How to Minimize Fraud this Holiday Season

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next How to Minimize Fraud this Holiday Season-6 Next

Stay Ahead of Trends

Stay ahead of evolving market conditions.

Some things are out of retailers' control, such as the impending rollout of EMV in the U.S. in October 2015. While most point-of-sale transactions will be safer and more secure as a result, there may well be a rise of card-not-present fraud, as was the case when Europe switched to EMV. This is because criminals will focus their energies on the fraud they can still perpetrate. Being aware and having a plan to react quickly to the ever-changing fraud landscape can significantly increase the chances of thwarting criminals and keeping businesses safe.

Despite being months away, retailers are already hard at work preparing for the busiest time of the year: the holiday season. The period between Thanksgiving and Christmas can represent up to 20 percent of a retailer's annual sales, and no one wants to miss out. As a result, many merchants temporarily loosen their fraud prevention rules to process more transactions. They compensate for this by conducting more manual reviews of suspect transactions, which unfortunately leads to an increase in customer insult (legitimate customers being falsely identified as fraudsters) and wrongly declined purchases, both of which increase the cost of doing business.

Recent data from fraud prevention experts at Experian highlight the advantage of analyzing millions of transactions per day, evaluating risk in real time, and delivering responses in mere milliseconds – without increasing risk or turning away legitimate customers. With this approach, retailers catch more fraud and reduce customer friction, conduct fewer manual reviews and lower operational costs. The following slides will help you improve your approach to fraud prevention and lower costs involved with fraud and ID theft.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.