What EMV Means to You, The Business Owner

FullSizeRenderDid you know that nearly half of all credit card fraud worldwide occurs in the United States? Considering that only 24% of credit card sales are made in the US, this number is surprisingly high. To combat fraud, the United States is currently transitioning to credit cards that use EMV technology, which will increase security and reduce fraud for all credit card transactions. The technology is slated to revolutionize the way you do business by allowing merchants to transition to a safer standard of payment processing.

What exactly is EMV, you might ask? Taken from the name of its original developers Europay, Mastercard, and Visa, the technology includes a microchip embedded into a credit card that produces a one-time code each time it is used. A customer will still verify the transaction with either a signature, pin number or both. Small transactions, however, may not require either.

Because a new code is produced with each transaction, the cardholder’s personal information remains secure. Here’s why.

If a hacker does in fact steal information from a specific point of sale and replicates the card, the new card will be denied since the information on the original card changes with each new transaction. The stolen information is invalid—it was only valid with the cardholder at the time of purchase.

Cards with magnetic stripes, on the other hand, can be duplicated easily with a card-reading device. This device skims card information allowing criminals to create counterfeit cards.

Eighty countries have already adopted EMV chip technology. The United States will be one of the last countries to adopt this technology. By the end of 2015, the United States will have issued 70% of credit cards and 40% of debit cards as EMV cards.

What this means for merchants is that your business will need to soon become EMV-compliant, if it isn’t already.

The target date to acquire this technology will be October 1st of this year, at which point the Liability Shift starts. Merchants who are EMV-compliant will not be liable for losses due to card fraud; but if a merchant is not EMV-compliant, he or she will bear the cost of fraudulent activity. Prior to, banks were responsible for bearing the costs associated with card fraud.

To ease the transition, which is estimated to take three to five years, credit and debit cards issued in the United States will include both microchips and magnetic stripes.

The future of payment processing is upon us. Prepare your business to succeed by working with COCARD to transition to EMV technology today.

Read MoreRead More

Five Tips for POS Security

NMPL5377-1024x682-1024x682Point of Sales security is always a relevant issue for a merchant services provider. With the recent string of data breaches that have happened to well-known businesses like Target and Verizon, there are plenty of reasons to feel like your POS’s security system may not be up to snuff.

Although hackers are becoming better each day at getting access to essential data, there are multitudes of ways to help toughen the process for a determined hacker. The two major forms of hacking involve either the use of an attachable hardware device to the POS system, or using malware to hack into a POS network. Although there is no surefire way to prevent either of these things from happening, here are five tips that will help improve the security of your POS system.

  1. Always maintain the most up-to-date POS software.

POS system updates can be a drag, but oftentimes these updates provide crucial security patches that ward off malware and other hacking technology. Rather than updating technology quarterly, update the technology as frequently as possible. It’s hard to stay a step ahead of cybercriminals, but if you’re always improving, it makes the task more difficult.

CoCard provides cutting-edge POS services, featuring top-notch security and management tools.

  1. Install Firewall and Anti-Virus Software to boost your network’s immunity.

Similar to keeping up-to-date POS Software, installing new Firewall/Anti-virus software is critical. It adds an extra dimension to the security system already in place at your firm, and puts yet another wall between you and a potential hacker. Programs like Barracuda and McAfee are good choices.

  1. Create intricate passwords that are frequently changed.

This is an extremely overlooked habit that should always be practiced. Many times, hackers have no problem getting past security systems because the passwords in place are entirely too simple and intuitive. Always change from the default password that was provided for your system, and never make it something simple like “Password1” or your birth date. Find something that isn’t easily guessed, and change the password frequently, preferably every two or three months.

  1. Deny internet access from POS Stations and Terminals.

Keeping POS computers off the internet vastly reduces the risk of viruses and other internet-based malware. Only connect your system to the internet for necessary POS activities, and avoid general internet usage. Don’t give a hacker the chance to get to you by staying clear of their sights.

