7 Questions To Ask Before Investing in VoIP

So you are thinking of moving your office phones over to VoIP? Before you do that, do yourself a favor and read this blog post. It will not only save you money, it will educate you about the various details of VoIP phones. 

Back to posts

What is Credit Card Skimming and Is it Really a Threat?

What is Credit Card Skimming and Is it Really a Threat?

credit card skimmingWith today's proliferation of cyber crimes, IT security is becoming increasingly more important. Even when you do follow the strictest of IT security rules, you may still fall victim to credit card skimming. Credit card skimming is when someone uses an illegal device to collect the information from the magnetic stripe on your ATM, debit, or credit card. Once the individual has this information, they can copy it over to another card and use it to withdraw cash or make purchase in your name. Considering the potential financial turmoil, it's vital to do everything possible to keep your credit card data safe. Continue reading to learn more what is card skimming and is it really a threat?


How Does Card Skimming Work?

With card skimming, the nefarious individual uses a camouflaged counterfeit card reader to record all of the information stored. In addition to ATM machines, there are many other places where credit card skimmers can be used, such as taxis and restaurants. Essentially, these devices can be used anytime someone takes your card to run the charge. In some instances, the scammer can use a hand-held skimmer or a device small enough to fit in their pocket.


Related Post: That fake app just stole your ID


What does a Credit Card Skimmer look like?

Here are a few examples of what real credit card skimmers look like. They are fairly difficult to spot in most cases. Click on each image so see a correlating news story. 





skimmer 2


The Top 10 Most Expensive Computer DisastersWhy Is Card Skimming Important?

It's vital for you to be aware of card skimmers because it can cost you your hard earned money. While most credit card companies will recover a certain portion of your losses, this doesn't mean you will recover all of your money. At the same time, you should consider the significant amount of time it will cost you gathering the required documents, such as police reports. Although most people assume their credit card information was stolen from some type of online scam, a growing number of card skimming occurrences are popping up.


IT Security Tips to Prevent and Detect Skimming

Since most skimming incidents are hard to detect because your card may remain in your possession, your best defense against stolen credit data is to know what to look for and what to do.

  • Monitor your credit and checking accounts daily and report any suspicious activity immediately.
  • When using an ATM, make sure there are no devices attached to the ATM, such as a fake keyboard or an extra camera designed to steal your PIN.
  • Pay attention to where you shop. Gas stations, bars, and restaurants are the most likely locations where credit card skimming will happen.
  • Always know where you leave your credit card. If you can't see your debit or credit card, you could be a victim of stolen credit card data.
  • Understand how the credit card skimming devices look, so you can stay alert.
  • Cover your hand when you are entering your PIN in the ATM. If you ever notice that the keys are difficult to push, remove your card and simply use another machine.


What to Do After Your Card Has Been Skimmed

The first step to take after your card data has been stolen is to call the credit card company and follow up in writing. You may also want to alert the Federal Trade Commission to make them aware of the fraudulent activity. However, the best solution is to place a fraud alert on your credit report. This alert lets you know anytime someone attempts to access your credit report or open a new account in your name.

Kevin Gray
Hello! I am the Vice President @ EnvisionIT Solutions. | Technology Expert | Author | Speaker | Small & Medium Business IT Support - We founded EnvisionIT Solutions in 2007 to provide IT services and support for business owners/CEOs who value the necessity of technology to drive their success and growth.

Find me on:


21 Questions To Ask Before Hiring An Honest, Competent, Responsive, Fairly-Priced Computer Consultant

Don’t trust your company’s critical data and operations to just anyone! This business advisory guide will arm you with 21 Revealing Questions you should ask any computer consultant before giving them access to your network.

21 Questions

Recent Posts

7 Questions To Ask Before Investing in VoIP

So you are thinking of moving your office phones over to VoIP? Before you do that, do yourself a favor and read this blog post. It will not only save ...

Read more

Four Common Misconceptions About VoIP

VoIP is often mysterious to most business owners due to the fact that it is a fairly new technology. Unfortunately because of this, there are some mis...

Read more

VoIP is VoIP Right?

  With so many companies implementing the same protocol to get calls onto the internet, you’d think one would work just the same as another. Unfortuna...

Read more

Who Uses VoIP and Why?

  Why is VoIP such a big deal these days? Businesses with employees in multiple locations have found that VoIP enables them to connect through a singl...

Read more