MasterCard successfully processes during Leap Year Day 2000

March/April 2000 Cyber Security

MasterCard reports the successful passing on leap day - 29 February 2000 - of another important 'Year 2000' milestone.

Because of concerns that computers might misinterpret the value of '02/29/00', MasterCard was on full alert during the milestone event period. MasterCard used the processes and procedures developed for the year 2000 date transition to monitor core processes, systems and facilities and is pleased to report that no problems were experienced related to 'leap day' processing and that cardholders continued to experience uninterrupted service.

Throughout the 02/29/00 milestone event, core processes, systems and facilities operated within normal parameters to support MasterCard members and processors without incident.

MasterCard's primary command center was staffed and on standby from 6:00 a.m. on 28 February 2000 to 11:00 a.m. on 1 March 2000 (Missouri, USA local time). Processes were in place to contact key individuals, if required and to effectively communicate problems within the organisation. In St. Louis, Missouri, USA, event management teams monitored MasterCard's status worldwide. Systems specialists monitored MasterCard's computer operations around the world to ensure that all systems continued to process payment card transactions normally.

For details, contact Neville Huxham on tel: (011) 706 8823.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Patient critical – healthcare’s cybersecurity pulse
August 2019, Wolfpack Information Risk , News, Cyber Security, Healthcare (Industry)
The healthcare industry has become one of the leading cybersecurity attack vectors worldwide for several reasons.

Read more...
Building a Human Firewall
August 2019, Kaspersky Lab , Cyber Security, Training & Education
Riaan Badenhorst, general manager of Kaspersky in Africa answers some questions on the role of people in cybersecurity risks.

Read more...
Inundated with cyberattacks from all directions
August 2019 , Editor's Choice, Cyber Security, Security Services & Risk Management
IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up-to-date technology.

Read more...
Under cyberattack
August 2019, Kaspersky Lab , Cyber Security, Residential Estate (Industry)
Cybersecurity is not something one usually associates with residential estates, but the threats from cybercriminals apply equally to estates as they do to businesses and the individual homeowner.

Read more...
Cyber tools and solutions
August 2019, Technews Publishing , Editor's Choice, Cyber Security, IT infrastructure, Residential Estate (Industry)
Hi-Tech Security Solutions looks at the various options we have when it comes to protecting yourself from the ever-growing scourge of cybercrime?

Read more...
Understanding the data protection requirements and how to comply for POPI or GDPR
July 2019 , Cyber Security, Security Services & Risk Management
For many companies that must comply with these legislations, the best way to prepare is to implement a solid data protection strategy that guards against loss of data.

Read more...
Going safely into the brave new world of 4IR
July 2019 , Industrial (Industry), Cyber Security
Put cybersecurity at the heart of industrial digitisation on the journey to 4IR.

Read more...
It’s not wise to go SIEMless
August 2019 , Cyber Security, Security Services & Risk Management
As with every other aspect of security today, information security, while the popular child in a dysfunctional family, is no longer enough.

Read more...
A one-size-fits-all approach won’t secure the IoT
August 2019 , News, Cyber Security
Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach, and every kind of connected object must be assessed individually.

Read more...
Cloud advantage or cost?
August 2019 , Cyber Security, IT infrastructure
No matter how you look at it, security in the cloud is as important as security in traditional data centres.

Read more...