Understanding Ecommerce Fraud Risks and Exposures
|
|
- Wilfred Stephen Underwood
- 8 years ago
- Views:
Transcription
1 Understanding Ecommerce Fraud Risks and Exposures ASOBANCARIA s 6th Congress of Fraud Prevention and Security Thursday, 25 October, 2012 Chris Burns, CEO
2 Agenda The Underground Internet Economy Still Thriving The Cost of Fraud Current Trends in Online Fraud Examples of Fraudulent Activity Mobile Trends Fraud Mitigation & Case Studies FAC Recommendations
3 The Underground Internet Economy Fraud is a costly experience for all online merchants Shadow internet economy still thriving Merchants are trying to keep up with fraud to protect their bottom line and their customers Increases in ecommerce are driving increased fraudulent activity 1. 5 million victims of Cyber crime per day Million victims per year (Norton) Cybercriminals are sophisticated and understand the card processing systems better than most merchants Cybercriminals continually develop new methods for tricking victims with scams that bring in billions per year in profits
4 The Underground Internet Economy In 2011, fraud cost businesses over $100 Billion Losses included: Unrecoverable Product Replacement Costs Chargeback Fees + dispute fees Manual Reviews Distracts staff from revenue generating aspects of operating a business Fines and Penalties Loss of merchant account Customer Satisfaction, Brand Image, insulted customer Number 1 reason for CBs is fraudulent transactions (Visa) Fraud increased by 25% year-over-year, e-commerce grew 16% Brazil accounted for 7% of global economic loses related to cybercrime $8 billion, Mexico was responsible for $2 billion Source: Kount
5 The Underground Internet Economy Cost of Fraud Merchants using more tools to compete with increased fraud threat = higher costs Large merchants use on average 8 different tools to screen orders Nearly 50% of all chargebacks are direct result of fraud Refunds can be = to or > cost of CBs loss of product, shipping costs Average order rejection rate in US is 2.4% and 7.7% internationally Revenue impact felt by small and large business alike Management, reviews and escalation of suspect transactions time and cost of review teams Merchants bear the highest percentage of fraud costs compared to Banks and card holders Source: Kount
6 Industries with the highest fraud rates - US 1. Consumer electronics 2. Apparel/Jewelry 3. Household/General Merchandise 4. Physical Goods 5. Digital goods and services 6. All services Source Cybersource 2012 online fraud report
7 The Underground Internet Economy Current Trends: Just some examples of methods used by fraudsters today to obtain personal and financial information Identity Theft Credit Card Number Generators Phishing Card Counterfeiters Spam/Junk Mail offers Black Market Card & Billing Address Lists Skimming Key Stroke Loggers Spoofing 3D Secure Enrolment Phishing Scams Malware Nigerian money transfer scam s Server Hacking
8
9 The Underground Internet Economy Cybercriminals profit from selling stolen data TrendLabs identified the following items & their average price tag for sale on the underground: Documents Scan Resale Services: Passport/utility bill/statement - $20 Credit card (front and back) - $25 Original docs - starts from $4 Passport - $20 Drivers License - $20 Credit cards - $30 Utility bill - $10
10 The Underground Internet Economy Credit Card Number Value in the Cybercriminal Underground US $1-3 per US based card number US $3-8 per Central America, Australia & Europe-based number US $6-10 per number in Asia, Middle East and other countries 1 verified PayPal account (attached to credit card or bank account) costs US $1-6 when sold underground Source: Trend Micro TrendLabs: Annual Security Roundup 2011
11 Examples of Fraudulent Activity Phishing Phishing attacks use or malicious websites to solicit personal information by posing as a trustworthy organization For example, an attacker may send seemingly from a reputable credit card company or financial institution requesting account information FACT ebay & PayPal are 2 of the most commonly phished sites (Source: TrendLabs) When users respond with the requested information, attackers can use it to gain access to those accounts
12 Examples of Fraudulent Activity
13 Examples of Fraudulent Activity
