Security Information |
Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself
The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Unfortunately, with that opportunity come people who want to make money in less than honest ways. We're going to look at some concrete ways you can identify fraudulent transactions and save yourself a lot of chargeback fees, money and grief. Get more information from prospective customers. The more information you have to work with, the better your chances are that you will be able to positively identify fraudulent transactions. At the very least, you need to make sure you get a customer's name, credit card billing address, phone number and the IP address of the computer currently accessing the order form. You should also get a valid email address. This email address should not be one that comes from a free email service. Fraudulent transactions occur more frequently from certain countries. The first thing you should know is that certain countries are more prone to fraudulent transactions than others. If you get an order originating from one of the following countries, you should be suspicious and do more digging. Some of these countries include: Ukraine, Indonesia, Yugoslavia, Lithuania, Egypt, Romania, Bulgaria, Turkey, Morocco, Vietnam, Russia, Pakistan, Malaysia, Nigeria, Israel, Iran, Cameroon, Gambia, and Ghana. This doesn't mean that every transaction from any of these countries is definitely fraudulent. But you should be very suspicious. Confirm the address of the customer. The first thing I do when I get an online order is to check the phone number of the customer against a reverse phone number directory. The majority of my orders come from the United States and Canada. Phone numbers from these countries can usually be entered into reverse directories to find out the address that phone number belongs to. If I can't get a match for the phone number it servers as a red flag and warrants more investigation. Lookup the customer's country and city of origin I've already outlined a long list of countries that should be suspicous to you. How do you determine if your customer placed the order from within one of these banned countries? Simple. You cross reference their IP address with an IP lookup database that can tell you what country they are in. The city they are from and sometimes even ISP they use! If you handle only a few orders a day, you can use an excellent free service at IP2Location.com. If you do handle more volume, IP2Location.com also offers subscription packages at various prices. Once you determine the country of origin, if it doesn't match the country the customer listed with their billing information be very careful. Yes, it is possible that your customer could be travelling away from home. It is much more likely that their credit card information has been stolen and it is being used fraudulently. A mismatch between the country reported by IP and the billing address is a big red flag. Don't let customers use free email addresses. A free email address is so easy to setup at most free email services. The odds of your being able to track down the person that registered that free email address are next to none. If at all possible, block all known free email services. The most common include Hotmail, Yahoo, Mail.com, and Gmail. If you can't block free email addresses in advance, consider a free email address a red flag. A utility you can use to determine if an email address is a known free email is dnsstuff.com. Look towards the bottom left of the page that comes up. Don't ship a product until you are sure. If two or more red flags go up, beware. If you ship a product from a fraudulent transaction, you will very likely be slapped with a chargeback from your credit card company and lose the money from the good. Be skeptical of all orders until everything checks out to your satisfaction. If in doubt, refund the purchase. Too many chargebacks will result in the cancellation of your merchant account. Who needs that? A little diligence can go a long way to helping you prevent loses from fraudulent transactions. With a little knowledge, you can greatly reduce lost profits due to fraud. This article was written by Joe Duchesne, president of http://www.yowling.com/, Yowling offers free ecommerce shopping carts with their web hosting plans. Copyright 2005 Yowling. Reprint Freely as long as you provide a clickable link back to my website from this resource box.
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Is Your Email Private? Part 1 of 3 In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. Why you Must Secure your Digital Product and Thank You Web Page A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until. How To Be Your Own Secret Service Agency So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. New Mass Mailing Spamming Internet Trojan for the Windows Platform May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder. Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips.. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. Is the Internet Insecure Because of You? Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Identity Theft -- 10 Simple Ways to Protect Your Good Name! Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. Arming Yourself Against Spyware While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware. Dont Get Hacked - A Guide to Protecting Your Business from Thieves You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be. |
home | site map | contact us |