Security Information |
|
Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself
The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Unfortunately, with that opportunity come people who want to make money in less than honest ways. We're going to look at some concrete ways you can identify fraudulent transactions and save yourself a lot of chargeback fees, money and grief. Get more information from prospective customers. The more information you have to work with, the better your chances are that you will be able to positively identify fraudulent transactions. At the very least, you need to make sure you get a customer's name, credit card billing address, phone number and the IP address of the computer currently accessing the order form. You should also get a valid email address. This email address should not be one that comes from a free email service. Fraudulent transactions occur more frequently from certain countries. The first thing you should know is that certain countries are more prone to fraudulent transactions than others. If you get an order originating from one of the following countries, you should be suspicious and do more digging. Some of these countries include: Ukraine, Indonesia, Yugoslavia, Lithuania, Egypt, Romania, Bulgaria, Turkey, Morocco, Vietnam, Russia, Pakistan, Malaysia, Nigeria, Israel, Iran, Cameroon, Gambia, and Ghana. This doesn't mean that every transaction from any of these countries is definitely fraudulent. But you should be very suspicious. Confirm the address of the customer. The first thing I do when I get an online order is to check the phone number of the customer against a reverse phone number directory. The majority of my orders come from the United States and Canada. Phone numbers from these countries can usually be entered into reverse directories to find out the address that phone number belongs to. If I can't get a match for the phone number it servers as a red flag and warrants more investigation. Lookup the customer's country and city of origin I've already outlined a long list of countries that should be suspicous to you. How do you determine if your customer placed the order from within one of these banned countries? Simple. You cross reference their IP address with an IP lookup database that can tell you what country they are in. The city they are from and sometimes even ISP they use! If you handle only a few orders a day, you can use an excellent free service at IP2Location.com. If you do handle more volume, IP2Location.com also offers subscription packages at various prices. Once you determine the country of origin, if it doesn't match the country the customer listed with their billing information be very careful. Yes, it is possible that your customer could be travelling away from home. It is much more likely that their credit card information has been stolen and it is being used fraudulently. A mismatch between the country reported by IP and the billing address is a big red flag. Don't let customers use free email addresses. A free email address is so easy to setup at most free email services. The odds of your being able to track down the person that registered that free email address are next to none. If at all possible, block all known free email services. The most common include Hotmail, Yahoo, Mail.com, and Gmail. If you can't block free email addresses in advance, consider a free email address a red flag. A utility you can use to determine if an email address is a known free email is dnsstuff.com. Look towards the bottom left of the page that comes up. Don't ship a product until you are sure. If two or more red flags go up, beware. If you ship a product from a fraudulent transaction, you will very likely be slapped with a chargeback from your credit card company and lose the money from the good. Be skeptical of all orders until everything checks out to your satisfaction. If in doubt, refund the purchase. Too many chargebacks will result in the cancellation of your merchant account. Who needs that? A little diligence can go a long way to helping you prevent loses from fraudulent transactions. With a little knowledge, you can greatly reduce lost profits due to fraud. This article was written by Joe Duchesne, president of http://www.yowling.com/, Yowling offers free ecommerce shopping carts with their web hosting plans. Copyright 2005 Yowling. Reprint Freely as long as you provide a clickable link back to my website from this resource box.
