Security Information

 

At PaySpark, we do not compromise on the safety and security of our cardholders. We strive to apply highest security industry standards to provide you an utmost secure experience.


Your online Account Security:


Your PaySpark account is accessible online on this web page which is supported with latest SSL security certificates and hardware firewalls


Your online account can only be accessed using a secure login password and supported by Login notification emails to keep you notified of your log in activity and any unauthorized log in attempts to your account


Any functionality within your online account involving financial activity requires an OTP (One Time Password) for execution. An OTP is sent to you by SMS to your registered mobile number.


Your PaySpark Card Security:

 

•The PaySpark Card (both Virtual & Physical) is 3D Secure enabled providing highest security level when performing online transactions. With 3D Secure you will be receiving OTP’s (One Time Password) by SMS to your mobile number to authorize online transactions at 3D Secure participating merchants.
•The PaySpark Physical Card is a PIN on CHIP card; meaning that all cash withdrawal transactions at ATM machines and real world purchases at EMV supported POS terminals require a PIN code for transaction authorization.
•All debit transactions made on PaySpark cards are supported with instant SMS transaction notifications to keep you notified of any activity taking place on your card
•All debit/Credit transactions on PaySpark cards are confirmed with instant transaction notification emails
•Our card management systems are supported with latest fraud monitoring systems allowing us to monitor and identify suspicious activity and  notify our cardholders immediately to minimize any exposure to risk

 

BE AWARE AND CAREFUL OF:

 

Card Skimming
 
Card skimming is the practice of using an electronic device, known as a skimmer, to record account data encoded on the magnetic stripe on a card.
Once the card information is skimmed, thieves use other methods, such as cameras, shoulder surfing (use of a camera or a person to read over the legitimate users’ shoulder), or copying to record PIN information (as in the case of restaurants).
Identity thieves have even gone as far as to set up entirely bogus ATMs in busy locations to skim cards. The user inserts their card and gets it back, but without any transaction occurring. The user assumes the bogus ATM, which has now copied all of the pertinent card information from the magnetic strip, is broken.
The bogus ATM machine is programmed to return the card—rather than just taking it and keeping it—because the latter action would cause the user to call their bank immediately and the card would be cancelled.
 
Phishing
 
Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
 
Keystroke Logging

 
Keyboard logging is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. A keylogger can be a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard. As a hardware device, a keylogger is a small battery-sized plug that serves as a connector between the user's keyboard and computer. Because the device resembles an ordinary keyboard plug, it is relatively easy for someone who wants to monitor a user's behavior to physically hide such a device "in plain sight." (It also helps that most workstation keyboards plug into the back of the computer.) As the user types, the device collects each keystroke and saves it as text in its own miniature hard drive. At a later point in time, the person who installed the keylogger must return and physically remove the device in order to access the information the device has gathered. A keylogger program does not require physical access to the user's computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly. The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.
Although keylogger programs are promoted for benign purposes like allowing parents to monitor their children's whereabouts on the Internet, most privacy advocates agree that the potential for abuse is so great that legislation should be enacted to clearly make the unauthorized use of keyloggers a criminal offense.

 
REMEMBER:

• Change your online account access password regularly and keep you passwords secret
• Keep your PIN code secret
• Be sure no one can see you enter your PIN code
• Do not get distracted as you enter your PIN code
• Keep the card in a safe place
• Pay close attention when you pay with the card at a merchant
• Regularly review your on line statements. If you notice anything abnormal on your account please report it immediately to us
• Carry our telephone numbers with you at all time

 

 

 

Print