Skip to main content

Accept your mission: Credit card fraud protection



You may be cool, but you’re not James Bond cool. And that’s okay, because odds are, if you’re reading this article, you’re not an international spy with a cache of high-tech secret weapons either. But that doesn’t mean you don’t have a huge responsibility to protect your customers and your business against a multi-billion dollar, international cybertheft industry. You do.

You’re probably thinking, “…who me? Little old me, with my small local business? Surely I can’t be held responsible for the $36,000 per minute fraud industry.” But unfortunately, you are responsible for fraud and data security at your business if you accept credit cards. It's in the fine print of your merchant agreement, regardless of which payment processor you use.

Credit card fraud protection is a big responsibility. But with some knowledge and the right support from your payment processor, you can become part of the defense team instead of an unwitting accomplice. Read on to learn more about the risks and consequences of fraud and data theft and how to put a stop to it.

The risks of a data compromise
Fraud is generally the result of data theft. It all starts when a thief steals the sensitive data and cardholder information from a payment card. Sometimes, this happens by stealing the actual card itself. But more often, it happens by stealing the sensitive data when it’s exposed during or after a payment transaction. This is known as a data compromise.

There are several ways to steal card data and thieves are constantly working to improve their craft, so their methods change with high frequency. But in general, thieves hack into or install malware on a vulnerable payment system and create a secret virtual doorway where they can extract the data being pushed through the system during transactions. The length of time that doorway is left open and the volume of cards the business is processing determines how many records are stolen. The longer it takes the merchant to realize they have been compromised, the more damage occurs. The now infamous Target data breach of 2013, for example, took place over the course of 17 days and resulted in about 110 million compromised cards.

Other popular methods of stealing data include installing skimmers at ATMs or gas stations so that when a payment card is swiped, the data is collected and copied to a hacker’s database or data repository.Additionally, some older payment solutions store sensitive data in the system to be used for future transactions like tip adjustment or recurring transactions. That data is vulnerable to theft as well, and could be stolen long after the transaction was made.

Once the hacker has the data, it is either sold raw on the black market to other fraudsters, or used by organized crime rings to operate large scale fraud operations to create counterfeit cards, steal merchandise, and/or create fake identities. Regardless of who ends up with the data, the end result is usually fraud.

Fraud is the theft of actual goods and services as opposed to data. But like data theft, fraud takes many different forms, is constantly evolving, and is often highly organized and funded by large crime rings.

The consequences of data theft
The consequences of data theft are many, starting with public embarrassment and loss of consumer trust, and oftentimes ending with the closure of the business. In fact, research suggests that 60 percent of small businesses close within six months of a data breach, in part because 69 percent of consumers are hesitant to do business with a breached organization. With the other part owing to the devastating fines, fees, and penalties involved in a data breach.

While a small business won’t suffer the same magnitude of financial loss as a major retailer like Target, with their $39 million settlement, they don’t usually have the sheer volume and market penetration needed to overcome such a loss either.

The cost of a data breach largely depends on the industry, the cause of the breach, and the number of records stolen. The longer it takes to detect a breach, the greater the cost. The 2016 Ponemon Institute Data Breach Study found that a breach costs an average of $158 per stolen record, and more specifically, $172 per record for the retail industry. If you consider how many transactions you ran during the same time period that Target was compromised, 17 days during the biggest shopping season of the year, you might start to get an idea of how deeply a breach could affect you. But don’t forget to take into account that Target has massive IT infrastructure and detected the breach themselves—a scenario unlikely for most small businesses that tend to experience breaches that go undetected for significantly longer periods.

Fraud also has a major financial impact on small businesses. Up until October 2015, card issuers had liability for fraudulent transactions. But since then, a new card processing technology was adopted in the U.S. called EMV (Europay, MasterCard, Visa) and the card brand networks shifted liability from issuers to merchants for in-store fraud involving a chip card. Today, if a merchant doesn’t process a credit or debit card that has a data chip using an EMV-enabled terminal, and the transaction ends up being fraudulent, the merchant pays in the form of lost goods and/or services, plus the chargeback and related fees. And since the majority of cardholders now have at least one chip card in their wallets, merchants processing these cards without EMV terminals have a high likelihood of seeing a sharp increase in chargebacks.