14 Note the high jacked URL This is a phished site Copyright year is different
15 This is the real site (URL and look & feel has since changed)
16 Examples of Fraudulent Activity Social networking sites present huge opportunities for cybercriminals Some reports indicate that as much as 30% of personalities on social network sites are people working a scam Facebook, LinkedIn, Twitter, MySpace and other social networking sites all been hit by various phishing scams Dorkbot malware -- Latin America was the most infected region in The worm stole 1000s of passwords for Facebook, Twitter Gmail and Paypal LinkedIn phishers targeted users with suspicious invitations to connect. The link triggered malware that embedded itself in user s browser if the browser was opened July, Twitter phishing scam preying on curiosity about criticism. Came in the form of a direct message from a friend, but was phishing scam aimed at stealing Twitter login details
17 TrendLabs Annual Security Roundup 2011 TOP 3 PUBLICLY AVAILABLE INFORMATION ON SOCIAL MEDIA 3 MOST COMMON FACEBOOK ATTACK TYPES addresses Hometown High school Likejacking Attacks Rogue application propagation attacks Spam campaigns TOP 3 SOCIAL MEDIA SECURITY RISKS Malware infection Data leakage Unwilling attack participation
18 Examples of Fraudulent Activity Credit Card Number Generation Credit card generation software online is prolific and easy to obtain Once the card BIN number is sourced, online generation software can produce thousands of card numbers which will authorise online BIN attacks are common on merchant web sites and are detected by fraud software or a diligent payment solutions provider who recognize the transaction testing patterns used to validate BIN ranges and counterfeit credit card numbers New online reference sites like the BIN database are very useful to banks and fraudsters for completely different reasons!
19 Examples of Fraudulent Activity
20 Examples of Fraudulent Activity
21 Examples of Fraudulent Activity
22 Examples of Fraudulent Activity Cybercriminals always trying out new schemes in order to replace old ones that have become less effective Ukash & Paysafecard (voucher providers) are frequently used by criminals (according to TrendLabs) Both companies are legitimate businesses. However, vouchers are like cash and there is no records of them changing hands Criminals take the vouchers and sell them to exchange sites for 40 to 50% of face value Exchanges then sell them to customers for up to 90% of value
23 Examples of Fraudulent Activity
24 Examples of Fraudulent Activity Affiliate networking has helped fraudsters flourish even more with products sold via affiliate & cost-per-click marketing Merchants are misled into paying commissions that they should not be paying Fraudulent affiliates use techniques such as cookie-stuffing, URL hijacking & adware to get paid commissions for leads they did not refer They may also order products using stolen credit cards with no intention of receiving product, just the commission
25 Mobile Trends Source: KOUNT
26 Mobile Trends Mobile is an important extra channel to market Smartphones and tablets & their large -scale consumer adoption is changing the way we pay. 80% of Latin Americans have a mobile phone BUT as use of mobile payments grows globally, so too does risk of FRAUD Mobile fraud risk is still fairly unknown, but evidence suggests that mobile fraud rates may be among highest of all CNP fraud Two schools of though on this Riskier as it is a new channel (more loop holes) and harder to identify the device Vs. closed mobile network device almost always on person and passcodes on phones. Mobile vulnerabilities doubles in 2011 over % of mobile users received a text from someone they didn t know asking them to click on malicious links
27 Mobile Trends 2011 saw the mobile threat landscape mature -- evidenced by staggering spike in mobile malware volume (According to Trend Micro s Trend Labs annual security roundup) But if you pass on offering mobile payment, you lose out on the upside of this sales channel If current trends hold, we may be able to see more than 120,000 malicious Android apps by the end of Menard Oseña, Trend Micro Solutions Product Manager
