Taking risk out of the payments channel

May 2016 Information Security

Online security breaches are becoming the order of the day and such incidences are set to rise as the economy comes under increasing pressure. It is therefore becoming increasingly important for a business owner to take advantage of risk solutions available in order to safeguard their payment system from vulnerabilities.

Andries Kok, CFO of PayAccSys.
Andries Kok, CFO of PayAccSys.

Earlier this month, a breach that affected one of the five major SA banks customers made headlines, and for all the wrong reasons. Bank customers found their accounts illicitly entered into and thousands removed because the one-time PIN system didn’t work the way it should have.

There are several risks in the payment channel, such as the threat of a data intrusion, the theft of a server, or any other means in which a human intervenes in the system to alter data. Payments to suppliers or staff are also subject to security issues. In fact, the risks to sensitive data such as names, bank account numbers, salaries and addresses will always be at risk.

Most payroll and accounting software is username and password access controlled to protect the integrity of the data. Yet, once this software is used to generate output payment files, it usually creates simple data files with no encryption or hashing done to protect the information. This is where the vulnerability lies with these applications and file veracity can be compromised.

By simply accessing this data file, the account numbers and amounts to be paid can easily be modified by an unauthorised staff member or an individual fraudulently accessing the information without anyone noticing. Only once the file has been processed and paid, and it’s too late to do anything about it, will anyone find out that some sort of fraud had been committed.

Many companies are not aware of the risks in the payment channel, or even how to go about plugging the holes.

Each link in the chain needs to be protected individually to mitigate against unauthorised access. One way of doing this is through a secure Application Programme Interface (API), which connects two applications to each other and ensures that data transfer happens safely. In fact, this way of transferring information, while still relatively new in SA, is becoming increasingly popular due to its high level of security.

PayAccSys has taken this security feature on board because its strong algorithms mean that users cannot interfere in the data. In our industry it is vitally important to stay ahead of the curve and we took the decision to add the API technology as an additional means to ensure protection to our clients and the safe transfer of their funds.

That being said, our advice to other businesses who are considering adopting this new technology to secure data is to ensure that it is designed and managed properly because the API is only as powerful as the code used.

API technology is the way of the future, but remember that it is just one step in the process, a link in the chain which is also dependent on other links being checked and secured in a similar manner.

For more information visit www.payaccsys.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
] A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.