MORE RESOURCES: Trump's inauguration coincides with an unprecedented string of high-stakes security events in DC The Associated Press Lawyers for security consultant say CNN report on Afghan evacuations destroyed his career Los Angeles Times Louisiana Attorney General announces full review of New Orleans security plan ahead of terror attack WDSU New Orleans Biden signs Social Security Fairness Act into law Federal News Network Pensacola stepping up security of Mardi Gras in wake of New Orleans truck attack Pensacola News Journal U.S. House GOP kicks off new session with border security push Maryland Matters Heightened security in DC ahead of President Jimmy Carter's state funeral ABC6OnYourSide.com Social Security Fairness Act signed into law by Biden, enhancing retirement benefits for millions CBS News New Orleans’ Homeland Security director expects more federal resources for Carnival season FOX 8 Local First Veracode Boosts Supply Chain Security Via Phylum Acquisition BankInfoSecurity.com Opinion | Banning TikTok Won’t Solve Your Data-Security Problem The Wall Street Journal Kansas audit flags staff safety, security concerns at Osawatomie State Hospital KSHB 41 Kansas City News January 2025 security patch rolling out for Google Pixel devices, here's what's fixed Android Central Women in Security Profile: ‘The industry needs to apply outside-the-box thinking when it comes to recruiting SECURITY SYSTEMS NEWS UW-Stevens Point announces new chief of police, security services Wausau Pilot and Review Security guard killed while trying to stop gunman from entering Honduras consulate in DeKalb County WSB Atlanta Skyhigh Security Completes Breakthrough 2024, Surpasses Key Customer and Financial Milestones Business Wire A Look at Changes in the NEW HIPAA Security Rule Healthcare IT Today Marine Corps bases heighten security after New Year's Day attacks Jacksonville Daily News GlobalLogic and Hitachi Systems Trusted Cyber Management Open Cutting-Edge Security Operations Center in Poland Business Wire Border security is national security Washington Times Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Nebraska Distributes $10 Million to Boost School Security and Safety Campus Safety Magazine Merced police to increase security at upcoming MLK parade, following New Orleans terrorist attack Hanford Sentinel Ron Dermer meets with US National Security Advisor at White House The Jerusalem Post UN aviation agency investigating 'potential' security breach BleepingComputer AuditBoard Ranked #1 in Enterprise Security Compliance in G2 Winter 2025 Grid Report - Business Wire How to Lose Your Security Clearance: 2024 Edition ClearanceJobs Security questions CEOs should be asking after the UnitedHealthcare killing, according to experts Fortune New Orleans carnival season begins with high tension, tight security after New Year's attack WBUR News Data deregulation to AI protection: Security priorities in 2025 Security Magazine Massachusetts awards $1.8 million to fund abortion access, security upgrades for abortion providers Boston 25 News Alert: New HIPAA Security Rule Updates You Need to Understand Telehealth.org | Professional Training & Consultation Cactus Custody Releases 2024 Highlights: Advancing Security, Compliance, and Innovation Markets Insider 2025 Security Industry Predictions: Faisal Pandit, VP and GM, Johnson Controls Security Sales & Integration Marine Corps Air Station Beaufort heightens security measures WJCL News Savannah Kevin Kelly on Arcfield's Continued and Growing Commitment to National Security and Space Missions WashingtonExec Valley Metro selects STV to implement new safety and security on its rail and streetcar network Mass Transit Magazine Former security guard accused of secretly recording young girls at The Woodlands Mall KPRC Click2Houston Cymulate acquires CYNC Secure to accelerate continuous threat exposure management capabilities SecurityInfoWatch Why Biden cited national security concerns as he blocked a Japanese bid to buy U.S. Steel PBS NewsHour Amazon's Choice Solar-Powered Eufy S220 Security Camera Is Nearly 50% Off for a Limited Time Gizmodo Parks Associates: 32% of US households have a paid security service SecurityInfoWatch INE Security Alert: Comprehensive Training Solutions to Help Organizations Achieve CMMC Compliance Yahoo Finance Napco Access Pro’s Continental Enterprise Security Management Platform, GSA Certified, FIPS 201 Approved Security Today |
RELATED ARTICLES
Is My PC Vulnerable on the Internet? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. How to Get Rid of New Sobig.F Virus? As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. Top Five Spyware Fighting Tips Spyware and adware are becoming major problems for onlinesurfers and PC owners. Some highly respected sources such as AOL, Earthlink and Webroot place the rate of infection at 80-90% of all computers. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. DOS Attacks: Instigation and Mitigation During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website. Behavior to Stay Safer Online 1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan. Virus Nightmare..Lessons Learned I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info.The most important thing for me to save are my Outlook Express emails and my Roboform passwords. Free Ways to Tackle Threats to Your Computer Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Money Mule Email Scam Hits U.S. Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required. 5 Tips For An Unbreakable Password Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. A New Era of Computer Security Computer security for most can be described in 2 words, firewall and antivirus.Until recently could one install a firewall and an antivirus program and feel quite secure. Arming Yourself Against Spyware While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware. 8 Surefire Ways to Spot an E-Mail Identity Theft Scam! The E-Mail Identity Theft Scam is running Rampant. These E-Mail Scam artists will go to great lengths to Get Your Bank Account information and Steal your Identity. How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Phishing - Its Signs and Your Options Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. |
home | site map |
© 2006 |