28 Fraud Mitigation Use the right tools Fraud detection tools are those used to identify the probability of risk associated with an online transaction. They do not guarantee that a fraud will not occur and certainly will never prevent a chargeback from being initiated by the consumer Fraud prevention tools like CVV2/CVC2 and 3-D Secure do provide guarantees against fraud coded chargebacks and are fully sponsored by the Card Associations for chargeback compliance What can you take away from all of this? Importance of choosing an e-commerce Provider that can work with you to help mitigate fraud & customize a solution that is right for your business Payment and Fraud Strategy should always be top of mind (even when you think you have it nailed)
29 Fraud Mitigation Use the right tools: AVS & Card Verification Code 3-D Secure Bin Blocking Card Blocking Transaction Data Monitoring Manual Reviews Transaction Value Caps Volume Limits FAC is also currently adding a third party risk scoring system to our platform Kount Kount provides maximum protection for some of the world s best known companies. Hundreds of variables are analyzed to give the merchant a clear picture of the risk associated with a transaction
30 Fraud Mitigation Who is Kount? Founded in 2007 (Idaho, USA) Technology dating back to 1998 Multiple patents Empower their merchants to WIN THE WAR on fraud An operational platform, all-in-one, SaaS solution Reduce fraud without jeopardizing sales Greater usability with less complexity Speed & Accuracy
31 Fraud Mitigation Kount Complete Platform
32 Recommendations What can you do to protect you business? Watch for behaviour patterns that don t seem normal for customers at your web site (or on the phone, or other access point) or Merchants in your portfolio Merchants must implement PCI compliant security requirements to reduce risk to malware/trojan/spyware attacks. Implement transaction pre-authentication solutions including AVS, CVV2, IP Geolocation and data sharing services in addition to Verified by Visa & MasterCard SecureCode WHY? Pre-authentication transaction services - pre-screen transactions to filter out obvious or suspicious fraudulent transactions Outsource fraud services to knowledgeable third parties who are experts in detection and data analysis Don t be afraid to ask for help KNOW YOUR ENEMY!
33 Recommendations Pre-authentication and automated fraud screening services cannot predict human behaviour which ultimately results in chargebacks. Habitual chargeback offenders (the friendly fraud culprits) are aware of this and will use this over and over again 3-D Secure is there to protect online merchants from habitual chargeback offenders by allowing fraud chargebacks to be represented under the chargeback liability shift guarantees Implement pre-screening of card information before you process the payment (if applicable). It s an extra step but a valuable one to prevent a chargeback loss later on REMEMBER!
34 Fraud Prevention Case Studies Latin America Caribbean Merchants Large Airline in LACR implemented FAC s AVS + CVV2 consumer verification to validate legitimacy of the consumer transaction prior to the actual payment for the ticket. This enables the airline to verify the plastic for fraud before the ticket is issued Airlines & Travel Agencies are also implementing AVS + CVV2 verification at the point of sale (terminal) during a face-to-face transaction (or over the phone) to assist with consumer verification Verified By Visa & MasterCard SecureCode solutions have been implemented in Mexico, Europe and South America as a standalone service which is performed BEFORE the payment authorisation request -- This allows merchant to validate the enrolment status of the Issuer and Cardholder before the transaction is performed so a risk profile can be obtained for chargeback liability shift rights
35 FAC s Payment Platform Key Features Multi-jurisdictional, multi-currency settlement via a single interface Direct merchant accounts Call Centre web applications Virtual Terminal (back office support) Mail Order/Telephone Order (MO/TO) Batch Processing Recurring Payments Tokenization Secure web-based transaction reporting Hosted Payment Page Web-based chargeback reports 24 x 7 telephone, web and emergency technical support 3-D Secure - certified MPI (EU, CEMEA, LACR) CVV2/CVC2/CID and AVS checks PCI Compliant Gateway since 2005 Alternative payments Fraud prevention solutions
