Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.
Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually.
So, it is very important to verify the cardholder's identity.
You can use software programs to detect fraudulent orders or you can manually check each transaction for possible fraud.
Here are some steps that you can take as a merchant to reduce credit card fraud:
1) Check the buyers IP Address Location. Does this location match the cardholder's location?
2) Check the buyers e-mail domain. Criminals will use a free e-mail provider.
3) IP Address indicating anonymous or open proxies?
4) Check the bank identification number.
5) Call the credit card holder. You can ask the cardholder to verify the order.
6) Fax authorization with signature. You can ask the cardholder to verify the order by sending a signed fax.
7) Make your anti-fraud policy visible.
8) Utilize anti-fraud services.
Furthermore, you should be alert for transactions with one or more of these characteristics:
1) A first-time customer places the order.
2) Unusual or large orders.
3) Customer is asking for rush delivery.
4) Orders placed using free e-mail services.
5) Transactions made using similar credit card account numbers.
More info about credit card fraud:
www.scambusters.org/
www.merchant911.org/
www.maxmind.com/
www.merchantfraudsquad.com/
www.merchantsense.com/
www.cardcops.com/
Nothing is 100% effective, but the above will at least assist in decreasing the amount of credit card fraud you experience online.
John Iacovakis is an Internet consultant and has over 10 years of marketing experience. He is the owner of CreativeNet Online Advertising and Website Traffic
![]() |
|
![]() |
|
![]() |
|
![]() |
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
There are several basic concepts to keep in mind when... Read More
Many of us have run into an annoying and time-consuming... Read More
Let us take the example of scrambling an egg. First,... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Have been an Internet user for more than 9 years,... Read More
Today,on most internet user's computers, we have the ability to... Read More
There are ways to insure security though. You can get... Read More
Computer infections can be broken up into 4 main categories... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
If you have used a Windows machine for a while,... Read More
Recently I have received email from my bank/credit Card Company,... Read More
If you are a parent, you have probably wondered at... Read More
During the release of a new software product specialized to... Read More
History and BackgroundThe virus was one of the first ever... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Have you ever got an email asking you to confirm... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
If you use emails actively in your communication, you must... Read More
When surfing the Internet you probably take your anonymity for... Read More
This is the second in a series of articles highlighting... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
It has been said that with the wealth of information,... Read More
We all get the odd virus now and then, but... Read More
Identity theft is one of the most common criminal acts... Read More
If you have used a Windows machine for a while,... Read More
A week or so ago, I received an inquiry from... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
Watching how the traditional media covers the latest virus or... Read More
As the number of people using the Internet as an... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Imagine this ? you open up your email box and... Read More
What is computer security? Computer security is the process of... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Someone recently told me, "You would have to be a... Read More
So called phishers try to catch the information about the... Read More
At this point, if you've got the whole "turning the... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
The Message Must Get Through The year is 300A.D.,... Read More
First, let's do a little recap'. As I stated in... Read More
Since its birth, the Internet has grown and expanded to... Read More
If you are a parent, as am I, I think... Read More
With the advent of the World Wide Web, a whole... Read More
Have you ever got an email asking you to confirm... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Have been an Internet user for more than 9 years,... Read More
These six ways to prevent identity theft offer you valuable... Read More
Every single time you access a website, you leave tracks.... Read More
Every day millions of people go online to find information,... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
The words Corporate Security may conjure up images of a... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Some months ago, before there was much publicity regarding phishing... Read More
There is no doubt that "how-to articles" have become a... Read More
When it comes to a secure website and passwords it... Read More
A few nights ago I received an email from "2CO"... Read More
Internet Security |