Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 3 declined, 2 accepted (5 total, 40.00% accepted)

Security

Submission + - What can be done about security of debit cards?

JumpDrive writes: I have been the victim of debit card theft from one of the cards using (Visa). I do not know where they stole or got the number, but it was used one day on the other side of the country and the next day was used in Europe until they cleaned out my account. I had been monitoring my account online and immediately went to the bank and filed a claim. I was told at that time it would be 3 to 5 weeks for them to investigate the claim before they could return my money.
Recently I tried to make a purchase with a debit card and was told that they couldn't use the card since it wasn't a Visa or MasterCard check card, this led to a discussion of why I no longer have a Visa or MasterCard check card. Which then led to the question of "What can be done about it?".
Currently I have a separate account for debit usage for my personal safety. But I also think that those producing these check cards should be required to advertise the hazards of having one of these cards (not in small print and maybe required in advertisement of these cards, similar to what is required with pharmaceutical drugs on television) and/or that if a debit or check card is issued a separate account should be required for it's use and users informed of the issues of placing all of their money in the same account that their debit card has access to.
What other precautionary measures should be required or taken?
Security

Submission + - How do you monitor documents 1

JumpDrive writes: I have been presented with a problem recently, which I know others have probably faced. During the last month one of our customers accused us of providing another customer with their specification. So the question arose how do we or can we trace documents and find if they are being opened or used somewhere where they weren't intended. We don't want to be restrictive because at time we have people all over the place, but if one of our documents were opened in a foreign country, that would arouse suspicions. Most of our documents are made with MS office suite, and I have been thinking of working on a macro to ping a server, but that would require the user to enable the macro's and it would also require the insertion into about 1000 documents. But it's been difficult for me to find a solution that doesn't prevent someone in Omaha from opening a document for legitimate use and is not a solution that can easily be disabled or hacked around.

Slashdot Top Deals

Nothing succeeds like the appearance of success. -- Christopher Lascl

Working...