36 Lastly DON T LET FRAUD BE JUST ANOTHER COST OF DOING BUSINESS!
37 Thank You Chris Burns First Atlantic Commerce Ltd Tel: +(441)
Online Payment Processing What You Need to Know. PayPal Business Guide
Online Payment Processing What You Need to Know PayPal Business Guide PayPal Business Guide Online Payment Processing 2006 PayPal, Inc. All rights reserved. PayPal, Payflow, and the PayPal logo are registered
More informationBinBase.com REPORT: credit card fraud
BinBase.com REPORT: credit card fraud Whether you are a security specialist, an e-commerce web developer, or an online merchant, a knowledge of how credit card fraud works and what you can do to prevent
More informationFAC Corporate Overview Driving Payment Innovation
FAC Corporate Overview Driving Payment Innovation First Atlantic Commerce (FAC) is a leading international online payment solutions provider First Atlantic Commerce First Atlantic Commerce (FAC) is a leading
More informationGuide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
More informationBOOST SALES, BEAT FRAUD
BOOST SALES, BEAT FRAUD How Effective Fraud Management Can Increase Sales and Decrease Fraud Losses INTROS Don Bush Marketing Director, Kount Inc. Don works with online merchants, industry analysts, payment
More informationA CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud
A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts
More informationFighting Online Fraud
White Paper Fighting Online Fraud Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant
More informationYour Gateway to Online Success
The NETBANX gateway is a leading, proprietary online payment processing platform operating on a world class technology infrastructure. Trusted by global brands and companies around the world, the NETBANX
More informationMerchant Business Solutions. Protecting business against credit card fraud.
Merchant Business Solutions. Protecting business against credit card fraud. Version 4.0 May 2011 Contents Protect your business 3 Authorisation 4 Chargebacks 5 Verification of Purchaser 6 Types of goods
More informationHow To Stop A Cybercriminal From Stealing A Credit Card Data From A Business Network
2012 Payment Card Threat Report The second annual study of unencrypted payment card storage Automated Attacks and Card Data Handling In 2011, data breaches increased 42% and as such, last year was reported
More informationThe need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal
The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin
More informationUnderstanding and Combating Online Fraud in 2014
Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.
More informationWhite paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
More informationFraud Mitigation and Identity Verification for Card Not Present Transactions Overview
Fraud Mitigation and Identity Verification for Card Not Present Transactions Overview Credit card fraud costs businesses over $11 Billion dollars annually. The percentage of revenue lost to fraud is rising;
More informationFraud Minimisation Guide ANZ Merchant Business Solutions
Fraud Minimisation Guide ANZ Merchant Business Solutions INTRODUCTION Fraud can occur in and is a risk for any business that accepts credit cards and it can have a significant financial impact on your
More informationA multi-layered approach to payment card security.
A multi-layered approach to payment card security. CARD-NOT-PRESENT 1 A recent research study revealed that Visa cards are the most widely used payment method at Canadian websites, on the phone, or through
More informationYOUR GUIDE TO SAFER, SMARTER CREDIT CARD PAYMENTS. What you need to know about chargebacks and fraud on mail, telephone, IVR and Internet orders
YOUR GUIDE TO SAFER, SMARTER CREDIT CARD PAYMENTS What you need to know about chargebacks and fraud on mail, telephone, IVR and Internet orders Contents HELPING YOU PROTECT YOUR BUSINESS AND YOUR PROFITS
More informationProcessing credit card payments over the internet. The business of getting paid.
