Tag Archives: credit card security

Everyone Needs to be Responsible for Cyber Security

The threat of cyberspace attacks are a significant concern for businesses and individuals. The Internet is a great resource for finding information and to make a purchase. However, the use of personal data when online is a valid concern for … Continue reading

Posted in IT and Computer Security, Training and Education | Tagged , , , , , , , | Leave a comment

Don’t Be a Victim: How to Prevent Identity Theft (Part Two of Two)

Superior Solutions provides more steps to take to prevent identity theft in this two part series Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , , , | Leave a comment

Merchants Need to Prepare – EMV Part 2

In our last blog, we introduced you to EMV cards, the new micro-chip enabled credit cards which have been used widely in Europe and which would soon be debuting in the United States. Consumers aren’t the only ones who will be impacted by this technology. EMV USA has compiled several steps for merchants to put together a plan for making the transition to this new format a smooth one. Continue reading

Posted in IT and Computer Security, Uncategorized | Tagged , , | Leave a comment

Americans, A New Credit Card is Coming to Town – EMV Part 1

American consumers need to get ready as a new type of credit card is on its way to their shores. The EMV card (which stands for Europay, Mastercard, and Visa) has been in use in Europe for some time and is due to be phased in to the United States within the next few years. Continue reading

Posted in IT and Computer Security, Uncategorized | Tagged , , , | Leave a comment

Tips to Protect Your Customer’s Payment Information

Did you know that your unexpired credit card is worth as little as $0.06 and as much as $1000 on the black market? Cyber security experts explain that the “street value” of a stolen credit card number can vary widely depending on the status of the account, credit limit available, expiration date, and whether there is a physical-issued card to be sold as well. Continue reading

Posted in IT and Computer Security, Training and Education, Uncategorized | Tagged , , , , , , , , , , | Leave a comment