Cyber Tip of the Day – Credit Card Security

Cyber Tip of the Day - Credit Card Security - Cybersecurity Awareness Training

Credit cards are a very popular payment method worldwide, and naturally cyber criminals are always on the lookout to steal card information to commit fraud.

Here are some tips to protect yourself:

  • Keep a list of contact numbers where you can report a lost or stolen card for all your credit cards. If your wallet or purse is stolen, report immediately.
  • Don't toss your credit card statements directly into the trash - they contain lots of sensitive information. Shred them instead. And that applies to expired credit cards as well.
  • On the signature strip behind your cards, don’t sign. Instead write “ASK FOR PHOTO ID”.
  • Never give out your full credit card number over the phone. If it’s an automated, interactive voice response call, make sure it was you who initiated the call and that the number you called was an official, trustworthy number.
  • Review your credit card statements regularly and make sure no fraudulent activity has occurred. Dispute fraudulent transactions immediately.
  • Several card issuers now offer the ability to create an additional password to authorize online payments. Make sure you enable this.

Be Smart. Be Aware. Be Secure. ERMProtect.

ERMProtect's Weekly Newsletter

Get a curated briefing of the week's biggest cyber news every Friday.

Stop Phishing Attacks with ERMProtect's Security Awareness Training

Turn your employees into a human firewall with our innovative Security Awareness Training.

Our e-learning modules take the boring out of security training.

Intelligence and Insights

Cybersecurity Blind Spot Why Physical Security Is Now the Easiest Way In

Cybersecurity Blind Spot: Why Physical Security Is Now the Easiest Way In

Physical security testing has become a crucial part of a modern, comprehensive defense strategy …
Red, Blue, & Purple Teaming

Red, Blue, & Purple Teaming: Unified Strategy Organizations Can’t Ignore

One way of strengthening defenses is through a multifaceted security testing approach known as Red, Blue, and Purple Teaming …
Quantum Computing

Quantum Computing Puts Today’s Encryption at Risk

Security experts warn that hackers are already harvesting encrypted data to decrypt later, making quantum safe cryptography an urgent priority for every sector …