• Latest
  • All
  • News
  • Business

What You Need To Know About Information Systems

Nov 5, 2016
How are Slots & Other Online Casino Games Programmed?

Slot Selection: Choose The Game That Applies Best To Your Interests

Mar 17, 2023
Five Top Tips On How To Choose The Best Gaming Headset

Five Top Tips On How To Choose The Best Gaming Headset

Mar 17, 2023
A Guide On How To Choose The Best Gaming Mouse

A Guide On How To Choose The Best Gaming Mouse

Mar 17, 2023
Buying A Gaming Monitor: What You Should Look For Before Choosing The One To Buy

Buying A Gaming Monitor: What You Should Look For Before Choosing The One To Buy

Mar 17, 2023
A Step-by-Step Guide on How to Get Your CleanMyMacX Activation Number

Different Factors To Consider When You Want To Choose A Keyboard For Gaming

Mar 17, 2023
10 games that are designed to keep you engaged

Useful Tips for Choosing Your New Gaming Chair

Mar 17, 2023
Discovery Phase For Software Development: How Much Does It Cost?

The 3 Main Reasons To Identify Security Problems in Software Code

Mar 15, 2023
The Evolution Of Air Conditioning Technology And Its Impact on the Way We Live And Consume

The Evolution Of Air Conditioning Technology And Its Impact on the Way We Live And Consume

Mar 14, 2023
What You Should Know About The Maker Protocol: A Comprehensive Guide

What You Should Know About The Maker Protocol: A Comprehensive Guide

Mar 14, 2023
Tableau Developer Career Path in 2023

Tableau Developer Career Path in 2023

Mar 13, 2023
5 Best Data Security Practices

Digital transformation trends businesses need to watch in 2023

Mar 13, 2023
The Biggest Innovations in Business Communication Technology

How to Leverage the Power of Intelligent Leadership

Feb 23, 2023
  • Guest Posts
  • Advertise
  • Contact Us
  • Privacy Policy
Monday, March 20, 2023
Tech Featured
  • Home
  • Latest Tech
  • Apple
  • How to’s
  • Apps
  • Automobiles
  • Gadgets
  • Gaming
  • Reviews
  • Tech Tips
No Result
View All Result
No Result
View All Result
Tech Featured
No Result
View All Result
Home News

What You Need To Know About Information Systems

by techfeatured
Nov 5, 2016
in News
0
0
SHARES
12
VIEWS
Share on FacebookShare on Twitter

[ad_1]

We live in a world today in which everything happens at a jets speed. In business and in our personal lives we need to keep up with this speed of data processing so we are exposed to various channels and devices. The internet remains one of the most substantial means of optimizing business transactions thus rendering physical boundaries like distance very negligible. As the internet continues to transform business opportunities one major cause of concern is the method of payment for goods and services on this platform. It is not news that electronic finance aims at changing the face of the financial industry by encouraging online banking, brokerages, etc leveraging on the internet’s accessibility across the globe this phenomenon has been very advantageous in terms of

1.Reduced cost

2.Increased quality of service and

3.Greater access to financial services.

In as much as the opportunities for growth and business awareness via the internet are limitless this also poses a threat to the financial institutions and to the individual customers. Before the advent of the internet, the most secure way of keeping money in the bank was by using a high tech vault and securing the place with efficient security officials and burglary systems and if money is to move a bullion van is used to convey it from one location to the other in the company of heavily armed security officials. But as bullion vans are rapidly being replaced by Electronic Funds Transfer Systems (EFTs) a more sophisticated means of securing money has to be put in place. In my own words the EFT is more like an amplifier, because all along there has always been the existence of bandits and bank robbers. Only that they were limited to the technology available in their time. These same bandits are still on the prowl and this time having sufficient technology at their disposal to carry out their illicit acts. In Nigeria today for example the Government recently set a standard for electronic payments mandating the use of only PIN and CHIP cards because of their tested security features and their validity. But then we as individual users should not always wait or expect the financial institutions and the Government to do all the work so the following a basic steps that we as individuals can take to put some level of security on the use of an Electronic Funds Transfer System.

Understand the necessity of Encryption Standards: Although this may be somewhat technical for regular users of EFTs but it can easily be done by verifying the use of Digital Certificates of any institution that provides the platform for an EFT. This is usually displayed on the website of the company and you may go a step further by confirming the existence of an independent body that signs off that site as secure examples of such independent bodies include Verisign.

Importance of Acknowledgments or notifications: Although many financial institutions use this concept to promote non-repudiation (a process where the individual cannot deny making a transaction). It is also important as an individual to receive alerts whenever transactions are made this helps to track the time and location of any illegal transaction on your account.

The use of time stamps: This is also mainly used by the institutions to prevent replay of transactions as multiple transactions with similar time stamps would be disregarded except the original. This would also be handy for an individual especially when a huge volume of transaction is posted wrongly such transaction history can be traced and reversed accordingly.

When using retail EFTs such as The Automated Teller machine (ATM) and Point of Sale Systems (POS) it is necessary to understand these concepts.

1. Avoid using birthdays and anniversaries as PINs or Passwords as most of them are easily compromised.

2. Avoid writing down your PIN or Password for any reason.

3. Never disclose your PIN to anyone not even your institution has the right to ask for it.

4. Limit the amount of personal information you provide on various online Communities e.g. Facebook. Twitter, flickr etc.

5. Beware of Shoulder Surfing when entering your PIN or Passwords.

6. As much as possible put some restriction to the access granted to your mobile phones, BlackBerrys, PDAs, PCs or Disk drives especially when they contain sensitive information.

Little information can give away large assets. The best way to avoid this is to be security conscious and understand whatever technology you are using as an individual or as an enterprise.

[ad_2]

Tags: androidapple iphonetechnology news
ShareTweetShareSendShare

For any queries, you can reach us at [email protected]

Latest Posts

  • Slot Selection: Choose The Game That Applies Best To Your Interests
  • Five Top Tips On How To Choose The Best Gaming Headset
  • A Guide On How To Choose The Best Gaming Mouse
  • Buying A Gaming Monitor: What You Should Look For Before Choosing The One To Buy
  • Different Factors To Consider When You Want To Choose A Keyboard For Gaming
Tech Featured

© 2022. All Rights Reserved.

Navigate Site

  • Guest Posts
  • Advertise
  • Contact Us
  • Privacy Policy

Follow Us

No Result
View All Result
  • Home
  • Latest Tech
  • Apple
  • How to’s
  • Apps
  • Automobiles
  • Gadgets
  • Gaming
  • Reviews
  • Tech Tips

© 2022. All Rights Reserved.