MasterCard successfully processes during Leap Year Day 2000

March/April 2000 Cyber Security

MasterCard reports the successful passing on leap day - 29 February 2000 - of another important 'Year 2000' milestone.

Because of concerns that computers might misinterpret the value of '02/29/00', MasterCard was on full alert during the milestone event period. MasterCard used the processes and procedures developed for the year 2000 date transition to monitor core processes, systems and facilities and is pleased to report that no problems were experienced related to 'leap day' processing and that cardholders continued to experience uninterrupted service.

Throughout the 02/29/00 milestone event, core processes, systems and facilities operated within normal parameters to support MasterCard members and processors without incident.

MasterCard's primary command center was staffed and on standby from 6:00 a.m. on 28 February 2000 to 11:00 a.m. on 1 March 2000 (Missouri, USA local time). Processes were in place to contact key individuals, if required and to effectively communicate problems within the organisation. In St. Louis, Missouri, USA, event management teams monitored MasterCard's status worldwide. Systems specialists monitored MasterCard's computer operations around the world to ensure that all systems continued to process payment card transactions normally.

For details, contact Neville Huxham on tel: (011) 706 8823.




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

The enemy within – insider ­security threats
May 2019, Wolfpack Information Risk , Editor's Choice, Cyber Security, Financial (Industry)
Insider threats in today’s financial world are insidious and destructive and your defence against insiders should start long before the person assumes his/her position.

Read more...
LoJax: Be very careful
May 2019 , Cyber Security
Even replacing drives won’t kill this malware, which is still active more than nine months after researchers from Arbor Networks detailed it.

Read more...
Assessing impacts: The meteors of security and AI
May 2019 , Cyber Security
As security threats evolve and artificial intelligence pervades, what impact are they set to have on business over the next year?

Read more...
Visibility is key, and lacking
May 2019 , Editor's Choice, Cyber Security
Cybercriminals are most likely to be caught on servers and networks, but detecting their time and point of entry remains a mystery.

Read more...
The benefits of machine learning and UEBA
May 2019 , Cyber Security
Combining accurate and essential user behavioural data with machine learning allows you to more accurately monitor your users on an endpoint-by-endpoint basis.

Read more...
Insiders: who are they?
May 2019 , Security Services & Risk Management, Cyber Security
The 2018 Insider Threat Report by Cybersecurity Insiders reports that more than 51% of companies are concerned about unintentional insider attacks.

Read more...
Securing the Industrial Internet of Things
May 2019, Axiz , Cyber Security, IT infrastructure, Industrial (Industry)
The very benefits that makes the IIoT so compelling, makes it equally capable of damaging infrastructure operations and processes through bad actors.

Read more...
Hybrid cloud and hyper-converged data protection
May 2019 , IT infrastructure, Cyber Security
Arcserve Unified Data Protection extends disaster recovery and backup technologies to prevent downtime and data loss for hyper-converged and SaaS-based workloads.

Read more...
Vivotek strengthens cybersecurity
May 2019 , CCTV, Surveillance & Remote Monitoring, Cyber Security
Vivotek has announced the availability of comprehensive protection in its Cybersecurity Management Solution under the strategy of its 'Security within Security' campaign.

Read more...
Scammers target job seekers
May 2019 , Cyber Security
Kaspersky Lab experts detected a blast of sophisticated spam emails in the first quarter of 2019, featuring fake job-offers that seemed to come from HR recruiters in large corporations.

Read more...