In an increasingly digital world, where players from virtually all sectors are racing to innovate, the risk of data theft is very real. The payment card industry has defined standards for protecting cardholder account data. But what about other data types? And what can be learned from payment card industry standards?...
There is greater awareness to the proliferation of mobile threats, and yet many organizations still underestimate their own vulnerabilities.
Mobile security should be taken just as seriously - if not more so - as traditional endpoints. Every employee behind a desktop computer also has at least one mobile device...
There is greater awareness to the proliferation of mobile threats, and yet many organizations still underestimate their own vulnerabilities. Brian Duckering of Symantec discusses the rise and maturity of mobile threat defense.
If you hold, share or have access to important information, you should assume your smartphone has already been hacked.
Unprotected smartphones could pose the greatest security risks to governments, enterprises and individuals. Consider what's at stake and prevent hackers from capitalizing on your...
The scale of connectedness we're experiencing is unprecedented. The pace of change and technology advancement in recent years could be compared to another industrial revolution. But the connectedness that allowed us to bring the power and security of the Visa network to each transaction in real time, also created the...
For retailers, the benefits of selling gift cards extend well beyond the initial revenue. The purchase ensures a future shopping trip, and when redeeming gift cards, customers spend an average of 20% more than the value of the card. Considering their widespread popularity (93% of US consumers receive or give at least...
According to a recent global fraud study, over 90% of eCommerce merchants use the same tools to manage fraud across both web and mobile transactions. While over 80% of merchants support mobile shopping, only 52% track fraud rates by channel.
As mCommerce becomes more prominent, neglecting to adjust fraud management...
Merchants reviewing online orders for card not present (CNP) fraud often rely on strict rules-based systems to decline transactions based on "risky" indicators. Although these types of processes can help reduce chargebacks, they also lead to high false decline rates and a less-than-ideal shopping experience for...
Successfully committing Card Not Present (CNP) fraud hinges on the thief's ability to convince the merchant that they are, in fact, the legitimate card holder. But when it comes to shipping, a fraudster can't flat out lie about their location - because then they won't get their goods! There are tricks that these...
Modern enterprise mobile security provides pre-emptive threat defense, runs on predictive intelligence and crowd wisdom, and delivers a noninvasive employee experience.
As the connected world becomes more connected by the day, cyber threats have been retooled to attack ubiquitous mobile endpoints. While attack...
How to Select, Implement and Succeed with Mobile Threat Defense
As more workplaces become 'everywhere' workplaces, cyber threats and attacks increasingly target mobile devices.
Through the eyes of many business leaders, opening a presentation or other document on a mobile device is hardly different from doing the...
Cross-border eCommerce sales are set to reach $627 billion by 2022, with the highest growth rate projected in regions outside of North America and Western Europe.
Yet US merchants are not capitalizing on the growth of these global markets. Only 42% of surveyed US merchants said their eCommerce website accommodated...
The global eCommerce market is booming and consumer electronics are leading the way. This year, online consumer electronics sales are expected to reach $108.4 billion in the US alone. Online sales present new challenges, including a rise in Card Not Present (CNP) fraud.
Download this infographic which aims to help...
Whenever a bad actor gains access to another party's legitimate account, this is called an Account Takeover (ATO). Not only are ATO attacks tough to spot, they can also cause a lot of harm beyond just stolen goods and chargebacks, including backlash from upset customers. In this guide, we dive into how these attacks...
While most online businesses recognize the importance of preventing chargebacks, there is less emphasis on the ability to dispute and overturn certain chargebacks in order to protect hard-earned revenue.
This guide on chargeback disputes provides actionable tips for identifying candidates for dispute, gathering...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.