Processing credit card payments over the internet. The business of getting paid. X Tap into the vast potential of the Internet today with WIPS Plus. The internet is a huge opportunity for businesses large
More informationHow To Protect Your Cardholder Data From Fraud
Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases
More informationMerchant Guide to the Visa Address Verification Service
Merchant Guide to the Visa Address Verification Service Merchant Guide to the Visa Address Verification Service TABLE OF CONTENTS Table of Contents Merchant Guide to the Visa Address Verification Service
More informationPhishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
More informationThe Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
More informationPayLeap Guide. One Stop
PayLeap Guide One Stop PayLeap does it all. Take payments in person? Check. Payments over the phone or by mail? Check. Payments from mobile devices? Of course. Online payments? No problem. In addition
More informationWhy Data Security is Critical to Your Brand
Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait
More informationMalware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
More informationPCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
More informationDrive your fraud rates down
Drive your fraud rates down Drive your fraud rates down To a greater or lesser extent, fraud concerns almost everyone involved in e-business. With margins tight and competition fierce, the prospect of
More informationGlobal Visa Card-Not-Present Merchant Guide to Greater Fraud Control. Protect Your Business and Your Customers with Visa s Layers of Security
Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases
More informationBWA Merchant Services. Credit Card Fraud Protection User Guide
1 BWA Merchant Services Credit Card Fraud Protection User Guide 2 Contents: 1. How to reduce the risk of card present fraud... 3 2. How to reduce the risk of card not present fraud... 5 3. Delivering the
More informationDeception scams drive increase in financial fraud
ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud
More informationSecurity Best Practices
White Paper Security Best Practices Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant
More informationVisa Merchant Best Practice Guide for Cardholder Not Present Transactions
Visa Merchant Best Practice Guide for Cardholder Not Present Transactions Table of Contents Section 1 About This Guide 03 Section 2 Merchant Procedures 05 Section 3 Authorisation 07 Authorisation Procedures
More informationOnline Cash Manager Security Guide
Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0
More informationThe Online Payment Process
Bank of Valletta Insert Title of Presentation The Online Payment Process Ray Bezzina Agenda Is there the need for me to go online? What do I stand to gain if I go online? What do I stand to lose if I do
More informationProtecting your business from some of the current fraud threats
Protecting your business from some of the current fraud threats This literature provides guidance on fraud prevention and is provided for information purposes only. Where noted the guidance provided has
More informationBest Practices for Internet Merchants
Best Practices for Internet Merchants The following best practices, taken from various experts, are offered to help you avoid being victimized by Internet fraud. Experience suggests that there are certain
More informationCard Not Present Fraud Webinar Transcript
Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share
More informationVolume PLANETAUTHORIZE PAYMENT GATEWAY. vtiger CRM Payment Module. User Guide
Volume 2 PLANETAUTHORIZE PAYMENT GATEWAY vtiger CRM Payment Module User Guide S A L E M A N A G E R M E R C H A N T S E R V I C E S User Guide and Installation Procedures Information in this document,
More informationCYBERCRIME AND THE HEALTHCARE INDUSTRY
CYBERCRIME AND THE HEALTHCARE INDUSTRY Access to data and information is fast becoming a target of scrutiny and risk. Healthcare professionals are in a tight spot. As administrative technologies like electronic
More informationRealex Payments Integration Guide - Ecommerce Remote Integration. Version: v1.1
Realex Payments Integration Guide - Ecommerce Remote Integration Version: v1.1 Document Information Document Name: Realex Payments Integration Guide Ecommerce Remote Integration Document Version: 1.1 Release
More informationCredit Card Acceptance & Chargeback Prevention
Credit Card Acceptance & Chargeback Prevention Tips for Travel Agents July 2010 About this Guidebook... 3 Credit Card Acceptance... 4 Fraud Prevention Tips... 7 Credit Card Chargebacks Tips...11 Payment
More informationRemote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
More informationCool Tech Club E-commerce Fraud and Fraud Mitigation. Steve Manning August 25, 2004
Cool Tech Club E-commerce Fraud and Fraud Mitigation Steve Manning August 25, 2004 1 Overview Fundamentals of online transactions Trends in online fraud How fraud happens Protection Against Fraud 2 How
More informationRSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
More informationFraud Prevention What Every Merchant Should Know About Internet Fraud. PayPal Business Guide
Fraud Prevention What Every Merchant Should Know About Internet Fraud PayPal Business Guide PayPal Business Guide Fraud Prevention 2006 PayPal, Inc. All rights reserved. PayPal, Payflow, and the PayPal
More informationWHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks
WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?
More informationPowering e-commerce Globally. What Can I Do to Minimize E-Commerce Chargebacks?