The potential fraud losses of a business without EMV technology depends on the volume of business they transact and the average ticket price of their merchandise or services. The LexisNexis 2016 fraud report found that every dollar of fraud costs U.S. merchants $2.40, and that fraudulent transactions happen up to 206 times per month on average.

The payment fraud solutions
Now that we’ve discussed the various fraud and security threats to small businesses and their possible consequences, we can get back to the discussion of how to outfit your business with security tools that would put a smile on James Bond’s face.

Fighting fraud and data security threats requires a four-part strategy: maintaining compliance with PCI data security standards to help prevent a data breach; protecting sensitive data with encryption and tokenization technology while processing transactions; processing chip cards with EMV-enabled terminals; and investing in a breach protection solution to help cover the costs if a breach does occur.

But the part that will put a smile on your face is that Vantiv takes care of all of that for our merchants. We put all of those tools and technologies into one affordable service so that you don’t have to moonlight as a secret agent in order to avoid the pain and aggravation of fraud and data compromise.

Not a Vantiv merchant? Ask your payment provider about their security offerings to see if they stack up. Or, contact us for more information about how we can help your business get and stay secure.

#Creditcard #creditcardfees #creditcardwasted #creditcardprobs #creditcardpoints #creditcardknife #creditcardsaccepted #creditcardbidding #creditcardtips #creditcardcompany #creditcardrewards #creditcardperks #creditcard #creditcardwallet #creditcardsprocessing #creditcardpromotion #creditcardfraud #creditcardoffers #creditcardprocessing #creditcardcompanies #creditcardproblems #creditcarddebtfree #creditcardteam #creditcardissues #creditcarddoodle #creditcardstatement #creditcardoffer #creditcardsales #creditcards #creditcardacceptance

Comments

Popular posts from this blog

12 Startups Utilizing Blockchain Technology in New Ways

Author: Awepay Cryptocurrency created quite the buzz this past year. Although the technology has been around for a few years, 2017 was the year it really took off. Bitcoin, the first application of cryptocurrency technology, hit $20,000 a coin, while coins like Ethereum also saw their prices increase. However, the technology behind these tokens, blockchain, has far more applications than just cryptocurrencies. Through a network of smart contracts that operate utilizing decentralized information on a ledger, blockchain is able to provide unmatched security and speed for data transfers. This means that blockchain technology has an application in nearly every industry where value is exchanged. For this reason, many startups have started to explore how this technology can change the way the world works. Here are twelve of those startups, each of which are utilizing blockchain technology in new ways. Related: 10 Reasons Why Good Customer Service Is Your Most Important Metric

4 Trending Digital Payment Methods: Is Your Business Ready For Them?

Businesses and consumers alike are interested in faster, safer, and more convenient payment methods. Are you ready to go digital?   Demographics across the world are shifting. Millennials are now the most diverse and prominent generation in the US population.   As a generation heavily influenced by technology, their buying habits and expectations are all formed via the immediacy that smartphones, Internet, and modern conveniences engender.   Businesses and consumers alike are interested in faster, safer, and more convenient payment methods, as cash is becoming obsolete and credit cards are being phased out. Mobile and social payment options could be the future of millennial-driven purchasing, creating the sort of instant gratification that millennials expect.   Here are a few trending digital payment methods that Millennials will prefer to use in the coming year.     1. Mobile In-Store Payments & Apps The development and usag

EMV transactions: Is it time for you to upgrade?

Even if your business has not yet adopted an EMV-enabled solution, you’re probably somewhat familiar with the technology since it's among the most talked about developments in payments. EMV has proven to be an effective tool to fight card present payment fraud in Canada and many European countries. While EMV is new to the U.S., payment card fraud is not, with nearly $8.5 billion in fraudulent transactions in the U.S. in 2015 alone. What’s more, the U.S. represents nearly 40 percent of worldwide fraud, despite having less than 25 percent of transaction sales volume. EMV defined So what is EMV? EMV technology is based on specifications developed to ensure worldwide acceptance of secure payments by an organization called EMVCo, a group of leading companies in the payments industry including American Express, Discover, JCB, MasterCard, UnionPay, and Visa and supported by dozens of other companies in the industry. EMV has become the global standard for authenticating credit