Tips: ATM, Debit Card Safety

To launch ATM and Debit Card Safety Awareness Month, PULSE offers tips to encourage consumers to remain vigilant about safety while using debit cards at ATMs and point-of-sale terminals.

“The recession has prompted consumers to use their debit cards more often than other payment methods, but with frequent use comes the increased potential for fraud,” said Jim Cichy, PULSE vice president of fraud management. “To keep money safe and secure, consumers need to better understand how to work with their financial institution to combat security compromises and fraudulent use of financial information.”

  • To enjoy the many conveniences of debit and reduce the risk of becoming a victim of fraud, consumers should keep these recommendations top of mind:
  • Keep your PIN a secret: Memorize your personal identification number (PIN), never write it on your card or store it with your card. Never let someone else enter your PIN for you. Many security experts recommend changing your PIN often and using different PINs for different accounts. These are steps that make it more difficult for criminals to use your card if it’s lost or stolen.
  • Do not disclose information about your card over the telephone: No company or individual should ever ask for your PIN, not even your financial institution. If you perform transactions over the telephone using your debit card, never disclose your PIN.
  • Never disclose information about your card in response to an unsolicited e-mail or request: E-mail is a common channel for perpetrating fraud. Never provide your debit or credit card number, PIN or any other non-public personal information to any entity in response to an unsolicited e-mail or request. Your financial institution will never send you an e-mail asking for your PIN.
  • Make certain your Internet shopping sites are secure: Look for secure transaction symbols when shopping online to ensure your account information is protected. These include a lock in the lower right corner of your browser window and a web address that begins with “https.” Always log off from any site after you make a purchase. If you can’t log off, close the browser to prevent unauthorized access to your account information.
  • Report a lost or stolen card at once: Immediately call your financial institution if your card is lost or stolen to reduce the chance that it will be used improperly. Immediate notice of lost or stolen cards will also limit your potential liability for unauthorized transactions.
  • Review your account statements for unauthorized transactions: Review all account statements from your financial institution promptly, and report any errors (including transactions you believe may be unauthorized) as soon as possible. Most financial institutions offer secure online access to accounts. Online access to checking accounts can help you spot suspicious activity quickly. Prompt notification will limit your potential liability for unauthorized transactions.
  • Protect your card’s magnetic stripe: Do not expose your card’s magnetic stripe to magnetic objects. Magnetic objects can damage your card.

Additional measures you can take include:

  • Never allow a cashier or any other person to enter your PIN for you, even if they are assisting you with the transaction.
  • Block the view of others when using an ATM or PIN debit terminal.
  • Be certain your ATM or debit transaction is complete and review your receipt before leaving.
  • If you receive cash back from a transaction, put it away before leaving.
  • When using an outdoor ATM or debit terminal, such as a gas station, always observe your surroundings before making a transaction.
  • When using an outdoor terminal, if anyone or anything appears to be suspicious, leave the area at once.
  • If an ATM appears to have any attachments or alterations to the card slot or keypad, do not use it; report the tampering to the ATM owner immediately.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3