Security Information |
If You Sell Anything Online Your ePockets Are Being Picked
You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. You and I, my friend, are victims of software piracy that accounted for over $24 BILLION dollars in lost revenue over the last two years*. There are so many ways people can get your product for free these days. If we continue doing nothing we will lose even more money this year as potential customers become more and more aware of just how easy it is to obtain digital products without paying for them. The question is, why do we put up with this? When we sell our downloadable products they are being easily and freely distributed (read: STOLEN) by the very same people that we are trying to get to purchase. And don't be fooled, this still occurs very regularly today even though a lot of us take precautions against it. This confirms that people want our products, they just don't want to pay for them ?because they don't have to. In fact, 70% of potential customers won't if they can get it for free*. We know the ideal scenario; what's supposed to happen. Consider Bob Jones and his knot tying eBook, "Scoutmaster Bob's Guide To Knots". Bob uploads his eBook to his web server and creates a sales link to sell it, and this sales link goes through to his payment processor. After the order is placed the customer is redirected to the download page, or "Thank-You" page, in order to automate the delivery process. Now Bob figures he's all set up and starts his massive promotion efforts. He spends lots of time and money getting people to visit his site and convinces them to place an order because it really is a great product. So, the customers place orders via the sales link then are redirected back to the download page automatically to get what they've paid for. Perfect automated system, right? Sorry Bobby, in a perfect world maybe. But here's what really happens. "Back Door" #1: Our boy Bob sets up a sales link, a download redirection link (where people go after successfully ordering) and spends time and money promoting his site. People come and visit his web site and feel that they could really use such an extensive knot tying resource and want a copy of it. A couple people place orders and Bob is happy. Because Bob has created such a great product they tell their friends about Bob's eBook. But instead of telling their friends to check out Bob's web site they simply email them a copy of the actual eBook. Why not, it doesn't cost Bob any money right? Those people then tell their friends, who tell their friends, who tell their friends. A couple of weeks later Bob's knot tying eBook is in the hands of hundreds, even thousands of people?for free. And this is just the first "back door". There are three (3) "Back Doors" that people use regularly to easily obtain free access to your product:
And here's another scary fact: For every 10 copies downloaded, 4 of those are stolen*. How lightly would you take it if you sold a tangible product, like a t-shirt, and only 6 out of ten t-shirts that left the store were paid for? These are lost sales and income forgone, there's no more blunt way to put it. If you can guarantee that the only way they can get your product is through your payment process you've just stopped that leak and increased your profits. But right now online merchants have no idea who is really downloading their products, or what happens after the downloaded. They lose total control of its distribution. Some thieves/weasels/snakes ?whatever you want to call them? even go so far as to sell stolen software and eBooks as their own for a greatly reduced price. This is probably the greatest risk to selling a digital product, and if you ask anyone that's been doing it for a while they will have experienced this nightmare first hand. The people out there that do this are much worse than one guy that just gets your product for free. These people distribute hundreds or thousands of your product and you don't see a cent of it. They saturate the market and decrease the value of your product, until it's virtually worthless. They have to be stopped. "Back Door" #2: Back to Bob. There is another big problem for Bob when it comes to protecting his eBook. He doesn't know that many payment processors promptly, and without hesitation, honor each and every refund request, no questions asked. Seriously?no questions at all, one simple email is all it takes. There's usually no need for the customer to explain anything, just that they would like a refund. They will get their refund right away and the you, the merchant, don't have a say in the matter at all. And you guessed it, they get to keep the product, for free. There is no requirement to return the product like with a traditional refund, since there's no way to be sure the product was really deleted. Imagine the absolute uproar brick-and-mortar merchants would be in if customers were allowed 100% unconditional refunds on request, and the customer gets to keep the shirt, vacuum cleaner, DVD player, or whatever? Ridiculous right? But it happens to online merchants like Bob every day. "Back Door" #3: Lastly, Bob's uploaded product is also easily and regularly downloaded for free by potential customers right from his own web site. People can get to his download page in any number of ways. For example, open up Google. Type this into the search box: "thankyou.htm ebook download". Now go to the second and third pages. Here are some free products for you if you were the type to download copyrighted material without paying for it. Of course I'm not suggesting you do that, in fact I ask you NOT to download these products, just look at the thank you page to see that the "back door" is certainly easy to find. These people are just like Bob, and they work hard to create their web sites and their products. They are simply unaware of the kick-in-the-teeth they're taking by not protecting it. Some conscientious merchants claim, "I'm safe, I protect my download location with a third-party tool that creates my download location on the fly." This is a false sense of security and it only blocks one back door. Basically this protection method simply hides the download location, but the product is still just as susceptible to being freely distributed after the download. And it can still be kept if a refund is issued. This is equivalent to the banks simply hiding all the money instead of putting it in the bank vault. So how are online merchants like Bob, and you, and me supposed to stay afloat? As it is now, the only way to turn a profit is to rely on people's goodwill in hopes that they will do the right thing. And be content in the fact that some people don't know how easy it is to get online products for free, so these people actually pay for the product. So, if you think about it, within this system it's pure luck that anyone actually pays for a digital product. But there is hope. There is a real way to stop all types of thieves and freebie-seekers. We must protect the product itself with unique identifiers and access codes for each customer. And until more of us become wise to this one simple truth rampant software and eBook piracy will continue to plague online merchants. * - average 40% worldwide software piracy rate for 2001 & 2002, and dollar losses totaling $24.05 billion, based on intensive studies by the Business Software Alliance http://www.bsa.org, and the report - "Quantifying Online Downloading of Unlicensed Software : Survey of Internet Users for BSA - May 29, 2002" About The Author Shawn Pringle is the owner and founder of the Virtual Vault digital product security system. Read his story and how he fought back at http://www.CBProtect.com Email him at shawnpringle@cbprotect.com
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Hacking Threats and Protective Security The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. Free Antivirus Security Software: Download Now to Eliminate Spyware, Pop Up Ads, etc. Adware. Spyware. Virus Prevention 101 Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter, Nimda? Do these names sound Familiar?Have you been as bothered by viruses this past year as I have? Does it seem like there are more viruses, worms and Trojans out now then ever before? It is only getting worse.For the general public, "virus" has become a catchall term for any unwanted program that spreads from computer-to-computer; yet, in reality, there are differences between viruses, worms and Trojan horses. Is My PC Vulnerable on the Internet? No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Fishing for Fortunes. Scam! Spelt phishing, but pronounced as above, this despicable act is an effort to batter your bankroll or commandeer your cash.To put it simply, you can get emails from account administrators, which strongly urge you to update details attached to that account. Web Browsing - Collected Information You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Steganography - The Art Of Deception & Concealment The Message Must Get Through-----------------------------The year is 300A.D. Securities NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a strong partnership to keep information safe and secure. It is important for people who spend time surfing the web to understand much of the information given out is easily accessible by individuals who desire to eavesdrop on the data. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Phishing - Its Signs and Your Options Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always. All About Computer Viruses Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. Spyware Programs Are Out To Get You! The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. Computer Viruses - How to Remove a Computer Virus from Your Computer Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. |
home | site map | contact us |