Cyber Tip of the Day - Credit Card Security - Cybersecurity Awareness Training

Credit cards are a very popular payment method worldwide, and naturally cyber criminals are always on the lookout to steal card information to commit fraud.

Here are some tips to protect yourself:

  • Keep a list of contact numbers where you can report a lost or stolen card for all your credit cards. If your wallet or purse is stolen, report immediately.
  • Don't toss your credit card statements directly into the trash - they contain lots of sensitive information. Shred them instead. And that applies to expired credit cards as well.
  • On the signature strip behind your cards, don’t sign. Instead write “ASK FOR PHOTO ID”.
  • Never give out your full credit card number over the phone. If it’s an automated, interactive voice response call, make sure it was you who initiated the call and that the number you called was an official, trustworthy number.
  • Review your credit card statements regularly and make sure no fraudulent activity has occurred. Dispute fraudulent transactions immediately.
  • Several card issuers now offer the ability to create an additional password to authorize online payments. Make sure you enable this.

Be Smart. Be Aware. Be Secure. ERMProtect.

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

FFIEC CAT to the CRI Cyber Profile 2.0

Why Some Financial Institutions Are Transitioning from FFIEC CAT to the CRI Cyber Profile 2.0

While the FFIEC does not endorse any specific tool, many financial institutions have started adopting the Cyber Risk Institute’s (CRI) Cyber Profile 2.0 …
GLBA Risk Assessments

GLBA Risk Assessments: A Key 1st Step in GLBA Compliance

The GLBA risk assessment is an organization’s starting point for GLBA compliance. We break it all down in this GLBA risk assessment overview …
Web Application Penetration Testing Services

Common Issues in Web Application Penetration Testing Services

Web applications are now ripe targets for hackers. Here we take a look at a few hacker attacks on web applications & how penetration testing services are critical …