Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.
Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually.
So, it is very important to verify the cardholder's identity.
You can use software programs to detect fraudulent orders or you can manually check each transaction for possible fraud.
Here are some steps that you can take as a merchant to reduce credit card fraud:
1) Check the buyers IP Address Location. Does this location match the cardholder's location?
2) Check the buyers e-mail domain. Criminals will use a free e-mail provider.
3) IP Address indicating anonymous or open proxies?
4) Check the bank identification number.
5) Call the credit card holder. You can ask the cardholder to verify the order.
6) Fax authorization with signature. You can ask the cardholder to verify the order by sending a signed fax.
7) Make your anti-fraud policy visible.
8) Utilize anti-fraud services.
Furthermore, you should be alert for transactions with one or more of these characteristics:
1) A first-time customer places the order.
2) Unusual or large orders.
3) Customer is asking for rush delivery.
4) Orders placed using free e-mail services.
5) Transactions made using similar credit card account numbers.
More info about credit card fraud:
www.scambusters.org/
www.merchant911.org/
www.maxmind.com/
www.merchantfraudsquad.com/
www.merchantsense.com/
www.cardcops.com/
Nothing is 100% effective, but the above will at least assist in decreasing the amount of credit card fraud you experience online.
John Iacovakis is an Internet consultant and has over 10 years of marketing experience. He is the owner of CreativeNet Online Advertising and Website Traffic
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Can you protect your computer from all possible viruses and... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
You've seen it in the news - 40 million credit... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Spyware is software that runs on a personal computer without... Read More
They're out there. Individuals trying to make a quick buck... Read More
When it comes to a secure website and passwords it... Read More
When surfing the Internet you probably take your anonymity for... Read More
I am the victim of an internet scam. It is... Read More
The first thing people think about when defending their computers... Read More
Long gone are the days that we could feel secure... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
Since its birth, the Internet has grown and expanded to... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
When it comes to reporting Internet scams most of us... Read More
As soon as almost all computer users already got used... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
To blog or not to blog? Well, why not? Lots... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Ok, ok, I know you've seen them. All those pop... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
There are ways to insure security though. You can get... Read More
Afraid that someone is monitoring your PC or installed a... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Threats we ordinary Web users face online leave us no... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Nobody wants to pay to remove spyware. At the very... Read More
You are at your computer, checking out software on EBay.... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Identity theft is one of the most common criminal acts... Read More
A new variation of the Nigerian Scam theme ... Read More
The top five online scams on the Internet hit nearly... Read More
Pharming is one of the latest online scams and rapidly... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
As soon as almost all computer users already got used... Read More
In today's times spyware is a very serious issue and... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
There has not been a time in the history of... Read More
Credit card fraud is a growing problem for online businesses... Read More
As you know, this time the virus under the name... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Computer infections can be broken up into 4 main categories... Read More
A friend called me one day and asked if I... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
If spyware were a person and he set himself up... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Before we start, I want to make it clear that... Read More
Phishing is a relatively new form of online fraud that... Read More
Phishing is the act of some individual sending an email... Read More
First, let's do a little recap'. As I stated in... Read More
If you use emails actively in your communication, you must... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Internet Security |