  1. Disable Remote Access.

Although we get accustomed to allowing IT professionals and employees to use the POS system from remote locations (not necessarily in office), hackers have a far easier time finding your device’s information when it is used away from a terminal. Restrict access to programs as much as possible, and you have vastly decreased your risk for hacking.

Although none of these solutions are fool-proof, they are steps that over time can make a big difference in your program’s safety. When thousands of potential clients’ credit information is in your hands, why take the risk? Just like you take vitamins to protect your immune system, take precautions to protect your POS system!

Read MoreRead More

Hacker Alert:

hacker-attack-password-e1408979984585

In case you missed the news at the beginning of this month, in early August, a Russian crime ring collected the largest known cluster of Internet credentials to date, which included 1.2 billion user name and password combos and more than 500 million email addresses in a mega-security breach. Milwaukee’s Hold Security discovered the violation and says the security breach affected several large businesses, but was unable to share the names of those affected due to nondisclosure agreements and victim security. The hackers cast a wide net, going after large and small business websites alike in countries around the globe—including the United States and Russia. According to an August 5 New York Times article, it appears the hackers haven’t sold much of the data, but are instead using this hacked info to send spam through social media sites, like Twitter for a fee. This article identifies the hacking ring as a small group of less than a dozen men in their 20s, based in south central Russia.

While it’s always troubling to hear news like this, don’t panic. Instead, tighten your Internet security measures. Ensure that you’re using strong passwords and that you’re utilizing different passwords on different websites. If you know you’re guilty of being lax with your passwords (or use the same ones on multiple sites), updating them to stronger passwords is a good idea. You may also want to check out one of the automated password changing services out there, like this free one, to ensure you’re keeping hackers on their toes.

Read MoreRead More

Five Tips for POS security

NMPL5275-1024x682

Point of Sales security is always a relevant issue for a merchant services provider. With the recent string of data breaches that have happened to well-known businesses like Target and Verizon, there are plenty of reasons to feel like your POS’s security system may not be up to snuff.

Although hackers are becoming better each day at getting access to essential data, there are multitudes of ways to help toughen the process for a determined hacker. The two major forms of hacking involve either the use of an attachable hardware device to the POS system, or using malware to hack into a POS network. Although there is no surefire way to prevent either of these things from happening, here are five tips that will help improve the security of your POS system.

  1. Always maintain the most up-to-date POS software.

POS system updates can be a drag, but oftentimes these updates provide crucial security patches that ward off malware and other hacking technology. Rather than updating technology quarterly, update the technology as frequently as possible. It’s hard to stay a step ahead of cybercriminals, but if you’re always improving, it makes the task more difficult.

CoCard provides cutting-edge POS services, featuring top-notch security and management tools.

  1. Install Firewall and Anti-Virus Software to boost your network’s immunity.

Similar to keeping up-to-date POS Software, installing new Firewall/Anti-virus software is critical. It adds an extra dimension to the security system already in place at your firm, and puts yet another wall between you and a potential hacker. Programs like Barracuda and McAfee are good choices.

  1. Create intricate passwords that are frequently changed.

This is an extremely overlooked habit that should always be practiced. Many times, hackers have no problem getting past security systems because the passwords in place are entirely too simple and intuitive. Always change from the default password that was provided for your system, and never make it something simple like “Password1” or your birth date. Find something that isn’t easily guessed, and change the password frequently, preferably every two or three months.

  1. Deny internet access from POS Stations and Terminals.

Keeping POS computers off the internet vastly reduces the risk of viruses and other internet-based malware. Only connect your system to the internet for necessary POS activities, and avoid general internet usage. Don’t give a hacker the chance to get to you by staying clear of their sights.

  1. Disable Remote Access.

Although we get accustomed to allowing IT professionals and employees to use the POS system from remote locations (not necessarily in office), hackers have a far easier time finding your device’s information when it is used away from a terminal. Restrict access to programs as much as possible, and you have vastly decreased your risk for hacking.

Although none of these solutions are fool-proof, they are steps that over time can make a big difference in your program’s safety. When thousands of potential clients’ credit information is in your hands, why take the risk? Just like you take vitamins to protect your immune system, take precautions to protect your POS system!

Read MoreRead More