Summarized by Molly Luxem, Marketing Assistant

One simple principle of computer security is this: If you can’t prove the physical security of a networked thing, you also cannot prove its cybersecurity. That’s because in most cases, networked things really aren’t designed to defend an experienced and driven attacker who can physically connect his own devices. So you can imagine the shock and horror seeing a Cisco switch and wireless antenna sitting uncovered atop of an ATM out in front of a busy grocery store.

Avoid stand-alone ATMs and use wall-mounted and/or bank-operated ATMs instead. In many cases, thieves who can access the networking cables of an ATM are hooking up their own sniffing devices to grab cash machine card data streaming through the ATM network in plain text.

If something doesn’t look right about an ATM, don’t use it and move on to the next one. It’s not worth the trouble and hazard associated with having your bank account emptied of cash. Also, it’s best to favor ATMs that are installed inside of a building or wall as opposed to free-standing machines, which may be more susceptible to interference.

Click here to read the full article from Krebs on Security.


Get in touch with i3 Business Solutions today

At i3 Business Solutions, we use the best technology to partner with local businesses to transform IT departments and improve business productivity. Contact us here or fill out the form below:
  • Hidden
Published with permission from TechAdvisory.org. Source.