PIN Security and Key Management to Prevent Data Breaches
Source: Fair Isaac
The financial industry's task in recent months has been to focus on cleaning up from breach aftermaths and scripting customer service and media responses to consumers and reporters alike. Meanwhile, the criminal elements focus on identifying and exploiting additional weaknesses that range from compromising PCI compliant merchants to accessing authorization systems to increase the value of a payment card. This white paper will examine best practices in several areas of ATM processing and computer security that any financial institution or service provider can use as a starting point to secure its processing infrastructure against the latest internal and cyber attacks.