Your Neighborhood ATM May Go On The Cloud To Improve Security

Your Neighborhood ATM May Go On the Cloud to Improve Security

In our fast-moving world, if there’s one piece of public equipment we can’t do without it’s the Automated Teller Machine. The ATM, or Any Time Money as it’s often called, is an innovative device that has made life easier for us, the same way as gas pumps – you arrive, swipe a card and then take as much as you need. Now, according to the latest in ATM technology, this friendly neighborhood device may soon go on the cloud. And what’s more, it’s all in the name of increased security.

Now, cloud security is something that has supporters and detractors in equal measure. On one hand, a police department snubs cloud computing citing security concerns (See: LAPD Refuses To Go On the Cloud); on the other hand, the US Army, perhaps the most security-conscious organization in the world, reposes its faith in the technology (See: US Army Awards First Cloud Computing Contract). In this light, ATM services company Diebold offering a cloud-based solution to address security concerns is of special significance.

ATM security is something that gives quite a few headaches to financial institutions and law enforcement officials worldwide. From brute force attacks to extract cash from the machines, criminals have graduated to more sophisticated measures using advanced electronic equipment to obtain data rather than cash. With this compromised data, they end up stealing a lot more than a single machine could have possibly yielded.

There are big bucks at stake here. The Wall Street Journal reports , that according to the Federal Bureau of Investigation (FBI), more money is stolen today through data breaches, including compromised ATM systems, than through physical bank robberies. And the American Bankers Association (ABA) estimates that thieves in a typical ATM heist rob ten times more money than in a typical bank holdup.

All things considered, the ATM is a computer with cash and signaling capabilities to a central server. Diebold’s solution is to move confidential information from the ATM hard drive to the cloud. Now, information stored in the cloud can actually reside in heavily-guarded server farms with state-of-the-art motion sensors and 24/7 secured access, camera surveillance and security breach alarms. As is obvious, security would be much better than in the neighborhood ATM.

This solution is not without its detractors. Some believe that by concentrating data at one place, criminals would be presented with an attractive target. Personally speaking, I believe that while this concern is valid, security measures can be put into place to address this issue. And it’s definitely easier to do so at a few server farms than at each and every ATM location.

Stock markets have already started using cloud computing (See: What NYSE’s Adoption of Cloud Computing Means for the Industry); if ATMs too join in, a whole gamut of financial services would have adopted this technology. With the number of ATMs worldwide expected to increase from 2.4 million today to 3.2 million by 2016, that’s a lot of data projected to be in the clouds.

By Sourya Biswas

Sorry, comments are closed for this post.

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…