Menu
Posted: Feb 23, 2016
Comments: 0
Author: Tom Davis

Wouldn’t it be nice to say goodbye to plastics.  Imagine your cardholder loses your card while away on a business trip. Imagine your cardholder getting that dreaded phone call or text alert notifying them that their debit or credit card number has been compromised and the card has been shut down. These are tough realities, right?

 

Read more
Posted: Feb 19, 2016
Comments: 0
Author: Lou Grilli

10 Steps Credit Unions Should Take To Keep Member Data Safe

Taken at face value, mobile payments are considered more secure than credit cards, even more secure than EMV chip cards. Unlike chip cards, the payment credentials stored on the phone or watch are tokenized, whereas the chip card has the actual card number on the chip. Also, the phone requires an additional authentication (a fingerprint or a passcode) which the card does not require. This is the current case with Apple/Samsung/Android Pay. But there are other forms of payments both in the market and in start-ups whose focus is not on security. These start-ups are working on merchant-specific payment and loyalty apps, on-demand service apps, pay-at-the-table apps, and the vulnerability of these new forms of payments are driving increased security concerns.

Read more
Posted: Feb 18, 2016
Comments: 0
Author: Lou Grilli

Part 3 of a 3-Part Series

More on Tokenization

This is Part 3 of the 3-Part series “Tokenization, Encryption, EMV, and Biometrics: The New Superheroes of Payments Fraud.”  In Part 1, we reviewed tokenization, its background, and how it is now being used in mobile wallets.  In Part 2, we provided a deeper understanding of EMV and its use of encryption to protect payment credentials and we covered how NFC technology fits into the payments picture. In Part 3, the final installment of the series, we will look more closely at tokenization, the protection of payment credentials and some of the potential problems it will present the merchants.

Read more
Posted: Feb 10, 2016
Comments: 0
Author: Lou Grilli

Part 2 of a 3-Part Series

This is article 2 of 3 in the series “Tokenization, Encryption, EMV, and Biometrics: The New Superheroes of Payment Fraud.” In Part 1, we reviewed tokenization, its background, and how it is now being used in mobile wallets. It is also good to gain a deeper understanding of EMV and its use of encryption to protect payment credentials. EMV is a technology and a solution designed to prevent card counterfeit fraud.

Read more
Posted: Feb 4, 2016
Comments: 0
Author: Lou Grilli
Financial institutions have always had their work cut out for them trying to make sure that when a member or cardholder reaches for a card to pay with, it’s their card; in other words, being top-of-wallet. But using mobile apps to pay adds a new twist. Now, the mobile phone user needs to actively choose which card to add to the mobile app and most apps allow more than one card.
Read more
RSS
First78910111213141516

search

Featured Stories