- Approach an ATM only under the right and safe conditions in order to protect YOURSELF
- Never share your PIN (even with your spouse or child)
- Follow the ATM screen's instructions correctly and ensure your Card is secure during and after use
- Do not take instructions from strangers (even the security guard)
- Ensure that you sign your card on the signature panel as soon as you receive it
- Protect your card as if it were cash
- Do not leave your card unattended; keep it in a secure place and never leave it lying around at home, at work or in a vehicle
- Be alert to your immediate vicinity when performing a transaction at ATM
Techniques used by criminals targeting ATMs and users
- Card jamming where an ATM card reader is tampered with in order to trap a customer card. The criminal removes the card once the customer leaves.
- Card skimming where a skimming device is used to copy a card security information on its magnetic stripe in order to reproduce the information on a counterfeit card.
- Card swapping where a customer card is swapped for another card without their knowledge during an ATM transaction.
- Shoulder surfing where an individual stands too close and observe the user enter their PIN.
- Compromise of PIN number either the customer PIN is noted by observation shoulder surfing or through binoculars or the PIN is illegally recorded by a hidden camera.
- Vandalism where an ATM machine is deliberately damaged and/or the card reader is jammed preventing the customer from inserting their card.
- Physical attacks where an ATM machine is physically attacked with the intention of removing the cash.
- Diversions when criminals use messages and signs affixed to ATMs either to make the modifications they have made to the ATM look less suspicious or to direct customers to a nearby ATM which they have compromised.
- Muggings where people are confronted and robbed, usually using force.
- Phishing where a criminal sets up a fictitious web site which looks authentic to the user, usually accompanied by an email with a link to the fictitious site. The victim is requested to give their card number, PIN and identity information which is used to produce a counterfeit ATM card or credit card.