Security Information |
|
If You Sell Anything Online Your ePockets Are Being Picked
You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. You and I, my friend, are victims of software piracy that accounted for over $24 BILLION dollars in lost revenue over the last two years*. There are so many ways people can get your product for free these days. If we continue doing nothing we will lose even more money this year as potential customers become more and more aware of just how easy it is to obtain digital products without paying for them. The question is, why do we put up with this? When we sell our downloadable products they are being easily and freely distributed (read: STOLEN) by the very same people that we are trying to get to purchase. And don't be fooled, this still occurs very regularly today even though a lot of us take precautions against it. This confirms that people want our products, they just don't want to pay for them ?because they don't have to. In fact, 70% of potential customers won't if they can get it for free*. We know the ideal scenario; what's supposed to happen. Consider Bob Jones and his knot tying eBook, "Scoutmaster Bob's Guide To Knots". Bob uploads his eBook to his web server and creates a sales link to sell it, and this sales link goes through to his payment processor. After the order is placed the customer is redirected to the download page, or "Thank-You" page, in order to automate the delivery process. Now Bob figures he's all set up and starts his massive promotion efforts. He spends lots of time and money getting people to visit his site and convinces them to place an order because it really is a great product. So, the customers place orders via the sales link then are redirected back to the download page automatically to get what they've paid for. Perfect automated system, right? Sorry Bobby, in a perfect world maybe. But here's what really happens. "Back Door" #1: Our boy Bob sets up a sales link, a download redirection link (where people go after successfully ordering) and spends time and money promoting his site. People come and visit his web site and feel that they could really use such an extensive knot tying resource and want a copy of it. A couple people place orders and Bob is happy. Because Bob has created such a great product they tell their friends about Bob's eBook. But instead of telling their friends to check out Bob's web site they simply email them a copy of the actual eBook. Why not, it doesn't cost Bob any money right? Those people then tell their friends, who tell their friends, who tell their friends. A couple of weeks later Bob's knot tying eBook is in the hands of hundreds, even thousands of people?for free. And this is just the first "back door". There are three (3) "Back Doors" that people use regularly to easily obtain free access to your product:
And here's another scary fact: For every 10 copies downloaded, 4 of those are stolen*. How lightly would you take it if you sold a tangible product, like a t-shirt, and only 6 out of ten t-shirts that left the store were paid for? These are lost sales and income forgone, there's no more blunt way to put it. If you can guarantee that the only way they can get your product is through your payment process you've just stopped that leak and increased your profits. But right now online merchants have no idea who is really downloading their products, or what happens after the downloaded. They lose total control of its distribution. Some thieves/weasels/snakes ?whatever you want to call them? even go so far as to sell stolen software and eBooks as their own for a greatly reduced price. This is probably the greatest risk to selling a digital product, and if you ask anyone that's been doing it for a while they will have experienced this nightmare first hand. The people out there that do this are much worse than one guy that just gets your product for free. These people distribute hundreds or thousands of your product and you don't see a cent of it. They saturate the market and decrease the value of your product, until it's virtually worthless. They have to be stopped. "Back Door" #2: Back to Bob. There is another big problem for Bob when it comes to protecting his eBook. He doesn't know that many payment processors promptly, and without hesitation, honor each and every refund request, no questions asked. Seriously?no questions at all, one simple email is all it takes. There's usually no need for the customer to explain anything, just that they would like a refund. They will get their refund right away and the you, the merchant, don't have a say in the matter at all. And you guessed it, they get to keep the product, for free. There is no requirement to return the product like with a traditional refund, since there's no way to be sure the product was really deleted. Imagine the absolute uproar brick-and-mortar merchants would be in if customers were allowed 100% unconditional refunds on request, and the customer gets to keep the shirt, vacuum cleaner, DVD player, or whatever? Ridiculous right? But it happens to online merchants like Bob every day. "Back Door" #3: Lastly, Bob's uploaded product is also easily and regularly downloaded for free by potential customers right from his own web site. People can get to his download page in any number of ways. For example, open up Google. Type this into the search box: "thankyou.htm ebook download". Now go to the second and third pages. Here are some free products for you if you were the type to download copyrighted material without paying for it. Of course I'm not suggesting you do that, in fact I ask you NOT to download these products, just look at the thank you page to see that the "back door" is certainly easy to find. These people are just like Bob, and they work hard to create their web sites and their products. They are simply unaware of the kick-in-the-teeth they're taking by not protecting it. Some conscientious merchants claim, "I'm safe, I protect my download location with a third-party tool that creates my download location on the fly." This is a false sense of security and it only blocks one back door. Basically this protection method simply hides the download location, but the product is still just as susceptible to being freely distributed after the download. And it can still be kept if a refund is issued. This is equivalent to the banks simply hiding all the money instead of putting it in the bank vault. So how are online merchants like Bob, and you, and me supposed to stay afloat? As it is now, the only way to turn a profit is to rely on people's goodwill in hopes that they will do the right thing. And be content in the fact that some people don't know how easy it is to get online products for free, so these people actually pay for the product. So, if you think about it, within this system it's pure luck that anyone actually pays for a digital product. But there is hope. There is a real way to stop all types of thieves and freebie-seekers. We must protect the product itself with unique identifiers and access codes for each customer. And until more of us become wise to this one simple truth rampant software and eBook piracy will continue to plague online merchants. * - average 40% worldwide software piracy rate for 2001 & 2002, and dollar losses totaling $24.05 billion, based on intensive studies by the Business Software Alliance http://www.bsa.org, and the report - "Quantifying Online Downloading of Unlicensed Software : Survey of Internet Users for BSA - May 29, 2002" About The Author Shawn Pringle is the owner and founder of the Virtual Vault digital product security system. Read his story and how he fought back at http://www.CBProtect.com Email him at shawnpringle@cbprotect.com
