Contact us today!

FRS Pros Blog

Are You On the Lookout for Payment Card Skimmers?

Are You On the Lookout for Payment Card Skimmers?

For many consumers, carrying cash is a rarity. Debit and credit cards have taken over as the most widely used payment method. The convenience of not being given a handful of loose change must come at a price -- so how much will it cost you? 

Payment Skimming

The fact that your credit card quickly and conveniently withdraws money from an account and transfers it in exchange for consumer goods is often overlooked. Most people in fact, don’t even bother verifying their account and the transaction that went through. This is an easily targetable characteristic associated with your average card-user. The way these users are typically targeted is through skimming. 

Payment skimming is the act of discretely acquiring credit card information. What an attacker chooses to do with this acquired information is up to them. However, due to the lack of attention to detail and also fraud detection on high cost purchases, most attackers will withdraw small, unnoticeable amounts of money from a large amount of victims, rather than one lump sum of change. So how do they do this?

Attackers will often add their own, home-made skimming device to a location where debit or credit cards are swiped. Every time a card is swiped, the skimmer collects information and adds it to the criminal’s to-do list. The criminal can do a number of things with this information, from producing a phony card which they can swipe wherever, or just making a fraudulent purchase. Your credit card information could even be sold on the Dark Web. 

These skimming devices can be found on gas pumps, ATMs, or even made to be mobile. Here are a few tips on how to recognize if a skimmer is in place.

Combatting Skimmers

There are a few different means of protecting yourself from skimming attacks. Many of them are put in place by the card provider themselves. Many cards are equipped with computer chips to contain data, rather than a magnetic strip. This is a much more secure option. In 2015, a new law was determined: if a store decides against utilizing this more secure chip payment method, they themselves would be liable for the fraud that took place. This ruling convinced most business owners to update their POS infrastructure.

Assuming your ATM transactions are safe isn’t wise. While you might think that these sorts of attacks don’t happen in your area, this ideology is foolish. Here are a few things you can do to reduce your risk of being a victim to a skimming attack.

Where You Swipe is Important

Before you decide to swipe your payment card, consider your environment. ATMs in the corner of a gas station are a lot easier for a criminal to attach a skimming device to. An ATM in a bank is in a much more secure, well monitored location. Plus, you won’t have to pay those outrageous ATM fees if you are using your own bank.

Payment Has Gone Touchless

Paying for consumer goods has gone touchless. You can use a mobile app, or another touchless payment option. This ensures that your magnetic strip on your card never comes in contact with a potential skimming device.

Keep Your Card

Another simple way to keep your cards secure, is by keeping a close eye on them. This doesn’t have to mean following your waitress up to her POS system and monitoring the transaction. It means do your best to avoid situations where a merchant needs to take your card away, out of sight. They could easily swipe your card in their skimming device unbeknownst to you. 

Monitor Your Transactions

Remember when we discussed how most people don’t closely monitor their transaction history? We’re not saying you need to keep your mobile banking app open 24/7, but we are suggesting that you take advantage of security offers your bank provides. Most banks will offer SMS notification. You will receive a text notification every time a transaction goes through over a certain amount of money. If you’re lying in bed, and suddenly you receive a notification that you just purchased something from Wendy's, it should be painfully evident you’re a victim of fraudulent activity. 

If you’ve worked hard for your money, you should put some effort into keeping that money secure. For more information on how you can protect yourself in both your personal and professional life, subscribe to our blog, or reach out to us at 561-795-2000.

