Contact us today!

FRS Pros Blog

Are You On the Lookout for Payment Card Skimmers?

Are You On the Lookout for Payment Card Skimmers?

For many consumers, carrying cash is a rarity. Debit and credit cards have taken over as the most widely used payment method. The convenience of not being given a handful of loose change must come at a price -- so how much will it cost you? 

Payment Skimming

The fact that your credit card quickly and conveniently withdraws money from an account and transfers it in exchange for consumer goods is often overlooked. Most people in fact, don’t even bother verifying their account and the transaction that went through. This is an easily targetable characteristic associated with your average card-user. The way these users are typically targeted is through skimming. 

Payment skimming is the act of discretely acquiring credit card information. What an attacker chooses to do with this acquired information is up to them. However, due to the lack of attention to detail and also fraud detection on high cost purchases, most attackers will withdraw small, unnoticeable amounts of money from a large amount of victims, rather than one lump sum of change. So how do they do this?

Attackers will often add their own, home-made skimming device to a location where debit or credit cards are swiped. Every time a card is swiped, the skimmer collects information and adds it to the criminal’s to-do list. The criminal can do a number of things with this information, from producing a phony card which they can swipe wherever, or just making a fraudulent purchase. Your credit card information could even be sold on the Dark Web. 

These skimming devices can be found on gas pumps, ATMs, or even made to be mobile. Here are a few tips on how to recognize if a skimmer is in place.

Combatting Skimmers

There are a few different means of protecting yourself from skimming attacks. Many of them are put in place by the card provider themselves. Many cards are equipped with computer chips to contain data, rather than a magnetic strip. This is a much more secure option. In 2015, a new law was determined: if a store decides against utilizing this more secure chip payment method, they themselves would be liable for the fraud that took place. This ruling convinced most business owners to update their POS infrastructure.

Assuming your ATM transactions are safe isn’t wise. While you might think that these sorts of attacks don’t happen in your area, this ideology is foolish. Here are a few things you can do to reduce your risk of being a victim to a skimming attack.

Where You Swipe is Important

Before you decide to swipe your payment card, consider your environment. ATMs in the corner of a gas station are a lot easier for a criminal to attach a skimming device to. An ATM in a bank is in a much more secure, well monitored location. Plus, you won’t have to pay those outrageous ATM fees if you are using your own bank.

Payment Has Gone Touchless

Paying for consumer goods has gone touchless. You can use a mobile app, or another touchless payment option. This ensures that your magnetic strip on your card never comes in contact with a potential skimming device.

Keep Your Card

Another simple way to keep your cards secure, is by keeping a close eye on them. This doesn’t have to mean following your waitress up to her POS system and monitoring the transaction. It means do your best to avoid situations where a merchant needs to take your card away, out of sight. They could easily swipe your card in their skimming device unbeknownst to you. 

Monitor Your Transactions

Remember when we discussed how most people don’t closely monitor their transaction history? We’re not saying you need to keep your mobile banking app open 24/7, but we are suggesting that you take advantage of security offers your bank provides. Most banks will offer SMS notification. You will receive a text notification every time a transaction goes through over a certain amount of money. If you’re lying in bed, and suddenly you receive a notification that you just purchased something from Wendy's, it should be painfully evident you’re a victim of fraudulent activity. 

If you’ve worked hard for your money, you should put some effort into keeping that money secure. For more information on how you can protect yourself in both your personal and professional life, subscribe to our blog, or reach out to us at 561-795-2000.

Tip of the Week: Five Tricks to Identifying a Phis...
Five Biggest Tech Myths BUSTED

