GTL Includes Key-injected Credit Card Scanners

Global Tel*Link (GTL), a provider of correctional technology solutions, announced that it has begun to include key-injected credit card scanners in all of its new payment kiosk deployments, as well as to perform quarterly inspections and audits of all payment kiosks. With this move, GTL is emphasizing its commitment to the protection of customer data by complying with and going beyond industry standards for customer data security.

The new credit card scanners are injected with the GTL encryption key so that all card information is encrypted the moment it is swiped. This type of technology protects against a common type of malicious activity, including the method that has been used to hack the credit card systems of major retailers. The expanded audits, performed quarterly, will include manual inspections, photos, and data analysis by the GTL Kiosk Dispatch team.

With the new key-injected credit card scanners, customer data is encrypted within the credit card scanner rather than being sent first to the kiosk and held in memory before being encrypted. This technology is already part of many GTL payment kiosks in use around the country, and it will be included in all kiosks for new customers as well as replacement-eligible kiosks for existing customers.

Implemented in April, the new payment kiosk inspection protocol requires Field Service Technicians to manually inspect all kiosks in the field, take photos of the kiosks, run through detailed checklists of potential red flags, and upload all of that information to the GTL Kiosk Dispatch team for review. This team will perform comparisons of the quarterly audit documentation, especially photos, to identify any attempts to alter the kiosks in any way. This audit process is in line with the new Payment Card Industry Data Security Standard compliance version 3.1 requirement that states all PCI compliant merchants must develop a “process for periodically inspecting all kiosks for tampering or substitution.”

With the inclusion of the key-injected scanner technology into its payment kiosk credit card scanners, as well as with the implementation of regular, thorough inspections, GTL has demonstrated its leadership in the industry in terms of technology, security, and the protection of important customer data from malicious activity.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.