MasterCard successfully processes during Leap Year Day 2000

March/April 2000 Cyber Security

MasterCard reports the successful passing on leap day - 29 February 2000 - of another important 'Year 2000' milestone.

Because of concerns that computers might misinterpret the value of '02/29/00', MasterCard was on full alert during the milestone event period. MasterCard used the processes and procedures developed for the year 2000 date transition to monitor core processes, systems and facilities and is pleased to report that no problems were experienced related to 'leap day' processing and that cardholders continued to experience uninterrupted service.

Throughout the 02/29/00 milestone event, core processes, systems and facilities operated within normal parameters to support MasterCard members and processors without incident.

MasterCard's primary command center was staffed and on standby from 6:00 a.m. on 28 February 2000 to 11:00 a.m. on 1 March 2000 (Missouri, USA local time). Processes were in place to contact key individuals, if required and to effectively communicate problems within the organisation. In St. Louis, Missouri, USA, event management teams monitored MasterCard's status worldwide. Systems specialists monitored MasterCard's computer operations around the world to ensure that all systems continued to process payment card transactions normally.

For details, contact Neville Huxham on tel: (011) 706 8823.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NIST’s impact on cybersecurity
Cyber Security
Through its NIST Cybersecurity Framework, the non-regulatory agency empowers organisations to take a proactive approach towards managing and mitigating cyber risks, enabling them to stay resilient against the ever-evolving threat landscape.

Read more...
Best practice tips for strengthening data privacy system
Security Services & Risk Management Cyber Security
International cybercriminals are increasingly targeting South African organizations, making data privacy more difficult to maintain. A standardization expert offers insight to help combat this threat.

Read more...
AI-powered cyber protection for consumers
IT infrastructure Cyber Security
Acronis Cyber Protect Home Office is designed for the evolving landscape of cyber threats by integrating Acronis' cyber protection and secure backup solutions, combining AI-powered defence mechanisms, robust data backup, remote management tools, and mobile device protection.

Read more...
A surge of cybersecurity for the energy sector
Government and Parastatal (Industry) Cyber Security
With a rapid transition towards renewable energy, the energy sector has an increased reliance on technology. This makes it particularly vulnerable with regards to cybersecurity, as it depends on interconnected systems and digital technologies.

Read more...
Secure backup strategies imperative for business continuity
IT infrastructure Cyber Security
Cybercrime is on the rise, and businesses need to adjust how they manage their data to fend off attackers, or risk irreparable damage, writes Lisa Strydom, Senior Manager Channel and Alliance for Africa at Veeam Software.

Read more...
CHI selects NEC XON as trusted cybersecurity partner
News Cyber Security Industrial (Industry)
CHI Limited, Nigeria's leading market player in fruit juices and dairy products, has engaged in a strategic cybersecurity partnership with NEC XON, a pan-African ICT systems integrator.

Read more...
Mitigating escalating DDoS cyberattacks
Cyber Security
As cyberattacks, particularly those of the Distributed Denial of Services (DDoS) variety, continue to rise at an unprecedented rate across Africa, it is no longer a question of ‘if’ your organisation will be targeted, but rather ‘when’.

Read more...
Six effective antidotes to modern cyber adversaries
Cyber Security
As the head of cybersecurity at NEC XON, Armand Kruger has witnessed the transformation from hooded hackers to a sophisticated dark economy that poses unprecedented threats and is run like a business.

Read more...
Key strategies for businesses in the face of cyber threats
Cyber Security Security Services & Risk Management
Businesses face severe financial and reputational consequences due to data breaches and daily website hacks, and not all organisations are adequately prepared to combat these escalating threats.

Read more...
Cyberattacks are inevitable for small businesses
Cyber Security
The recent cyberattack on Microsoft is a stark reminder that no organisation, regardless of its size or industry, is immune to cyber threats. Even small businesses, often assuming they are less attractive targets, are vulnerable.

Read more...