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Network Security Business Computing Privacy Internet User Tips Hackers Software Google Cloud Microsoft Hardware Innovation Efficiency Business Management Data Computer Hosted Solutions Windows 10 Communication Email Tech Term Smartphones Mobile Devices IT Services Cybersecurity Data Backup IT Support Malware Backup Business Android Smartphone Small Business Office 365 Data Recovery Browser Upgrade Disaster Recovery Workplace Tips Outsourced IT Windows VoIP Internet of Things Gadgets Users Communications Cloud Computing Apps Business Continuity Data Security Collaboration Phishing Managed IT Services Automation Cybercrime Information Saving Money Network Ransomware Facebook Managed Service Mobile Device Management Microsoft Office Operating System Miscellaneous Health Employer-Employee Relationship Blockchain Two-factor Authentication Vulnerability Money Artificial Intelligence OneNote Alert Server Passwords Law Enforcement Social Media Best Practice Managed IT Quick Tips Applications Wireless Spam Chrome Mobile Office Holiday Virtualization Managed IT Services Networking IT Support Data Breach Bandwidth Unsupported Software Augmented Reality Password BYOD Router Access Control App Google Drive Settings Hacking Printing Windows 10 Gmail Bring Your Own Device Save Money Computers Data Storage Retail Mobile Device Information Technology Windows 7 Word Conferencing Patch Management Telephone Systems Project Management Tech Support Managed Service Provider Human Resources BDR History Telephony Cost Management IT Management Payment Cards Marketing WannaCry Travel Commerce Paperless Office Hosted Solution Excel File Sharing Application Search Fraud Encryption Avoiding Downtime Mobility Mobile Security Safety Proactive IT Evernote SaaS Vendor Google Assistant User Error Risk Management Going Green Social Hybrid Cloud Touchscreen Government WiFi Remote Workers Cortana Budget Voice over Internet Protocol Data Loss Wireless Technology Wi-Fi Robot Data Management Audit Update Business Technology Wireless Charging Politics Meetings The Internet of Things Google Docs Shortcut Productivity Software as a Service Data Protection Hard Drive Display VPN iPhone Devices Sports Chromecast Testing Computer Fan ROI Reputation Internet Service Provider Licensing Updates Memory Upgrades Managed Services Provider Comparison Scam PC CRM Outlook Computer Forensics Peripheral Data storage Threats Microsoft Excel IT budget Education YouTube Hard Disk Drive Credit Cards App store Samsung Internet Exlporer Chromebook Co-Managed Services Remote Computing Digital Signage Google Maps Spyware Alexa for Business Inventory Camera Windows Server 2008 R2 Microsoft Word Financial Payroll Facebook Privacy Specifications Virus IT Solutions AI Legal Uninterrupted Power Supply Management Scams Employees Antivirus Telephone Firewall Apple Employee Webinar Projects Transportation Tablets Maintenance Security Cameras Consultant Laptop eCommerce Sales Proactive Smartwatch Private Cloud HIPAA Sync PowerPoint Admin Remote Monitoring Virtual Private Network Storage Social Engineering Battery OneDrive FAQ DDoS Hyperlink Processor Edge Instant Messaging Hacker Files Break/Fix IT solutions Hosted Desktop Recovery Identity Printers Development NFL eWaste Emergency Disaster Machine Learning Touchpad Fiber Optics Websites iOS WIndows Server 2008 Server Maintenance Remote Work Wireless Internet Saving Time Identities Point of Sale Employee-Employer Relationship Smart Devices Charger Entertainment Value Wasting Time Benchmarks Ciminal Keyboard Medical IT Windows 10s HBO Identity Theft Data Privacy Administrator Computer Care Nanotechnology Micrsosoft Device Security Amazon Downtime Screen Mirroring Humor Holidays Data Theft Investment Net Neutrality Adobe Workers Lithium-ion battery Gamification Keyboard Shortcuts Unified Threat Management Managed IT Service Legislation Language Office Streaming Media Sabotage Troubleshooting Personal Information Accessory Myths 5G Solid State Drive Computing Vendor Management Access Root Cause Analysis Business Intelligence Windows Ink Virtual Assistant E-Commerce Emails Cast Copiers Gifts How To Books PDF Mobile Computing Video Games Experience Congratulations Hiring/Firing Work/Life Balance Virtual Reality Covid-19 Current Events Electronic Medical Records Text Messaging Crowdsourcing Employer Employee Relationship es Phone System Cache Benefits Save Time Communitications Computer Accessories Training Monitors Office tips Flexibility Music Advertising Smart Technology Television CrashOverride Compliance Company Culture Scalability Analytics HaaS End of Support Regulation Relocation Black Market Cleaning Big Data Automobile Thank You Twitter Managing Stress USB Worker