{"id":323,"date":"2005-04-19T00:00:00","date_gmt":"2005-04-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/04\/19\/uk-banks-to-set-new-industry-online-security-standard\/"},"modified":"2021-12-30T11:37:02","modified_gmt":"2021-12-30T11:37:02","slug":"uk-banks-to-set-new-industry-online-security-standard","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/04\/19\/uk-banks-to-set-new-industry-online-security-standard\/","title":{"rendered":"UK banks to set new industry online security standard"},"content":{"rendered":"<p>The community of UK banks is expected to establish a new standard practice for the use of two-factor authorization technology to combat online payment fraud, in the coming weeks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new directive is designed to combat the alarming rise in online fraud that has developed out of identity theft and phishing, while also improving customer confidence in Internet banking tools.<\/p>\n<p>The system would include a device that reads a payment card and accepts a PIN entry from the cardholder.  This is then followed by the generation by the device of a unique security number to be imputed into the website system of the goods&#8217; seller.<\/p>\n<p>Banks are expected to agree on the new technology in May, with roll out to be undertaken over the next 12 months.<\/p>\n<p>http:\/\/www.datamonitor.com\/~464a534ca19940dfbfac9f95422efbc6~\/industries\/news\/article\/?pid=3EBB8311-179A-40CB-8543-DA15A0C07570&#038;type=NewsWire<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-323","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/323\/revisions"}],"predecessor-version":[{"id":2810,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/323\/revisions\/2810"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}