Security tips

  • Approach an ATM only under the right and safe conditions in order to protect YOURSELF
  • Never share your PIN (even with your spouse or child)
  • Follow the ATM screen's instructions correctly and ensure your Card is secure during and after use
  • Do not take instructions from strangers (even the security guard)
  • Ensure that you sign your card on the signature panel as soon as you receive it
  • Protect your card as if it were cash
  • Do not leave your card unattended; keep it in a secure place and never leave it lying around at home, at work or in a vehicle
  • Be alert to your immediate vicinity when performing a transaction at ATM

Techniques used by criminals targeting ATMs and users

  • Card jamming where an ATM card reader is tampered with in order to trap a customer card. The criminal removes the card once the customer leaves.
  • Card skimming where a skimming device is used to copy a card security information on its magnetic stripe in order to reproduce the information on a counterfeit card.
  • Card swapping where a customer card is swapped for another card without their knowledge during an ATM transaction.
  • Shoulder surfing where an individual stands too close and observe the user enter their PIN.
  • Compromise of PIN number either the customer PIN is noted by observation shoulder surfing or through binoculars or the PIN is illegally recorded by a hidden camera.
  • Vandalism where an ATM machine is deliberately damaged and/or the card reader is jammed preventing the customer from inserting their card.
  • Physical attacks where an ATM machine is physically attacked with the intention of removing the cash.
  • Diversions  when criminals use messages and signs affixed to ATMs either to make the modifications they have made to the ATM look less suspicious or to direct customers to a nearby ATM which they have compromised.
  • Muggings where people are confronted and robbed, usually using force.
  • Phishing  where a criminal sets up a fictitious web site which looks authentic to the user, usually accompanied by an email with a link to the fictitious site. The victim is requested to give their card number, PIN and identity information which is used to produce a counterfeit ATM card or credit card.