Tuesday, February 4, 2014

Swiping That Card, You Are At Risk Everywhere!

Point Of Sale Is A Point Of Insecurity!
Swiping Your Card Is Extremely dangerous…
By Nick Ashton, Founder, CEO, Tracometry Group of Companies.

From the local hole in the wall bar or restaurant to your retail Big Box, Target, Best Buy, Wal-Mart and even your local supermarket, they all are risky business in swiping your credit/debit card to pay for your purchases.

Every cash register today is a computer and is connected to the Internet for various reason, the first of course is to process your purchases and charge to your account.  This connection allows the transmission of your account information, pin number, purchases and your authorization.  In seconds it is sent and the acceptance or denial is transacted.  That means information is being placed in the computer via the magnetic stripe on the back of your card.


This magnetic stripe and pin number method is so outdated, it is the reason we are suffering with so many thefts and hacking of financial accounts.  In fact, a very sophisticated information stream from an altered card can and does infiltrate the POS terminal.  Other methods are even simpler, as this is a computer, other information is being processed, which include inventory, accounting and even emails are part of the daily work.  These are all connected to the Internet Super Highway that allows unwanted Hitchhikers to enter your supposedly secure local retail outlet.

We are insanely aware of passwords, pin numbers and do so much to protect this information or do we?  No we do not!  It is just like how you balance a check book, there are those that can and those that, well, you know what I mean.  Then, those that are having the paper problem of balancing the check book believe, by using a computer, will assist them in getting it right.  Sadly it only gets them in deeper trouble quicker and someone else to blame.

Most Big Box retail outlets also have vendor sections of their websites which are accessible via the Internet from anywhere.  This expedites the process are keeps all parties up-to-date.  It will be a password protected system, which we are lead to believe failed in the case of Target and allowed unauthorized access in the millions. 

Problems, problems, problems, but to KEYTALK they are not!

With KEYTALK overlaid on the entire computer data system and each POS in addition using KEYTALK, we protect the client data and customers can merrily swipe away and purchase all day long.  No more customer service nightmares.  We are the KEY to straight talk when it comes to computer security against hackers, phishers and man in the middle attackers.

We also for years, have allowed the ever needed and requested service of Bring Your Own Device (BYOD).  This means no matter what method your staff, clients or vendors use, they can use their own devices with assured security.  If you still use a password system, there is no problem, KEYTALK takes care of that.  This opens up a myriad of possibilities and cost savings for the corporation as employees are using their own devices, securely.  This totally manageable by your IT department who are now being PROACTIVE in protecting your data services.

In fact, nationally you can become part of the TRUSTED KEYTALK Network, customers know you care and are protecting your valued clients.  They can purchase to their hearts content, knowing that their personal information is secure.

This is not the forum for discussion of highly secure methods, so please contact us and arrange a meeting at your convenience.
KEYTALK will protect you globally!

We are Straight Talking, Key Talking, so should you…

WE are in the NOW and
KEEP YOU; in the KNOW…


Worldwide Call: +1 (317) 426.0110

www.tracometry.com/keytalkoverview.html



Key Talk – Man-In-The-Middle, Hacking & Phishing Solutions

Galveston, Texas, Indianapolis, Indiana, London & North Wales, U.K., Latvia, K.L. Malaysia
Tracometry Group of Companies – Reg. Office. Dorrington Farm, Rye Hill Road, Harlow, Essex CM18 7jF


Copyright 2014

No comments:

Post a Comment