Powering e-commerce Globally What Can I Do to Minimize E-Commerce Chargebacks? Chargebacks are not going away. And now there are new rules. Selling products and services online and using credit cards for
More informationBusiness Identity Fraud Prevention Checklist
Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business
More informationHow To Spot & Prevent Fraudulent Credit Card Activity
Datalink Bankcard Services How To Spot & Prevent Fraudulent Credit Card Activity White Paper 2013 According to statistics from the U.S. Department of Justice and the Consumer Sentinel Network, credit card
More informationAgent Registration. Program Guide. (For use in Asia Pacific, Central Europe, Middle East, Africa)
Agent Registration Program Guide (For use in Asia Pacific, Central Europe, Middle East, Africa) Version 1 April 2014 Contents 1 INTRODUCTION... 3 1.1 ABOUT THIS GUIDE... 3 1.2 WHO NEEDS TO BE REGISTERED?...
More informationFRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper
FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper In the UK, Europe s largest online market, consumers continue to embrace m-commerce at an astonishing speed with an estimated
More informationNAB ecommerce Merchant Solutions. Getting Started Guide and Application Form
NAB ecommerce Merchant Solutions Getting Started Guide and Application Form Updated June 2012 Welcome to NAB ecommerce The following guide will help you navigate through the establishment of your NAB ecommerce
More informationCYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015
12/16/2015 CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE December 17, 2015 Angela R. Morelock, CPA, CFE, CFF, ABV Partner, BKD, LLP amorelock@bkd.com Jeff Eiserman
More informationWe believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating
Given recent payment data breaches, clients are increasingly demanding robust security and fraud solutions; and Financial institutions continue to outsource and leverage technology providers given their
More informationPayPoint.net Gateway Guide to Identifying Fraud Risks
PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to
More informationHow to Identify Phishing E-Mails
How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services (miguel@falconitservices.com) http://www.falconitservices.com
More informationIdentity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office
Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention
More informationFREQUENTLY ASKED QUESTIONS - CHARGEBACKS
FREQUENTLY ASKED QUESTIONS - CHARGEBACKS # Questions Answer 1 What is a Chargeback? A Chargeback is the term used by Banks for debiting a merchant s bank account due to successful return of a transaction
More informationCyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
More informationOXY GEN GROUP. pay. payment solutions
OXY GEN GROUP pay payment solutions hello. As UK CEO, I m delighted to welcome you to Oxygen8. We ve been at the forefront of multi-channel solutions since 2000. Headquartered in Birmingham, UK, we have
More informationWith the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
More informationCREDIT CARD FRAUD PREVENTION IN NONPROFITS
CREDIT CARD FRAUD PREVENTION IN NONPROFITS TABLE OF CONTENTS 01 01 01 02 02 03 03 04 05 05 FRAUDULENT CREDIT CARD TRANSACTIONS AND IN WHAT WAYS CHARITIES ARE AT RISK CARD TUMBLING ONLINE AUCTION FRAUD
More informationBad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
More informationKaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing
Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted
More information2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
More informationEMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information
More informationPCI Compliance Overview
PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)
More informationAn Oracle White Paper July 2010 U.S. CARD FRAUD
An Oracle White Paper July 2010 U.S. CARD FRAUD Contents Card fraud can be placed into six categories:... 3 2 Card fraud costs the U.S. card payments industry an estimated US$8.6 billion per year. Although
More informationMcAfee S DO s AnD DOn ts Of Online Shopping
McAfee s Do s and don ts OF Online Shopping Table of Contents Foreword by Parry Aftab, 3 Online Safety Expert Online Shopping: The Real Deal 4 The DO s and DON Ts 5 Summary 17 Resources 18 Happy Online
More informationDon t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
More informationOnline security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.
Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity
More informationUnified Payment Platform Payment Pos Server Fraud Detection Server Reconciliation Server Autobill Server e-point Server Mobile Payment Server
Unified Payment Platform Payment Pos Server Detection Server Reconciliation Server Autobill Server e-point Server Mobile Payment Server Securing Payment & Beyond Infinitium E-Payment is a Unified Payment
More informationMarket Intelligence Cell. Fighting Financial Crime
Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach
More informationA Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business
A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business Nucharee Premchaiswadi*, James G. Williams** and Wichian Premchaiswadi*** *Faculty of Information Technology Dhurakij
More informationVisa Debit processing. For ecommerce and telephone order merchants
Visa Debit processing For ecommerce and telephone order merchants Table of contents About this guide 3 General procedures 3 Authorization best practices 3 Status check transactions 4 Authorization reversals
More informationBE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
More informationPayment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.
Payment Methods The cost of doing business Michelle Powell - BASYS Processing, Inc. You ve got to spend money, to make money Major Industry Topics Industry Process Flow PCI DSS Compliance Risks of Non-Compliance
More informationThe Comprehensive, Yet Concise Guide to Credit Card Processing
The Comprehensive, Yet Concise Guide to Credit Card Processing Written by David Rodwell CreditCardProcessing.net Terms of Use This ebook was created to provide educational information regarding payment
More informationThe State of Spam A Monthly Report August 2008. Generated by Symantec Messaging and Web Security
The State of Spam A Monthly Report August 2008 Generated by Symantec Messaging and Web Security Doug Bowers Executive Editor Antispam Engineering Dermot Harnett Editor Antispam Engineering Joseph Long
More informationPhishing Past, Present and Future
White Paper Phishing Past, Present and Future By Theodore Green, President, SpamStopsHere.com Abstract A particularly dangerous and now common type of spam known as "Phishing attempts to trick recipients
More informationOVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft
OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3
More informationFrequently Asked Questions
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
More informationWHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
More informationEMV's Role in reducing Payment Risks: a Multi-Layered Approach
EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP
More informationSmall businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
More informationProtect yourself online
Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice
More informationRealex Payments Resource Document. Version: v1.1
Realex Payments Resource Document Version: v1.1 Document Information Document Name: Realex Payments Resource Document Document Version: 1.0 Release Date: 30 August 2010 Legal Statement This guide, in addition
More informationAgent Registration. Program Guidelines. (For use in Asia Pacific, Central Europe, Middle East and Africa)
(For use in Asia Pacific, Central Europe, Middle East and Africa) January 2012 Contents 1 INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 PURPOSE OF DOCUMENT... 4 1.3 WHO NEEDS TO BE REGISTERED?... 5 1.4 WHY
More informationIS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper
IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper A data breach has the potential to cost retailers millions in lost customers and sales. In this paper we discuss a number of possible
More informationCredit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist
Credit/Debit Card Processing Requirements and Best Practices Adele Honeyman Oregon State Treasury Training Specialist 1 What? What do I need to know about excepting credit cards? Who s involved, how it
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationProtect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
More informationSecurity in connection with card payments. Non-face-to-face transactions (e-commerce/mail and telephone order)
Security in connection with card payments Non-face-to-face transactions (e-commerce/mail and telephone order) Most people are honest luckily Every year, millions of transactions are carried out with payment
More informationOnline Payment Processing Definitions From Credit Research Foundation (http://www.crfonline.org/)
Online Payment Processing Definitions From Credit Research Foundation (http://www.crfonline.org/) The following glossary represents definitions for commonly-used terms in online payment processing. Address
More informationFive Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
More informationCard Acceptance Best Practices Playing it Safe at the Point of Sale
White Paper Card Acceptance Best Practices Playing it Safe at the Point of Sale Fraudulent activity costs U.S. businesses billions. And that is just lost revenue. When you consider the associated damage
More informationIdentity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
More informationProtecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
More informationACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments
A TO Z JARGON BUSTER A ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments ATM Automated Teller Machine. Unattended,
More informationHow To Help Protect Yourself From Identity Theft
How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank
More information