How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.

Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually.

So, it is very important to verify the cardholder's identity.

You can use software programs to detect fraudulent orders or you can manually check each transaction for possible fraud.

Here are some steps that you can take as a merchant to reduce credit card fraud:

1) Check the buyers IP Address Location. Does this location match the cardholder's location?

2) Check the buyers e-mail domain. Criminals will use a free e-mail provider.

3) IP Address indicating anonymous or open proxies?

4) Check the bank identification number.

5) Call the credit card holder. You can ask the cardholder to verify the order.

6) Fax authorization with signature. You can ask the cardholder to verify the order by sending a signed fax.

7) Make your anti-fraud policy visible.

8) Utilize anti-fraud services.

Furthermore, you should be alert for transactions with one or more of these characteristics:

1) A first-time customer places the order.

2) Unusual or large orders.

3) Customer is asking for rush delivery.

4) Orders placed using free e-mail services.

5) Transactions made using similar credit card account numbers.

More info about credit card fraud:

www.scambusters.org/
www.merchant911.org/
www.maxmind.com/
www.merchantfraudsquad.com/
www.merchantsense.com/
www.cardcops.com/

Nothing is 100% effective, but the above will at least assist in decreasing the amount of credit card fraud you experience online.

John Iacovakis is an Internet consultant and has over 10 years of marketing experience. He is the owner of CreativeNet Online Advertising and Website Traffic

In The News:


pen paper and inkwell


cat break through


A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

The Top Twelve Threats No Computer User Should Ignore

The internet is undoubtedly a fantastic resource for families and... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Secrets On Security: A Gentle Introduction To Cryptography

Let us take the example of scrambling an egg. First,... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Phishing - Identity Theft & Credit Card Fraud

What is Phishing? Phishing is a relatively newly coined term... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Viruses and Worms: The Problems and Their Solutions

History and BackgroundThe virus was one of the first ever... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

The 5 Critical Steps to Protecting Your Computer on the Internet

Spyware, viruses and worms... oh my!If you are connected to... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Are They Watching You Online?

When surfing the Internet you probably take your anonymity for... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Dont Miss Information Because of Misinformation

It has been said that with the wealth of information,... Read More

Virus and Adware - Fix them Both!

We all get the odd virus now and then, but... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More