How to Minimize Fraud this Holiday Season

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next How to Minimize Fraud this Holiday Season-5 Next

Establish a Customer Experience Team

Establish a dedicated team responsible for the customer experience.

By doing so, teams of risk and consumer experience experts can create and maintain a directional and strategic customer view across channels. Formalizing the sharing of data, processes and best practices among these traditionally siloed departments is a way to process more customers while reviewing fewer transactions, catching more fraud and providing a hassle-free customer experience.

Despite being months away, retailers are already hard at work preparing for the busiest time of the year: the holiday season. The period between Thanksgiving and Christmas can represent up to 20 percent of a retailer's annual sales, and no one wants to miss out. As a result, many merchants temporarily loosen their fraud prevention rules to process more transactions. They compensate for this by conducting more manual reviews of suspect transactions, which unfortunately leads to an increase in customer insult (legitimate customers being falsely identified as fraudsters) and wrongly declined purchases, both of which increase the cost of doing business.

Recent data from fraud prevention experts at Experian highlight the advantage of analyzing millions of transactions per day, evaluating risk in real time, and delivering responses in mere milliseconds – without increasing risk or turning away legitimate customers. With this approach, retailers catch more fraud and reduce customer friction, conduct fewer manual reviews and lower operational costs. The following slides will help you improve your approach to fraud prevention and lower costs involved with fraud and ID theft.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.