Tip of the Week: Five Tricks to Identifying a Phis...
Five Biggest Tech Myths BUSTED

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Productivity Business Computing Privacy Internet Hackers Google Software User Tips Microsoft Cloud Business Management Innovation Hardware Computer Tech Term Efficiency Data Backup Data Malware Mobile Devices Smartphones Hosted Solutions Email Cybersecurity Windows 10 Data Recovery Smartphone Outsourced IT IT Services Browser Office 365 Android Backup IT Support Communication Windows Upgrade Business Internet of Things Gadgets Phishing Small Business Workplace Tips Apps VoIP Data Security Cybercrime Business Continuity Communications Disaster Recovery Ransomware Network Facebook Saving Money Managed IT Services Users Operating System Cloud Computing Mobile Device Management Social Media Managed Service OneNote Information Employer-Employee Relationship Money Artificial Intelligence Server Alert Vulnerability Law Enforcement Collaboration Best Practice Blockchain Two-factor Authentication Automation Health IT Support Applications Wireless Chrome Virtualization Spam Managed IT Services Microsoft Office Passwords Miscellaneous Data Storage Mobile Device Password Bring Your Own Device Router Hacking Managed Service Provider Google Drive Settings Gmail Windows 10 Managed IT Save Money Networking Computers Word Unsupported Software Augmented Reality BYOD App Patch Management Information Technology Telephone Systems Holiday Tech Support The Internet of Things Touchscreen Risk Management Travel Access Control Telephony File Sharing WiFi Excel VPN iPhone Fraud Printing History Mobile Security Wi-Fi Update Vendor Evernote Audit Politics User Error Meetings Shortcut Data Protection Quick Tips Google Assistant Hybrid Cloud Hosted Solution Search Cortana Avoiding Downtime Mobility BDR Data Loss Cost Management IT Management Conferencing Windows 7 WannaCry Commerce Business Technology Budget Google Docs Project Management Wireless Technology Application Wireless Charging Going Green Social Devices Data Management Encryption Government Hard Drive Display Safety SaaS Productivity Data Breach Robot Proactive IT Payment Cards Sports Financial Sabotage Payroll Emergency Specifications Virus Personal Information Camera Myths Chromecast Microsoft Word Business Intelligence Employees Point of Sale iOS WIndows Server 2008 Management Entertainment Apple ROI Employee Windows 10s HBO Reputation Telephone Managed Services Provider Internet Exlporer Computer Care Nanotechnology Data storage PC Security Cameras Sales Proactive Screen Mirroring Projects Threats Identity Theft Tablets Maintenance PowerPoint Admin Uninterrupted Power Supply Storage Social Engineering Unified Threat Management Digital Signage OneDrive Office Sync Remote Computing Edge Windows Server 2008 R2 Break/Fix FAQ Solid State Drive Hyperlink Facebook Privacy eWaste Root Cause Analysis Paperless Office Machine Learning Retail Websites Emails Cast Identity Scams Vendor Management NFL Wireless Internet Saving Time Identities Upgrades Employee-Employer Relationship Firewall Voice over Internet Protocol Scam Computer Fan Ciminal Laptop Mobile Office Medical IT Files Education Charger Hard Disk Drive Transportation Value Wasting Time DDoS Device Security Amazon Smartwatch Downtime Disaster Data Theft Marketing Private Cloud Data Privacy Virtual Private Network Recovery Samsung Gamification Keyboard Shortcuts Legislation Language Processor Adobe Workers Legal Touchpad Software as a Service Development 5G IT Solutions Accessory Windows Ink Virtual Assistant Server Maintenance E-Commerce Gifts Computing Webinar Remote Workers Administrator Antivirus Memory Human Resources Lithium-ion battery Comparison Consultant Testing Benchmarks Streaming Media Licensing Updates Microsoft Excel IT budget Remote Monitoring Humor Bandwidth Micrsosoft YouTube Battery Outlook Computer Forensics Peripheral Google Maps Spyware Alexa for Business Investment Instant Messaging Hacker Credit Cards App store IT solutions Chromebook Co-Managed Services Managed IT Service Access Company Culture Congratulations Scalability Analytics es PDF Keyboard Black Market Cleaning Mobile Computing Big Data Automobile Text Messaging Compliance Managing Stress USB Worker Printers How To Books Video Games Experience Office tips Regulation Hiring/Firing Advertising Virtual Reality Work/Life Balance Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Phone System Cache Benefits Twitter Save Time Training Monitors End of Support HaaS Computer Accessories Thank You Flexibility Music Smart Technology Relocation Television CrashOverride