How to Plan Proactively Against a Financial Data Breach: Table for 2

 

Statistics show that data breach and stolen personally identifiable information, or PII, are increasing at alarming rates. According to a recent article in Payments Journal – Know Thy Fraudster, the amount of compromised PII increased 72% between the first half of 2017 to the same period of 2018. Compromised PII often results in a criminal obtaining access to additional financial records including bank accounts, PINs and credit card accounts. This type of fraud is known as account takeover, or ATO.

Fraudsters specializing in ATOs gain access to their victims’ accounts, then make non-monetary changes that include modifying personal information, requesting a new card or PIN or adding an authorized user. Once this routine account modification is complete, the thief is then empowered to carry out undetected illegal transactions. ATO fraud doesn’t discriminate – everything from government and employee benefits, wireless phone contracts, checking, savings, credit card, and e-commerce accounts are at risk.

Although the bulk of fraudulent purchases are made online, the supply of stolen credit card numbers and PII often originates from data breaches involving card-present POS systems. Compromised access to payment transactions and loyalty program data can pave the path for obtaining credit card or other financial details used to steal PII and purchase goods online.

Investing in basic network fraud protection is not enough to combat the devious fraudster who makes his living on ATO scams. As detailed in the Know Thy Fraudster article, you need to know the thief you are trying to thwart and then build security measures throughout your establishment. In actuality, you’re not dealing with a single thief; you’re attempting to battle a ring of sophisticated ATO specialists. They’re an efficient team of experts working together so they can maximize the number of attempts, share vulnerabilities and utilize individual team specialties. One section of the fraud ring may focus on acquiring data, another in selling the data and another in automation. Collectively they share the profits. To counter this den of thieves, you need to build a secure system throughout your establishment to minimize access to data, including at the point of payment.

TableSafe believes that minimizing the threat of data breach begins with a secure payment process that follows the strictest security standards including PCI and EMV. The company’s solutions protect individuals’ PII through point-to-point encryption and eliminating the need for PII to reside on the POS system. Hackers can’t steal what was never there, to begin with.

In the end, you need to realize that fraud is literally a full-time occupation for some people. If your venue doesn’t take fraud seriously, your defenses are down against people who are ready and willing to take advantage of you. Sadly, the fraudster community will always find the path of least resistance. Don’t let that be your ATO exposure to the fraudster community.

For the latest news, videos, and podcasts in the Retail Industry, be sure to subscribe to our industry publication.

Follow us on social media for the latest updates in B2B!

Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

gpu deployment
Applied Digital is Scaling Up Infrastructure to Handle Growing GPU Deployment Needs
May 20, 2024

During a transformative period, Applied Digital experienced a significant increase in demand for large-scale GPU deployment. This demand required a focus on power density, as the networking within data centers, particularly for InfiniBand, necessitated that servers be located close together. Each server consumed 10.2 kilowatts of power, and the optimal performance was achieved when…

Read More
power sources
Applied Digital is Revolutionizing High Performance Computing by Locating Facilities at Unique Power Sources
May 20, 2024

Applied Digital optimizes high-performance computing by leveraging unique power sources, and locating facilities at the source of power rather than in traditional cloud regions. This approach is particularly suited for AI workloads, which do not require ultra-low latency like video streaming. By targeting areas with abundant but underutilized power, known as “stranded power,” the…

Read More
Experts Talk K-12 EdTech Leadership Priorities
K-12 EdTech Leadership Needs a Bigger Seat at the Table to Overcome Cybersecurity, Staffing, Professional Development Challenges
May 20, 2024

As we navigate the evolving landscape of K-12 education, the role of technology, as well as K-12 edtech leadership has never been more pivotal. Especially in the era of K-12 education post-pandemic, how has this influx of technology solutions for everything from curriculum management, to hybrid learning, to quiz gamification, to AI-supported learning, impacted…

Read More
energy reporting
Energy Reporting for Utilities & Businesses Isn’t Just for Transparency. It’s for Energy & Cost Savings, Too.
May 20, 2024

As cities and states increasingly implement energy benchmarking, disclosure, and transparency mandates, utilities and businesses find themselves navigating a complex landscape of compliance and opportunity. The rise of building performance standards, such as New York’s Local Law 97, Boston’s Building Energy Reporting and Disclosure Ordinance (BERDO), and Denver’s Energize Denver, underscores the urgency for detailed…

Read More