888-494-9988

  • slide1

Deena Tolley of TRI will present a workshop on Credit Card Security and Understanding the Liability Shift for Merchants in South Yarmouth, MA. She will also be sharing how to keep your business transactions safe and secure!

 

There are a lot of changes occurring with credit cards and merchant payment processing right now:

 

  • Fraud loss liability shifting to some merchants in October 2015
  • Replacement of magnetic stripe cards with chip-based cards (EMV)
  • Development of various new smart phone technologies for payment processing

 

Learn from Deena how to avoid the fraud loss shift, secure your good reputation and ensure the safety of your customers' information - or even your own.

 

This free workshop by Transaction Resources, Inc. will prepare you for all of this and more, including saving money on processing fees and the best options for mobile payments. This presentation is part of the Yarmouth Chamber of Commerce workshop series.

 

Tuesday, April 28th 9-11 AM
Bridgewater State University
1175 Route 28, South Yarmouth, MA

 

To register, please call the Yarmouth Chamber of Commerce at 508-779-1008.

Published in Blog

Maintaining Customers' Credit Card Security

 

If you have access to any news media you may have experienced some amount of anxiety upon hearing that Target inadvertently shared approximately 70 to 110 million of its customers’ private information with hackers through the later 2013 holiday period. You probably also know that 90 million records were stolen from T. J. Maxx in 2005, the most extensive data breach until Target’s misfortune. What is clear to date is that this can happen again. Hackers are resilient and persistent. It might require years of probing, testing and information gathering, but the payoff for these felons is outstanding!


hacker-with-blue-mask-300In Target’s case, hackers were able to obtain not only customers’ credit card numbers, PINs and expiration dates at the Point of Sale (POS), but also private financial and personal information required for credit card applications, such as home addresses and email addresses. This latter compromise occurred in the company’s central computers.


Normally, the unauthorized purchases made by credit card-only data can be corrected easily. A phone call to the credit card company explaining the unauthorized purchase(s) typically results in quick refunds to the account. Consumer victims involved in the Target breach who reported the stolen data to their credit card companies have no liability for fraudulent transactions, though inconvenienced and stressed by the situation.


On the other hand, the deeper data collected by Target’s hackers enables dangerous Identity Fraud. Once theft ensues, the damage to the finances of the victim may require legal counsel to assert actual identity ownership and recoup losses. Though bank accounts are insured, an account may be wiped clean of savings before it’s noticed. The waiting period to verify the roots of the theft is a time-consuming endeavor for a bank, thus assuring a delay of the return of the customer’s money to their account. Fraudulent mortgages and loans are also made possible with a sufficient breadth of data.


How Could This Happen?


During an interview on NPR, Mark Rasch, a former Justice Department prosecutor for cyber crimes, explains that after magnetic strips are read at the POS/register, but before cards credit cards are security encrypted, RAM (random access memory) scraper software can steal the data and send it to hackers. The information is often sold to willing identity thieves. Where Target’s central office computers are concerned, a hacking “research” operation may have been underway for years, undetected. Krebson Security reports that credit and debit card accounts stolen in the recent Target data breach have been flooding underground black card markets, selling in batches of one million cards, for asking prices of between $20 to more than $100 per card. 


The damage to a business’s reputation is also considerable, especially to one of Target’s size. The News Media performs the service of alerting customers with the hopeful effect of reducing their losses, but the news obviously rocks the merchant’s stability, as well the greater economy. Fortunately, reputations seem to rebound after some time. Target took some hits after the reports in December, but both Target and T. J. Maxx are essentially back on track.


How Do They Return to The Top after Such A Fall?


We can’t provide insight into the legal supports and PR that the Big Stores employed to regain their security and status respectively. We do know that preventative measures must be employed first. TRI offers substantial security services that protect your customers and business.


Credit cards as a method of payment is assured for years to come. Protect your customers by taking steps to secure their data - and maintain your good name - with TRI’s Service Protection Program (SPP). The SPP is the first step in financially protecting your merchant account against the costs incurred and fines imposed in the event of a security breach.


Transaction Resources, Inc. has partnered with SecurityMetrics to offer the SecurityMetrics Assurance Program. This program safeguards sensitive customer data. It includes PANscan (primary account numbers scan), which searches business networks, workstations, and storage devices for PAN and magnetic stripe track data. After scans are complete, a summary report points you to the location of found card data, making it easy to delete. See additional program features >> 

 

 


If you are a Target customer, please visit their website for helpful information.

Published in Blog