Lesson on Tokenization

We see signs every day that inform us about safety measures an organization is taking. We have all seen these examples:

  • “Premises protected by video surveillance.”
  • “This vehicle stops at all railroad crossings.”
  • “Driver carries less than $100 in cash.”
  • “Caution: Wet floor”

These types of signs are common in business. They show customers, partners, and employees what’s being done to protect the business and help reduce the organization’s risk and liability.

The Path to EMV in the U.S.

EMV (Europay, Mastercard, Visa) has been on everyone’s radar for a while now, but recent data breaches and impending deadlines is making EMV a top priority for merchants.

What is EMV?

EMV® is a global standard for secure credit and debit payment cards based on chip card technology, already in use throughout the world. Also referred to as chip and PIN or chip and signature, EMV-capable bank cards feature an embedded microprocessor chip that contains the cardholder data.

Don’t Become a Target for Payment Data Theft

As if the recent data compromises affecting more than 115,000,000 cardholders among Target, Neiman Marcus, Michaels, Aaron Brothers, Marriott and Sheraton, to name a few, are not enough, experts are predicting data breaches may increase in 2014.[1] Are your payment security measures as strong as they could be?  Wash away all the marketing hype and hyperbole, and learn why TrustCommerce clients rest well, knowing that their customers’ data is secure. These best practices protect payments and reduce the risk and liability associated with accepting electronic payments.

Prevent POS Fraud with Secure Devices

On May 13, 2011 news broke of Michaels arts-and-crafts stores falling victim to debit-card data theft.

“Thieves tampered with the retailer’s debit-card processing equipment at about 80 stores from Massachusetts to Washington, according to the chain’s corporate parent, Michaels Stores Inc.

The thefts apparently involved the use of electronic devices called skimmers that allowed crooks to record information from shoppers’ debit cards and steal their personal identification numbers, or PINs.1