECURITY ATM CASSETTE GUARD KEY FEATURES. High security Rapid installation Simple operation Time locks & delays Proven track record

ATM SECURITY ATM CASSETTE GUARD KEY FEATURES. High security Rapid installation Simple operation Time locks & delays Proven track record ATM SECURITY ATM CASSETTE GUARD KEY FEATURES High security Rapid installation Simple operation Time locks & delays Proven track record ATM SECURITY ATM CASSETTE GUARD n High resistance to physical attacks

More information