MORE RESOURCES: Opinion | Banning TikTok Won’t Solve Your Data-Security Problem The Wall Street Journal He’s a Security Guard at the Met. Now His Work Is Showing There. The New York Times Why does Trump want Greenland and the Panama Canal so badly? One reason may surprise you - USA TODAY Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data ABC News Remarks at a UN Security Council Briefing on Nonproliferation and the Democratic People’s Republic of Korea United States Mission to the United Nations Sweet Security Partners with Illustria to Offer Proactive Open-Source Supply Chain Risk Management GlobeNewswire Krebs on Security – In-depth security news and investigation Krebs on Security One week later: New Orleans debates security, memorial grows, more chemicals found FOX 8 Local First New in 2025: Counties Should Prepare Now for the Upcoming HIPAA Security Rule Update National Association of Counties Special ops forces seek to manage digital footprints, achieve ‘security through obscurity’ DefenseScoop Pope to celebrate Jubilees for Communications, security forces Vatican News - English White House program to certify the security of IoT devices goes live Cybersecurity Dive U.S. citizen denied entry into Poland after security staff object to handwritten notes in passport ABC News Remarks at a UN Security Council Briefing on the Political and Humanitarian Situations in Syria United States Mission to the United Nations Stowaways on planes and inside landing gear raise worries about aviation security The Associated Press Brillion Achieves SOC 2 Type 2 Compliance, Reinforcing Commitment to Data Security and Privacy Business Wire Opinion | Biden’s ‘security’ concern about TikTok and U.S. Steel is doubly specious The Washington Post New Orleans Homeland Security criticized during terror attack probe WDSU New Orleans Border security is national security Foundation for Defense of Democracies The Rio Treaty's Security Pact and Unintended Consequences of Threatening Canada, Greenland, and Panama Just Security Tidal Cyber Acquires Zero-Shot Security to Enhance Threat Intelligence Mapping Capabilities Business Wire Swimlane Hero helps solve complex security operations problems Help Net Security Security guard catches DJ molesting 12-year-old boy at California mall, officials say Sacramento Bee Who is Acronis’ New Chief Information Security Officer? Cyber Magazine UN aviation agency confirms recruitment database security breach BleepingComputer Fort Smith Public Schools to integrate AI gun detection software in security cameras Northwest Arkansas Democrat-Gazette Orange Bowl pep rally security includes surveillance cams, law enforcement on the ground - CBS Miami Update on former Vigo County Security Annex demolition MyWabashValley.com Security Industry Association Welcomes New Perimeter Security Subcommittee Leaders Security Sales & Integration BreachLock Unveils Unified Security Testing Platform for PTaaS, ASM, Continuous Pentesting, and Red Teaming PR Newswire Alois Brunner, the Nazi ‘butcher’ who trained Syrian security Al Jazeera English Marine Corps bases take increased security posture The Island News – Beaufort, SC When It Comes to Security, Europe Is Whistling Past the Graveyard World Politics Review Synology Launches ActiveProtect: Simplifying Enterprise Data Protection with Unmatched Security, and Scalability Business Wire Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data The Associated Press Security consultant denied profiteering in defamation case against CNN WMBB - mypanhandle.com Security and Sanctions in Post-Assad Syria The National Interest Online Eric Trager tapped for Mideast slot on Trump’s National Security Council The Times of Israel 2025 Security Industry Predictions: Jon Adams, Vice President of Sales, DMP Security Sales & Integration Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Washington Township Police to launch security risk assessment program for businesses Bellefontaine Examiner New Orleans hires consultant to review security after Bourbon Street attack. See who has the job. NOLA.com New Orleans attack prompts tighter security in D.C. ahead of inauguration, Carter funeral The Chicago Cusader Newark Airport makes list of Top 10 craziest security catches New Jersey 101.5 FM Base steps up security measures following terrorist attacks Mountain Home News |
RELATED ARTICLES
Is the Internet Insecure Because of You? Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Reclaim Your PC from the Internet Spies Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. 40 Million People Hacked - YOU as Identity Theft Victim Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information. Spy Scanners - Don't Compromise your Privacy Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Internet Shopping - How Safe Is It? Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. How to Know Whether an Email is a Fake or Not A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. Dont Get Hacked - A Guide to Protecting Your Business from Thieves You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. Firewall Protection - Does Your Firewall Do This? The first thing people think about when defending their computers and networks is an up-to-date antivirus program. Without this most basic protection, your computer will get a virus, which could just slow it down or potentially bring the pc to a complete standstill!So anti-virus software is the answer?An anti-virus solution on it's own is not the answer to all of your problems, it can only protect you so much; in fact test have shown that a new pc running Windows XP if left connected to the Internet unprotected will be infected with viruses and remotely controlled via unauthorised persons within 20 minutes! To protect you against hackers and often to prevent spyware and 'scumware' from communicating directly with their servers about information it may have picked up from your pc, a firewall should form the key part of your e-security solution. What Can Be Done About Spyware And Adware Having a good Spyware eliminator on your computer is vital now a days with all of the different Spyware, Adware, and other malicious computer parasites that are out there. Most of them are reasonably priced and very easy to use. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. |
home | site map |
© 2006 |