Taking risk out of the payments channel

May 2016 Information Security

Online security breaches are becoming the order of the day and such incidences are set to rise as the economy comes under increasing pressure. It is therefore becoming increasingly important for a business owner to take advantage of risk solutions available in order to safeguard their payment system from vulnerabilities.

Andries Kok, CFO of PayAccSys.
Andries Kok, CFO of PayAccSys.

Earlier this month, a breach that affected one of the five major SA banks customers made headlines, and for all the wrong reasons. Bank customers found their accounts illicitly entered into and thousands removed because the one-time PIN system didn’t work the way it should have.

There are several risks in the payment channel, such as the threat of a data intrusion, the theft of a server, or any other means in which a human intervenes in the system to alter data. Payments to suppliers or staff are also subject to security issues. In fact, the risks to sensitive data such as names, bank account numbers, salaries and addresses will always be at risk.

Most payroll and accounting software is username and password access controlled to protect the integrity of the data. Yet, once this software is used to generate output payment files, it usually creates simple data files with no encryption or hashing done to protect the information. This is where the vulnerability lies with these applications and file veracity can be compromised.

By simply accessing this data file, the account numbers and amounts to be paid can easily be modified by an unauthorised staff member or an individual fraudulently accessing the information without anyone noticing. Only once the file has been processed and paid, and it’s too late to do anything about it, will anyone find out that some sort of fraud had been committed.

Many companies are not aware of the risks in the payment channel, or even how to go about plugging the holes.

Each link in the chain needs to be protected individually to mitigate against unauthorised access. One way of doing this is through a secure Application Programme Interface (API), which connects two applications to each other and ensures that data transfer happens safely. In fact, this way of transferring information, while still relatively new in SA, is becoming increasingly popular due to its high level of security.

PayAccSys has taken this security feature on board because its strong algorithms mean that users cannot interfere in the data. In our industry it is vitally important to stay ahead of the curve and we took the decision to add the API technology as an additional means to ensure protection to our clients and the safe transfer of their funds.

That being said, our advice to other businesses who are considering adopting this new technology to secure data is to ensure that it is designed and managed properly because the API is only as powerful as the code used.

API technology is the way of the future, but remember that it is just one step in the process, a link in the chain which is also dependent on other links being checked and secured in a similar manner.

For more information visit www.payaccsys.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...