At the time of using a crown box, attention is often centered on the transaction: raising money, consulting the balance, paying bills. But there is a seemingly harmless habit that may pose a real risk to bank safety. A gesture repeated by many, without reflection, can facilitate improper access to accounts.
According to The Collegian newspaper, it is common for users to leave behind the printed bead after an ATM operation.
Although it seems irrelevant, this proof includes information such as bank name, machine location, account balance and the last four digits of the card and account number, sufficient data for someone with fraudulent intentions start an identity usurpation process.
Small data, great risks
According to the same source, a criminal can use this basic information to contact the bank, identify themselves as an account holder and, if you find a more complacent assistant, obtain improper access to funds, end accounts or even request loans on behalf of someone else.
Writes the newspaper that this practice, known as account takeoverinvolves the progressive use of information fragments until it can take control of a bank account. The presence of data in the bead can make this imposture more credible.
Groups more vulnerable to this type of fraud
The publication adds that college students, for example, are often aimed at this type of crime. They live in shared spaces and sometimes leave exposed documents or data, being less careful with the protection of their personal information. In addition, many already have a history of credit, which makes them viable targets.
The combination of seemingly harmless elements may be sufficient for a criminal to move money or request credit on behalf of the victim. It all starts with affordable data collection, such as those in a forgotten bead.
Four steps to reduce risk
It is known that it is possible to avoid this kind of situations with simple measures: always carry the bead with you and keep it for a few days, until confirmed that the transaction was correctly processed.
After that, the proof must be destroyed. It can tear it carefully or, ideally, grind it. If you have no shredded, it is recommended to divide the pieces by different trash crates. Another useful precaution is to consult the account balance regularly, at least once a week.
The printed detail that can open unauthorized access
Refer again what there are experts who consider the impression of the latest card digits and the account on the rods unnecessary. Rob Douglas, consultant in Identity Risk Risk Management, says that these elements, combined with other available information, are sufficient to stage an identity and make bank changes in the name of the victim.
It underlines the same expert that most people ignore these risks by ignorance or distraction. But in a scenario where personal data has high value and constant target of attempted access, each small gesture counts.
Also read: