SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Secure Payments: How Card
Issuers and Merchants Can
Stay Ahead of Fraudsters
Against a backdrop of growing vulnerability to fraud and
breaches, merchants and card issuers must reinforce their
secure payments infrastructure and processes, or risk losing
customers to the competition. The best way forward is a
layered approach in which commercial enterprises work with
consumers to mitigate risk and improve fraud detection and
prevention, our latest research reveals.
2 KEEP CHALLENGING January 2016
Executive Summary
Amid the continuing cat-and-mouse game of fraudsters probing
payment infrastructures for vulnerabilities, as well as the passage
of the EMV1
chip card migration deadline, the payments industry
continues its struggle to plug security gaps. Criminals have upped
their game and are attacking organizations on multiple fronts, and
finding new ways to exploit loopholes in new technologies, even
as organizations embrace them. This has increased organizations’
risk exposure, undermined consumer confidence in merchants and
issuers, and threatened the integrity of the global payments industry.
To better understand the current state of payment security, we
recently surveyed 509 U.S. consumers, 50 issuers and 52 merchants
and acquirers. The survey findings were quite revealing:
•	 Merchants have been slow to adopt technologies such as
EMV, encryption and tokenization, even though these tools
and techniques can enhance data security at various stages
of the payment lifecycle. On the issuer side, the EMV shift is
taking longer than expected due to large installed bases and the
associated card replacement costs. Fewer than 50% of issuers
said they would replace magnetic-stripe cards completely by the
end of 2015.
•	 Merchants (66%) and issuers (78%) believe that as online
shopping increases, fraud will shift to card-not-present (CNP)
transactions such as online and mobile commerce —
regardless of EMV adoption — because criminals
typically exploit new payments areas that offer the
lowest resistance to fraud.
• Card issuers and merchants admit to a lack of an
in-depth understanding not only of the emerging
vulnerabilities but also the solutions required to
prevent new forms of fraud. They also expressed
low confidence in existing processes and solutions
that can prevent fraud and data breaches. As a result,
they plan to employ technologies such as artificial
intelligence and advanced analytics, in addition to
empowering consumers with tools to monitor and
control their cards/accounts effectively.
•	 On the flip side, consumers exhibit less confidence in the
payment security provided by merchants than that of issuers.
They claim to be interested in taking charge of their card/account
security and want to be better armed with tools to defend
themselves against fraud.
•	 Consumers also reaffirmed the conventional wisdom that
they are reluctant to shop at stores affected by fraud or data
breaches. On the card issuer side, more than 80% of consumers
are likely to shift to a competitor if their account security is
compromised.
While merchants and
issuers have put several
security measures in place,
a rapidly evolving payments
landscape, combined with
fraudsters’ increasing
sophistication, warrants
additional measures.
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 3
Overall, the survey clarifies the key concerns of merchants, issuers
and customers and paints a composite picture of the array of initia-
tives underway to overcome security concerns (see Figure 1).
While merchants and issuers have put several security measures in
place, a rapidly evolving payments landscape, combined with fraud-
sters’ increasing sophistication, warrants additional measures. We
believe merchants and issuers should adopt a holistic approach
that addresses all potential vulnerabilities and secures personal and
transactional data throughout the payments lifecycle.
For merchants, this involves adopting a layered security approach,
using a combination of EMV, tokenization and encryption to protect
“card-present” transactions, as well as applying multi-factor authen-
tication and internal fraud prevention tools to secure CNP transac-
tions. Issuers should continue to strengthen their fraud monitoring
and prevention systems and consider centralizing their anti-fraud
efforts, in addition to providing customers with mobile tools and
apps to control their account/card usage. Merchants and issuers
should take it upon themselves to increase fraud awareness by con-
tinuously educating and communicating with customers.
4 KEEP CHALLENGING January 2016
Digital Invades the Payments Landscape
A slew of technological innovations is sweeping the U.S. payments space, originat-
ing from financial technology (fintech) companies, established technology giants
and mobile phone carriers, as well as merchants, social media businesses and non-
banking players. All are seeking a share of the $354 billion North American retail
payments market.2
Players such as Apple, Google, PayPal and Venmo are pushing
the envelope by introducing innovative solutions that offer quicker and less expen-
sive payments and money transfers (P2P payments). In fact, Wall Street banks
are investing heavily in upstart fintech companies, which are expected to gain
$4.7  trillion in annual revenues from traditional financial services companies,
according to Goldman Sachs estimates.3
Our study finds that merchants are beginning to support mobile payments (using
technologies such as NFC, QR codes and beacons) for in-store payments. Apple Pay
has established itself within a year of its launch (see Figure 2) as a go-to payments
option. Nearly 60% of merchants said support of mobile payments was important
or very important to their overall growth strategy. Currently, 44% of merchants
support mobile payments, and 85% expect to do so by the end of 2016.
Moreover, more merchants are planning to add mobile point-of-sale (PoS) capabili-
ties in their stores. M-commerce and e-commerce merchants are also beginning to
support mobile payments.
Big banks, which had sat on the sidelines, are now gearing up to launch their own
payment solutions (mobile wallets), in addition to supporting partners’ mobile wal-
lets to provide customers with more choices. Our study reveals that about 54% of
banks plan to offer mobile payment solutions (see Figure 3).
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 5
Digital currencies and cryptocurrencies are gaining acceptance as demand
increases for faster and lower cost global money transfers. Despite their question-
able origins, inherent flaws and controversies, digital currencies such as Bitcoin are
being positioned as solutions to some of the payments industry’s long-standing
problems, such as the extended processing times typically associated with checks
and credit cards. Digital currencies allow users to transfer money, as little as a
penny at a time, anywhere in the world within minutes. These transactions do not
involve banks, and users are typically charged a nominal fee.4
Digital currencies
can offer merchants a range of benefits over credit and debit cards. These include:
	Lower transaction fees. As there is no dependency on a trusted third-party,
fees can be less than a dollar, compared with credit card fees of 2% to 5% and
other charges.
	Better transaction security. The use of cryptographic algorithms makes digital
currencies more secure. Further, users do not need to disclose any personally
identifiable information.
	Faster transaction settlement and relief from costly chargebacks and
purchase returns. This is possible because payments do not include credit card
numbers or bank transactions.
Another looming threat – and opportunity – is the emergence of the Internet of
Things (IoT), which will lead to many connected devices and even wearables being
equipped with payment capabilities. (For more on this topic, read our white paper
“Gearing up for the Internet of Payments.”) For instance, MasterCard has launched
a program to turn a vast array of consumer products, such as wristbands, key fobs
and jewelry, into payment devices.5
Visa is working on a connected car solution that
allows consumers to pay for fuel, food, parking, etc. from their vehicles.6
Microchip
implantation in humans is already a reality, with individuals and employees (e.g.,
Sweden-based Epicenter) using them to operate equipment such as phones, com-
puters and photocopiers, as well as unlock doors and pay for food. The IoT’s endless
possibilities are set to radically change the way payments are made in the future.
Rising Threat of Fraud and Data Breaches
As merchants and issuers try to take advantage of the opportunities presented
by the shifting payments landscape, they should be mindful of the lurking risks.
Fraudsters are becoming increasingly sophisticated and are attacking merchants
and issuers on many fronts.
Cost of Fraud and Data Breaches
The U.S. accounts for about 48% ($7.9 billion) of the global gross card fraud loss,
although it represents only 21% ($6.2 trillion) of total card purchases.7
This is
primarily due to the card industry’s continued dependence on older magnetic-stripe
technology. This makes extracting sensitive card data easier for thieves who can use
it to make CNP purchases and create counterfeit cards for card-present transactions.
The average cost of fraud for merchants increased by 94% during 2014 through
2015, undercutting 1.32% of revenues.8
Criminals are also using malware to break into merchants’ networks and steal card
and customer details stored in back-end databases. Recent high-profile data breaches
involved the installation of malware at PoS terminals — most of which still run out-
dated operating systems such as Windows XP — or database systems to copy large
volumes of card data and customer records.9
The average data breach cost to U.S.
businesses increased by about 10% from $5.85 million in 2014 to $6.53 million in
2015.10
Data breaches often lead to fraud, as criminals use stolen card data for pur-
chases, as is reported to be the case at Home Depot.11
6 KEEP CHALLENGING January 2016
Chances of Switching Banks if Online Account Is Compromised
Figure 5
Source: Cognizant Research Center
Response Base: 509
Highly likely Likely No Do not know
30% 58% 6% 6%
The impact of fraud and data breaches goes beyond hefty chargebacks, penal-
ties, stolen customer data and goods, and other financial and operational costs.
It causes irreparable damage to an organization’s reputation. Our study puts this
in sharp relief.
	Merchants affected by fraud or a data breach often struggle to regain customer
trust. Consumers are particularly reluctant to return to merchants when their
own data has been stolen (see Figure 4). In the case of banks, most customers
are likely to switch to the competition if their online account is compromised
(see Figure 5).
CNP Fraud: Poised to Explode
As the U.S. slowly adopts EMV to block card-present fraud, history reveals that
fraud will shift to other payment channels with weaker defenses. CNP transactions
are the obvious target because they only require a card number and CVV (card
verification value) to make payments. While counterfeit card fraud declined by
more than half in the UK from 2005 to 2008 after transitioning to EMV, the region
also witnessed a 79% spike in CNP fraud in that timeframe. Canada, France and
Australia witnessed similar spikes.12
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 7
Thieves have increased cross-border fraud in the U.S., which involves using stolen
card data to conduct fraudulent transactions in another country, either through
counterfeit cards or online purchases. As more U.S. merchants embrace EMV tech-
nology, which offers protection against counterfeit cards, CNP transactions are
expected to become a bigger target for fraud.
Moreover, as merchants support new payment approaches across physical and digi-
tal channels, they are exposed to greater fraud risk. For instance, mobile payments
accounted for just 14% of overall m-commerce transactions in 2014, but contrib-
uted to 21% of total fraudulent transactions.13
Further, chargeback rates for CNP
transactions are higher than card-present transactions, which increases fraud costs
for e-commerce and m-commerce players.
Our study reveals that about 78% of issuers and 66% of merchants believe CNP
fraud will grow regardless of EMV adoption as virtual transactions increase and
criminals hunt for new opportunities. Further, the growth in cross-border e-com-
merce and new forms of payments are likely to increase CNP fraud.
Fighting Fraud: Security Improvement Measures
Recent instances of fraud and high-profile data breaches have served as a wakeup
call for the payments industry, which has started taking serious measures to
improve security. Along with accelerating the mandatory shift to EMV, the indus-
try is focusing on encryption, tokenization and multi-factor authentication, along
with a host of internal tools and controls to limit fraud and improve transactional
security.
Our research found that merchants and issuers are taking varying approaches to
securing payments and shoring up their infrastructure and process vulnerabilities.
Merchants
Many merchants are implementing technologies such as EMV, tokenization and
encryption to combat card-present fraud but are unprepared to deal with rapidly
evolving CNP fraud.
	EMV: The U.S. is the last major country to adopt EMV chip technology in its
payment cards. EMV cards contain embedded chips that generate a one-time
code required to approve a transaction when used at an EMV-enabled PoS
terminal. This validates the integrity of the card and prevents fraud through
counterfeit cards. Also, as of Oct. 1, 2015, merchants and issuers that have
migrated to EMV are exempted from financial liability for any card-present fraud.
»	Adoption: Nearly 80% of acquirers are working with their merchants on EMV
migration and are focused on high-risk segments, such as retail, gambling
and hospitality. Educating merchants about the ramifications of liability shift
and changes to chargeback processing is still a work in progress for many
acquirers.
	Encryption: Point-to-point encryption involves scrambling payment data as
soon as it enters the PoS terminal to minimize exposure to sensitive data. The
data is then sent via a secured network for processing, where it is decrypted by
the payment processor securely without intermediaries. This protects data from
hackers or other outsiders as it moves between various entities in the payments
network.
»	Adoption: Nearly half of the merchants we surveyed have fully implemented
encryption (see Figure 6, next page).
8 KEEP CHALLENGING January 2016
Merchants' Adoption of Tokenization
Figure 7
Source: Cognizant Research Center
Note: Percentages do not add up to 100 due to rounding.
Response Base: 52
Don’t know
17%
27%
In progress
19%
Planning to implement
19%
No plans
17%
Fully implemented
	Tokenization: Merchants store large amounts of card data in their back-end
systems for reconciliation, chargebacks, customer service, loyalty schemes, etc.,
making these systems an attractive target for criminals. Even if merchants encrypt
payment data, the key must be stored with the data, which exposes it to theft.
	 Tokenization – which involves replacing sensitive cardholder data, such as
permanent account numbers (PAN), with randomly generated alphanumeric
characters (tokens) – greatly reduces the burden of storing sensitive data
in-house. The merchant sends PAN data to a token service provider (TSP), which
returns a non-sensitive token and stores the PAN in a highly secured database
called a token vault. Merchants can use this token in place of the actual card
numbers, so that even if thieves managed to steal the tokens, they would only
find random numbers that are worthless outside the payments environment.
» Adoption: About 46% of merchants surveyed have either fully implemented
or are in the process of implementing tokenization (see Figure 7).
	 On-premise solutions are the preferred deployment model for about half
of merchants that have already implemented or are planning to implement
tokenization (see Figure 8, next page). Terminal vendor solutions (36%) and
product solutions implemented in-house (36%) are the preferred tokeniza-
tion standards vs. acquirer or in-house developed solutions.
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 9
Securing E-commerce and M-commerce Transactions
The merchants we surveyed use various tools to prevent e-commerce and m-com-
merce fraud (see Figure 9, next page). Address verification services (AVS) and card
verification are still the most widely used solutions even for m-commerce, despite
the fact that m-commerce and e-commerce pose very different fraud risks.
Since CNP fraud is expected to increase, merchants and financial institutions must
consider advanced and more reliable authentication solutions or multi-factor
authentication, using tools such as device authentication and biometrics. However,
these tools are not in wide use. For instance, biometrics has been adopted by only
5% of the e-commerce merchants we surveyed.
Issuers
Issuers are working to address card-present fraud by replacing magnetic-stripe
cards with new EMV chip cards. They are also providing customers with mobile
tools that enable better control over their card/account security.
	EMV: The annual cost of counterfeit card fraud in 2015 was $3.6 billion.14
In the case of card-present fraud, issuers bear a larger share of fraud
losses than merchants, which reinforces the need to quickly replace
magnetic-stripe cards with EMV chip cards.
	 However, issuers are replacing magnetic-stripe cards at a glacial pace due
to high costs and a large customer base. Approximately 70% of issuers have
replaced less than 25% of magnetic-stripe credit and debit cards with EMV
cards, according to our research (see Figure 10, page 11). Only 42% of issuers
indicated they will replace magnetic-stripe cards completely by year-end-2015,
while another 38% said they plan to do so by year-end-2016.
	 Many issuers are using more than one criterion for replacing magnetic-stripe
cards with EMV chip cards. Only 42% said they are proactively replacing existing
cards before they expire (see Figure 11, page 11).
	Tokenization: Issuers have historically been wary of tokenization, as they
believed the approach ceded too much control to card networks that also act
as TSPs. They were also concerned about strong consumer brands (e.g., Apple,
Google, etc.) coming between them and their customers in the emerging
m-wallet space. However, the benefits of tokenization in reducing issuer and
customer risk, as well as securing actual card data, appear to have mitigated
issuer concerns.
	 Our research finds that 64% of issuers are currently using tokenization. Visa/
MC/Amex tokenization approach is the preferred solution, followed by product
solutions implemented in-house (see Figure 12, page 12).
10 KEEP CHALLENGING January 2016
Securing E-Commerce and M-Commerce Transactions
While EMV will reduce card-present fraud, issuers must brace themselves for an
onslaught of CNP fraud. Our research reveals that issuers plan to implement the
latest fraud prevention solutions (i.e., artificial intelligence to improve fraud detec-
tion) in the near future, along with traditional tools such as rules-based alerts and
analytics to combat CNP fraud (see Figure 13, page 12).
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 11
Issuers are already using various customer authentication methods to prevent CNP
fraud, with device authentication being the most used (see Figure 14, next page).
Adoption of solutions that offer better protection of CNP fraud, such as 3-D Secure
and biometrics, is still very low.
Empowering Customers
In addition to investing in security improvements, 46% of the issuers we surveyed
are trying to empower customers with more control over their cards/accounts.
Techniques include mobile tools and apps that allow customers to switch cards
on and off remotely, and providing mobile alerts to customers when they detect
suspicious activity (see Figure 15, page 13).
Among issuers offering such controls, 43% said a majority of their customers
use them, and 48% report only partial adoption. Such tools can lead to improved
loyalty, as noted by 75% of customer respondents, in addition to reducing the
financial and security burden on banks.
12 KEEP CHALLENGING January 2016
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 13
When asked who should be
accountable for fraud, 54% of
consumers indicated that banks
and merchants are equally
responsible. However, 30% of
customer believe merchants
alone are responsible.
Confidence in Current Security Measures:
A Reason to Worry
Merchants and issuers believe they are inadequately prepared to deal with growing
security threats. Only 37% of merchants are very confident of their current fraud
and data breach solutions (see Figure 16, next page). Issuers are more confident
in card fraud prevention solutions than in CNP fraud solutions (see Figure 17, next
page), but overall confidence is still low. Further, 60% of issuers do
not know whether their organization takes an integrated or siloed
approach to fraud prevention that incorporates different fraud
prevention solutions for different payment channels.
When customers were asked how confident they were in the ability
of issuers and merchants to protect sensitive data, 60% expressed
high to very high confidence in issuers. When asked who should
be accountable for fraud protection, about half (54%) of consum-
ers placed equal responsibility on banks and merchants, while a
third believe merchants alone are responsible (see Figure 18, next
page). Interestingly, more customers are concerned about security
when shopping on their mobile device than online and in physical
stores (see Figure 19, page 15).
Consumers affected by fraud indicated that issuers were more quick to respond
than merchants (see Figure 20, page 15); in fact, nearly one-third said merchants
did not respond at all. In addition to communicating with customers, issuers are also
taking swift remedial measures, our survey finds. Following the recent Apple Pay
fraud, 34% of issuers developed more stringent Apple Pay sign-up processes for
customers adding cards; 46% said they are now working with mobile payment
companies to improve security.
Key Areas of Vulnerability
Despite the adoption of EMV, tokenization and encryption to secure data across
the transaction lifecycle (see Figure 21, page 15), data vulnerability still requires
organizational attention (see Figure 22, page 16), whether because of technology
limitations or improper implementation. For example, in 2011, criminals in Belgium
rigged EMV chip cards to accept any PIN input, as well as talk to the card issuer
to gain transaction authorization.15
Card data can still be stolen from non-EMV
merchants, while lost or stolen EMV cards can be used to make purchases in
physical stores, as many card issuers support customer signatures instead of a PIN.
14 KEEP CHALLENGING January 2016
Merchant Confidence in Processes and Solutions Used to Prevent Fraud and
Data Breach Solutions
Figure 16
Note: Percentages do not add to 100 due to rounding.
Source: Cognizant Research Center
Response Base: 52
Very confident Somewhat confident
37% 58%
Not very confident
6%
Customer Opinion on Who is More Accountable for Fraud
Figure 18
Source: Cognizant Research Center
Response Base: 509
Both equally Retailers/merchants Do not know
54% 30% 10%
Banks
6%
However, merchants that have not yet implemented any of the above technologies
must review all the channels and links that carry card data and secure them using
a holistic approach.
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 15
16 KEEP CHALLENGING January 2016
A Holistic Approach to Addressing Payment
Security Challenges
Because the types of vulnerability in the payments ecosystem are both complex and
evolving, it is imperative that merchants and issuers consider a holistic approach to
address the risks. We suggest the following:
	Merchants should adopt a layered security approach to prevent fraud and ensure
secure payment data.
	Issuers should continue to improve their fraud monitoring and detection
measures by centralizing fraud prevention efforts, and deploying real-time and
behavioral analytics.
	Merchants and issuers should increase fraud awareness among cardholders by
educating, empowering and engaging with them continuously.
Merchant Strategy: A Layered Security Approach
Because no single solution exists that offers complete protection, we believe mer-
chants should fortify payment security with multiple lines of defense, culminating
in a layered approach.
	Securing card-present transactions. A layered approach to securing card-pres-
ent transactions involves using EMV, tokenization and encryption. Organizations
Assessing Vulnerabilities
Transaction Phase Key Points of Vulnerability
Pre-Authorization: Request initiated for
transaction authorization.
	 PoS device: The physical device that captures payment card credentials
in a physical store.
	 CNP channels: Virtual PoS, such as e-commerce websites, m-commerce
apps, etc., that capture card credentials.
	 Mobile devices: Smartphones, tablets and other smart devices used to
execute transactions and run apps that store and manage token creden-
tials.
Authorization Processing: Captured
payment credentials transmitted from
the PoS terminal to the issuer host for
authorization.
Transmission of data that is encrypted using symmetric encryption (which
uses the same key to encrypt and decrypt data), as intruders who steal
encryption keys can crack the encrypted data.
Transmission of card data sent by merchants in clear form to a TSP for
tokenization, as hackers can attempt to steal the clearly readable data.
De-tokenization of payment tokens while they are sent to the issuer host for
authorization, as it reveals a clear PAN, making it susceptible to theft.
Post-Authorization and Back-Office
Processing: Cardholder data stored in
merchant systems.
Card data held by merchants for batch settlement at the end of the day and
stored in back-end databases for purposes such as chargebacks, marketing,
customer loyalty programs, etc. Such systems are often targeted by thieves
to gain access to large amounts of aggregated cardholder data.
Source: Cognizant Research Center
Figure 22
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 17
Encrypting data at the
PoS using point-to-point
encryption can secure
data against hackers while
it travels between the
merchant and processor.
should take the plunge by complying with the technical and operational require-
ments of PCI DSS.16
Although it does not guarantee complete protection – as
seen in recent data breaches at merchants that adhered to PCI DSS guidelines –
PCI DSS ensures a basic level of security and can form the foundation of a
layered approach.
	 The next level of defense — and the core component of this approach — is EMV
adoption. When combined with PCI DSS, EMV can enhance the security of
payments data that reaches merchants’ systems. However, data
is exposed once it enters the merchant’s network. Encrypting
data at the PoS using point-to-point encryption can secure
data against hackers while it travels between the merchant and
processor (data in transit). Topping these layers with a tokeni-
zation solution – with token vault management provided by a
sourcing partner rather than handled in-house – reduces the
burden of managing sensitive data, vastly mitigating the fallout
from data breaches (data at rest).
	Securing CNP transactions. Because CNP fraud is more
complex, criminals committing such fraud are considered to
be more sophisticated. Using multi-factor authentication – a
process of verifying the authenticity of customers using at least two inputs, such
as card number, PIN and biometric factors – can mitigate CNP fraud to a large
extent. Merchants should also consider device authentication to identify devices
that customers normally use for shopping before sending the transaction for
authorization.
	 A case in point is Amazon’s multi-factor authentication, which requires customers
to enter a code sent to their mobile device or generated by a smartphone authen-
ticator app once they sign in with their existing username and password. This
means thieves stealing a customer username and password would still require
access to the mobile phone to log in. Enabling multi-factor authentication is a
simple, one-time process. Customers can ask Amazon to remember each device,
which will stop prompts for the code when that device is used. For PCs, the
device refers to a specific browser (Chrome, Firefox, etc.).
	 3-D Secure adds a strong protective layer, as it requires cardholders to enter a
static password (stored with the issuer) or a one-time password (generated by
the issuer) sent to their mobile phones before paying for purchases. This can
reduce chargebacks for merchants and shifts the liability to the issuer when a
transaction is disputed.
	 Merchants should note that adding multiple authentications can negatively
impact customers’ ease of purchase, and force them to abandon the transaction
or the merchant. Behavioral and real-time fraud analytics can help merchants
better understand customer purchasing trends and patterns, and preempt fraud
attempts effectively.
Key Considerations
Merchants should consider the cost and complexity of implementing the aforemen-
tioned technologies. For instance:
	A small merchant that is compliant with PCI DSS and that processes low-value
purchases may face fewer chargebacks and counterfeit card issues and,
therefore, should focus on encrypting data both in transit and at rest.
 A large e-tailer may invest primarily in tokenization and strong customer authen-
tication for safer online transactions.
 Similarly, a large merchant facing counterfeit card threat should consider EMV
and data encryption, as well as tokenization, if data is stored in-house.
18 KEEP CHALLENGING January 2016
Merchants should implement
network segmentation
to prevent hackers from
moving horizontally
within the network.
When issuers integrate their
risk management efforts in
a centralized unit, they can
better apply the intelligence
gained from one channel or
product to other risk areas,
enabling them to more
effectively quell threats and
realize efficiencies.
Merchants should focus on securing PoS terminals by using strong passwords
rather than default ones, as well as restricting general Internet activity on PoS com-
puter systems. They should also implement anti-virus software
and update it regularly, as well as firewalls to isolate PoS systems
from other networks. Another line of defense is to implement net-
work segmentation to prevent hackers from moving horizontally
within the merchant’s network.
Merchants with an in-house token vault should use strong authen-
tication to limit physical and virtual access to the vault. To mitigate
the threat of data theft after de-tokenization, merchants should
configure firewalls to restrict IP traffic and limit the number of
applications that make de-tokenization requests to the token vault.
Issuer Strategy: Centralize Fraud Risk Efforts
Issuers responding to our survey indicated the prevalence of siloed approaches to
fraud risk management, which can lead to redundant efforts, difficulty sharing risk
information across departments, and the inability to gain a complete picture of
the risks they face.
When organizations integrate their disparate risk management efforts in a cen-
tralized unit, they can better apply the intelligence gained from one channel or
product to other risk areas, enabling them to more effectively quell threats and
realize operational and cost efficiencies. Doing so requires organizations to consoli-
date the large amounts of customer and transactional data residing within silos and
identify customers uniquely across channels and interactions to provide a unified
view. By combining organizational data with data from external sources such as
social media, and leveraging advanced analytics, organizations can produce deep
insights into customer behavior that can help them detect anomalies early in pur-
chasing behavior. These insights can also be used to provide alerts to customers,
such as location-based fraud warnings, and reduce false positives.
Involve Customers
In addition to bolstering security, training employees and build-
ing an incident response team, merchants and issuers should also
incorporate customers into their overall risk management efforts.
We recommend that customers’ risky behaviors be continually
studied and dealt with by employing a combination of the three Es:
 Educate: Customers must be continuously educated on various
forms of fraud, precautions that can protect mobile devices
from rogue apps, malware, etc., and steps to take if they
suspect fraud.
 Empower: Empowering customers with tools that give them
greater control over their accounts and improve security can
go a long way toward improving confidence and driving traffic
across channels. Issuers can provide mobile apps that allow
customers to limit card spending in certain geographies, cap
transaction limits, abort transactions, block and unblock cards,
etc., which can mitigate fraud significantly.
	Engage: Engaging customers through regular communication using relevant
channels in post-incident management is critical to increasing customer
confidence and ensuring customer loyalty.
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 19
Research Methodology
The survey was conducted online in the U.S. in July 2015, and included 509
customers, 50 issuers and 52 merchants and acquirers.
20 KEEP CHALLENGING January 2016
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 21
22 KEEP CHALLENGING January 2016
References
	 “Beyond the Point of Sale: Six Steps to Stronger Retail Security,” SANS Institute,
Nov. 5, 2015,
	 https://www.sans.org/reading-room/whitepapers/analyst/point-sale-steps-
stronger-retail-security-36102.
	 “Tokenization in Financial Services,” Financial Services Roundtable, Mar. 2015,
http://fsroundtable.org/cto-corner-tokenization-financial-services/.
	 “Multi-Layered Security Strengthens Payment Structures: How to Prepare a
Comprehensive Strategy,” Verifone, 2014,
	 http://www.verifone.com/media/4041137/verifone-comprehensive-multilayered-
security-white-paper.pdf.
	 “Tokenization Is the Way to Prevent E-commerce Security Breaches,” Network-
World, Aug. 25, 2014,
	 http://www.networkworld.com/article/2597398/tech-primers/tokenization-is-
the-way-to-prevent-e-commerce-security-breaches.html.
	 “What Data Thieves Don’t Want You to Know: The Facts about Encryption and
Tokenization,” First Data, 2012, https://www.firstdata.com/downloads/thought-
leadership/TokenizationEncryptionWP.pdf.
	“How to Enable Multifactor Security on Amazon,” Krebsonsecurity.com,
Nov. 15, 2015,
	 http://krebsonsecurity.com/2015/11/how-to-enable-multifactor-security-on-
amazon/#more-33033.
	 “The Double-Edged Sword of Tokenization Helps Issuers But Also Poses a Subtle
Threat,” Digital Transactions, Oct. 12, 2015,
	 http://digitaltransactions.net/news/story/The-Double-Edged-Sword-of-Tokeniza-
tion-Helps-Issuers-But-Also-Poses-a-Subtle-Threat.
	 “Tokenization: Benefits and Challenges for Securing Transaction Data,” Security
Week, Nov. 4, 2014,
	 http://www.securityweek.com/tokenization-benefits-and-challenges-securing-
transaction-data.
Note: All company names, trade names, copyrights and products referenced in this white paper are the property of their
respective owners. No company referenced in this white paper sponsored this white paper or the contents thereof.
SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 23
Footnotes
1
	 EMV stands for the first initials of Europay, MasterCard and Visa, the three
companies that created the standard.
2
	 “Global Payments 2015: Listening to the Customer’s Voice,” The Boston
Consulting Group, Oct. 9, 2015,
	 https://www.bcgperspectives.com/content/articles/financial-institutions-digital-
economy-global-payments-2015-listening-customer-voice/.
3
	 “Why Wall Street Is Pouring Money into Companies that Want to Eat its Lunch,”
Business Insider, Mar. 21, 2015,
	 http://www.businessinsider.in/Why-Wall-Street-is-pouring-money-into-compa-
nies-that-want-to-eat-its-lunch/articleshow/46640241.cms.
4
	 “Bitcoin and the Digital-Currency Revolution,” The Wall Street Journal,
Jan. 23, 2015,
	 http://www.wsj.com/articles/the-revolutionary-power-of-digital-cur-
rency-1422035061.
5
	 “MasterCard Launches New Program that Can Turn any Consumer Gadget,
Accessory or Wearable into a Payment Device,” MasterCard, Oct. 26, 2015,
	 http://newsroom.mastercard.com/press-releases/mastercard-launches-new-pro-
gram-that-can-turn-any-consumer-gadget-accessory-or-wearable-into-a-pay-
ment-device/.
6
	 “The Connected Car: Visa Looks Ahead,” Visa, 2015,
	 https://usa.visa.com/visa-everywhere/innovation/visa-connected-car.html.
7
	 “Global Card Fraud Losses Reach $16.31 Billion — Will Exceed $35 Billion in 2020,
according to The Nilson Report,” BusinessWire.com, Aug. 4, 2015,
	 http://www.businesswire.com/news/home/20150804007054/en/Global-Card-
Fraud-Losses-Reach-16.31-Billion.
8
	 “2014 LexisNexis® True Cost of Fraud mCommerce: Merchants Struggle To
Contain Rising Mobile Fraud Costs,” LexisNexis, Jan. 2015,
	 http://lexisnexis.com/risk/downloads/whitepaper/true-cost-fraud-mobile-2014.pdf.
9
	 “The True Cost of Data Breaches in the Payments Industry,” Smart Card Alliance,
Mar. 2015,
	 http://www.emv-connection.com/downloads/2015/03/The-Cost-of-Data-
Breaches.pdf.
10
	 “Average U.S. Organization Data Breach Cost 2006-2015,” Statista, 2015,
	 http://www.statista.com/statistics/273575/average-organizational-cost-
incurred-by-a-data-breach/.
11
	 “Data Breach at Home Depot Leads to Fraud,” Fortune, Sept. 23, 2014,
	 http://fortune.com/2014/09/23/data-breach-at-home-depot-leads-to-fraud/.
12
	 “Card-Not-Present Fraud in a Post-EMV Environment: Combating the Fraud
Spike,” Aite Group, 2014,
	 http://www.emc.com/collateral/white-papers/card-not-present-fraud-post-emv-
env-wp.pdf.
	 “Biohackers: Meet London's Living Synths Who Are Implanting Microchips into
Their Own Bodies,” Evening Standard, Oct. 29, 2015,
	 http://www.standard.co.uk/lifestyle/esmagazine/biohackers-meet-londons-living-
synths-who-are-implanting-microchips-into-their-own-bodies-a3101646.html.
24 KEEP CHALLENGING January 2016
About the Authors
Vaibhav Shirke is a chief architect with the cards and payments business within
Cognizant’s Banking and Financial Services business unit. With over 20 years of
experience and acting as a solution architect, he leverages strong domain knowl-
edge to map industry standard solutions to changing market demands. Vaibhav
leads the secure payments initiative within Cognizant and works very closely with
leading financial institutions and merchants in helping them define a secure pay-
ments roadmap. He can be reached at Vaibhav.Shirke@cognizant.com.
Rajeshwer Chigullapalli is the General Manager of Cognizant Research Center and
leads the unit’s fact-based thought leadership program. He has more than 20 years
of experience in research and publishing and has published numerous whitepapers
on topics across the banking and financial services industry and in other industry
sectors. He can be reached at Rajeshwer.Chigullapalli@cognizant.com | linkedin.
com/in/rajeshwer-chigullapalli-508a01a.
Vinaya Kumar Mylavarapu is a Senior Research Associate with Cognizant Research
Center, where he produces fact-based thought leadership across industries and
sectors. He has more than 10 years of experience in business and industry research.
Vinaya can be reached at Vinayakumar.Mylavarapu@cognizant.com | linkedin.com/
in/vinayakumarmylavarapu.
Kamini Rajendran is Manager of Strategic Growth Opportunities within
Cognizant’s Banking and Financial Services’ Payments Practice, a division focused
on emerging trends in payments and establishing capabilities/ecosystems to sup-
port partners. She has over 13 years of payments domain experience and leads
the secure payments focus area across industry verticals. She can be reached at
Kamini.Rajendran@cognizant.com.
13
	 “2014 LexisNexis® True Cost of Fraud mCommerce: Merchants Struggle to
Contain Rising Mobile Fraud Costs,” LexisNexis, Jan. 2015,
	 http://lexisnexis.com/risk/downloads/whitepaper/true-cost-fraud-mobile-2014.pdf.
14
	 “EMV Transition Will Still Leave Security Gaps,” Dell, Sept. 2015,
	 https://powermore.dell.com/technology/emv-transition-will-still-leave-security-
gaps/.
15
	 “How a Criminal Ring Defeated the Secure Chip-and-PIN Credit Cards,”
Arstechnica.com, Oct. 20, 2015,
	 http://arstechnica.com/tech-policy/2015/10/how-a-criminal-ring-defeated-the-
secure-chip-and-pin-credit-cards/.
16
	 The Payment Card Industry Data Security Standard (PCI DSS) is a global
standard for organizations accepting cards to protect customers’ payment card
data throughout the transaction.
World Headquarters
500 Frank W. Burr Blvd.
Teaneck, NJ 07666 USA
Phone: +1 201 801 0233
Fax: +1 201 801 0243
Toll Free: +1 888 937 3277
inquiry@cognizant.com
European Headquarters
1 Kingdom Street
Paddington Central
London W2 6BD
Phone: +44 (0) 207 297 7600
Fax: +44 (0) 207 121 0102
infouk@cognizant.com
India Operations Headquarters
#5/535, Old Mahabalipuram Road
Okkiyam Pettai, Thoraipakkam
Chennai, 600 096 India
Phone: +91 (0) 44 4209 6000
Fax: +91 (0) 44 4209 6060
inquiryindia@cognizant.com
© Copyright 2016, Cognizant. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means,
electronic, mechanical, photocopying, recording, or otherwise, without the express written permission from Cognizant. The information contained herein is subject to
change without notice. All other trademarks mentioned herein are the property of their respective owners.
Codex: 1565
About Cognizant Research Services
With over 100 analysts, Cognizant Research Center
(CRC) offers a wide array of business, market and strat-
egy research services across nearly every vertical indus-
try. CRC specializes in research-as-a-service (RaaS), an
end-to-end offering through which research is delivered
via a range of models — from traditional full-time-equiv-
alent-based, through “pay per use” services. Through
RaaS, CRC primarily addresses the unevenly distributed
research needs of marketing teams, on demand. Learn
more by visiting www.cognizant.com/business-process-
services/research-analytics.
About Cognizant Banking and
Financial Services
Cognizant’s Banking and Financial Services business unit
includes consumer lending, commercial finance, leasing
insurance, cards, payments, banking, investment bank-
ing, wealth management and transaction processing. It is
the company’s largest industry segment, serving leading
financial institutions in North America, Europe and Asia-
Pacific, includinginclude six of the top 10 North Ameri-
can financial institutions and nine of the top 10 European
banks. The practice leverages its deep domain and con-
sulting expertise to provide solutions across the entire
financial services spectrum, and enables our clients to
manage business transformation challenges, drive rev-
enue and cost optimization, create new capabilities, mit-
igate risks, comply with regulations, capitalize on new
business opportunities, and drive efficiency, effective-
ness, innovation and virtualization. For more, please visit
http://www.cognizant.com/banking-financial-services.

Weitere ähnliche Inhalte

Was ist angesagt?

The future of general insurance report 2017
The future of general insurance report 2017The future of general insurance report 2017
The future of general insurance report 2017Antonio Mazzone
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureRYAN ORTON
 
Insurance Consumer Data Report
Insurance Consumer Data ReportInsurance Consumer Data Report
Insurance Consumer Data ReportGabriele Stonkute
 
Mobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementMobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementGeo Coelho
 
Visa report 02.04.16
Visa report 02.04.16Visa report 02.04.16
Visa report 02.04.16Andrea Casati
 
Building privacy into consensual tracking for insurance purposes via an in-ca...
Building privacy into consensual tracking for insurance purposes via an in-ca...Building privacy into consensual tracking for insurance purposes via an in-ca...
Building privacy into consensual tracking for insurance purposes via an in-ca...Browne Jacobson LLP
 
Get The Right Protection For Your Safety, Your Property And Your Identity
Get The Right Protection For Your Safety, Your Property And Your IdentityGet The Right Protection For Your Safety, Your Property And Your Identity
Get The Right Protection For Your Safety, Your Property And Your IdentityMarena Montagnaro
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety
 
CGAP Brief: The Emerging Global Landscape of Mobile Microinsurance
CGAP Brief: The Emerging Global Landscape of Mobile MicroinsuranceCGAP Brief: The Emerging Global Landscape of Mobile Microinsurance
CGAP Brief: The Emerging Global Landscape of Mobile MicroinsurancePeter Zetterli
 
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small BusinessesStudy: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businessesclaytonroot
 
White paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usaWhite paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usaCMR WORLD TECH
 
Property and-casualty-insurance-2020
Property and-casualty-insurance-2020Property and-casualty-insurance-2020
Property and-casualty-insurance-2020~Eric Principe
 
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014yStats.com
 
Insurers warned about merely ‘playing’ with digital in ey report insurance ...
Insurers warned about merely ‘playing’ with digital in ey report   insurance ...Insurers warned about merely ‘playing’ with digital in ey report   insurance ...
Insurers warned about merely ‘playing’ with digital in ey report insurance ...Digital Insurance News
 
Non credit card installment awareness - survey preview slide share version
Non credit card installment awareness - survey preview slide share versionNon credit card installment awareness - survey preview slide share version
Non credit card installment awareness - survey preview slide share versionFerdinand Zebua
 
SAP Lottery Whitepaper
SAP Lottery WhitepaperSAP Lottery Whitepaper
SAP Lottery WhitepaperFederico Winer
 

Was ist angesagt? (20)

The future of general insurance report 2017
The future of general insurance report 2017The future of general insurance report 2017
The future of general insurance report 2017
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_Brochure
 
Insurance Consumer Data Report
Insurance Consumer Data ReportInsurance Consumer Data Report
Insurance Consumer Data Report
 
Mobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk ManagementMobile Payments: Balancing User Experience & Effective Risk Management
Mobile Payments: Balancing User Experience & Effective Risk Management
 
Visa report 02.04.16
Visa report 02.04.16Visa report 02.04.16
Visa report 02.04.16
 
Challenge Accepted
Challenge AcceptedChallenge Accepted
Challenge Accepted
 
Tackling Card not present Fraud
Tackling Card not present FraudTackling Card not present Fraud
Tackling Card not present Fraud
 
Building privacy into consensual tracking for insurance purposes via an in-ca...
Building privacy into consensual tracking for insurance purposes via an in-ca...Building privacy into consensual tracking for insurance purposes via an in-ca...
Building privacy into consensual tracking for insurance purposes via an in-ca...
 
Get The Right Protection For Your Safety, Your Property And Your Identity
Get The Right Protection For Your Safety, Your Property And Your IdentityGet The Right Protection For Your Safety, Your Property And Your Identity
Get The Right Protection For Your Safety, Your Property And Your Identity
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming Industry
 
CGAP Brief: The Emerging Global Landscape of Mobile Microinsurance
CGAP Brief: The Emerging Global Landscape of Mobile MicroinsuranceCGAP Brief: The Emerging Global Landscape of Mobile Microinsurance
CGAP Brief: The Emerging Global Landscape of Mobile Microinsurance
 
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small BusinessesStudy: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
Study: Identifying Fraud and Credit Risk in the Smallest of Small Businesses
 
White paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usaWhite paper-safe-secure-payments-master card-approach-usa
White paper-safe-secure-payments-master card-approach-usa
 
Property and-casualty-insurance-2020
Property and-casualty-insurance-2020Property and-casualty-insurance-2020
Property and-casualty-insurance-2020
 
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
 
Insurers warned about merely ‘playing’ with digital in ey report insurance ...
Insurers warned about merely ‘playing’ with digital in ey report   insurance ...Insurers warned about merely ‘playing’ with digital in ey report   insurance ...
Insurers warned about merely ‘playing’ with digital in ey report insurance ...
 
Non credit card installment awareness - survey preview slide share version
Non credit card installment awareness - survey preview slide share versionNon credit card installment awareness - survey preview slide share version
Non credit card installment awareness - survey preview slide share version
 
SAP Lottery Whitepaper
SAP Lottery WhitepaperSAP Lottery Whitepaper
SAP Lottery Whitepaper
 
2011 airline fraud_report_us
2011 airline fraud_report_us2011 airline fraud_report_us
2011 airline fraud_report_us
 

Andere mochten auch

Antibióticoterapia
AntibióticoterapiaAntibióticoterapia
Antibióticoterapianatalineller
 
Déjà vu - Gerardo Wisosky
Déjà vu - Gerardo WisoskyDéjà vu - Gerardo Wisosky
Déjà vu - Gerardo WisoskyGeneXus
 
11 M-CARE: Environmental control
11 M-CARE: Environmental control11 M-CARE: Environmental control
11 M-CARE: Environmental controlKarel Van Isacker
 
Business Plan for Asian Corner
Business Plan for Asian CornerBusiness Plan for Asian Corner
Business Plan for Asian Corner百惠 谢
 
Comentários Curiosity
Comentários CuriosityComentários Curiosity
Comentários Curiosityskynet71
 
Gestão e Segurança - Qual o novo rumo? "Enfermagem Baseada na Evidência"
Gestão e Segurança - Qual o novo rumo? "Enfermagem Baseada na Evidência"Gestão e Segurança - Qual o novo rumo? "Enfermagem Baseada na Evidência"
Gestão e Segurança - Qual o novo rumo? "Enfermagem Baseada na Evidência"Abilio Cardoso Teixeira
 
OTC Derivatives: Evaluating the Impact of New Regulation in Europe, Thomas He...
OTC Derivatives: Evaluating the Impact of New Regulation in Europe, Thomas He...OTC Derivatives: Evaluating the Impact of New Regulation in Europe, Thomas He...
OTC Derivatives: Evaluating the Impact of New Regulation in Europe, Thomas He...DerivSource
 
Pharma market 2016 sponsorship
Pharma market 2016 sponsorshipPharma market 2016 sponsorship
Pharma market 2016 sponsorshipJohn Smith
 
Military electro optical or infrared systems market 2020
Military electro optical or infrared systems market 2020Military electro optical or infrared systems market 2020
Military electro optical or infrared systems market 2020bertharrison
 
Refugiados sirios con discapacidad.
Refugiados sirios con discapacidad.Refugiados sirios con discapacidad.
Refugiados sirios con discapacidad.José María
 
Anatomy, pathology an staging work up of prostate cancer
Anatomy, pathology an staging work up of prostate cancerAnatomy, pathology an staging work up of prostate cancer
Anatomy, pathology an staging work up of prostate cancerAnil Gupta
 
Slides Arquitetura Bioclimatica - Curso Conservação de Energia UERJ / SEBRAE/...
Slides Arquitetura Bioclimatica - Curso Conservação de Energia UERJ / SEBRAE/...Slides Arquitetura Bioclimatica - Curso Conservação de Energia UERJ / SEBRAE/...
Slides Arquitetura Bioclimatica - Curso Conservação de Energia UERJ / SEBRAE/...Myrthes Marcele F. Santos
 
Úlcera Por Pressão
Úlcera Por PressãoÚlcera Por Pressão
Úlcera Por PressãoCíntia Costa
 
Prostate anatomy
Prostate anatomyProstate anatomy
Prostate anatomyPAIRS WEB
 

Andere mochten auch (18)

Antibióticoterapia
AntibióticoterapiaAntibióticoterapia
Antibióticoterapia
 
Déjà vu - Gerardo Wisosky
Déjà vu - Gerardo WisoskyDéjà vu - Gerardo Wisosky
Déjà vu - Gerardo Wisosky
 
11 M-CARE: Environmental control
11 M-CARE: Environmental control11 M-CARE: Environmental control
11 M-CARE: Environmental control
 
Business Plan for Asian Corner
Business Plan for Asian CornerBusiness Plan for Asian Corner
Business Plan for Asian Corner
 
Comentários Curiosity
Comentários CuriosityComentários Curiosity
Comentários Curiosity
 
Gestão e Segurança - Qual o novo rumo? "Enfermagem Baseada na Evidência"
Gestão e Segurança - Qual o novo rumo? "Enfermagem Baseada na Evidência"Gestão e Segurança - Qual o novo rumo? "Enfermagem Baseada na Evidência"
Gestão e Segurança - Qual o novo rumo? "Enfermagem Baseada na Evidência"
 
Cervantes’ life
Cervantes’ lifeCervantes’ life
Cervantes’ life
 
OTC Derivatives: Evaluating the Impact of New Regulation in Europe, Thomas He...
OTC Derivatives: Evaluating the Impact of New Regulation in Europe, Thomas He...OTC Derivatives: Evaluating the Impact of New Regulation in Europe, Thomas He...
OTC Derivatives: Evaluating the Impact of New Regulation in Europe, Thomas He...
 
Pharma market 2016 sponsorship
Pharma market 2016 sponsorshipPharma market 2016 sponsorship
Pharma market 2016 sponsorship
 
Military electro optical or infrared systems market 2020
Military electro optical or infrared systems market 2020Military electro optical or infrared systems market 2020
Military electro optical or infrared systems market 2020
 
Refugiados sirios con discapacidad.
Refugiados sirios con discapacidad.Refugiados sirios con discapacidad.
Refugiados sirios con discapacidad.
 
A3 1997 AUDI maintenance
A3 1997 AUDI maintenanceA3 1997 AUDI maintenance
A3 1997 AUDI maintenance
 
Anatomy, pathology an staging work up of prostate cancer
Anatomy, pathology an staging work up of prostate cancerAnatomy, pathology an staging work up of prostate cancer
Anatomy, pathology an staging work up of prostate cancer
 
Slides Arquitetura Bioclimatica - Curso Conservação de Energia UERJ / SEBRAE/...
Slides Arquitetura Bioclimatica - Curso Conservação de Energia UERJ / SEBRAE/...Slides Arquitetura Bioclimatica - Curso Conservação de Energia UERJ / SEBRAE/...
Slides Arquitetura Bioclimatica - Curso Conservação de Energia UERJ / SEBRAE/...
 
Úlcera Por Pressão
Úlcera Por PressãoÚlcera Por Pressão
Úlcera Por Pressão
 
Rahama haruna
Rahama harunaRahama haruna
Rahama haruna
 
Prostate anatomy
Prostate anatomyProstate anatomy
Prostate anatomy
 
Monografia modelo
Monografia modeloMonografia modelo
Monografia modelo
 

Ähnlich wie Secure Payments Stay Ahead of Fraud

The Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant AcquirersThe Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant AcquirersCognizant
 
Next generation payment technologies gain acceptance
Next generation payment technologies gain acceptanceNext generation payment technologies gain acceptance
Next generation payment technologies gain acceptanceDawn Kehr
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-securityKerri Lorch
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmIRJET Journal
 
Strong Authentication for Payments
Strong Authentication for PaymentsStrong Authentication for Payments
Strong Authentication for PaymentsSrivatsan Srinivasan
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Vesta Corporation
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The i-Capital Africa Institute
 
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...FT Partners / Financial Technology Partners
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQESQ Business Services
 
Digital Payment Market.pdf
Digital Payment Market.pdfDigital Payment Market.pdf
Digital Payment Market.pdfRenub Research
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxIsraaFadl
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?- Mark - Fullbright
 
Payments 2020: Banks & Payments
Payments 2020: Banks & PaymentsPayments 2020: Banks & Payments
Payments 2020: Banks & PaymentsMohit Kant
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsChristopher Uriarte
 
Payments & Infrastructure - Part II. Verifone
Payments & Infrastructure - Part II. VerifonePayments & Infrastructure - Part II. Verifone
Payments & Infrastructure - Part II. VerifoneOliver Grave
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTesth9gfhypx97
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Brunswick Group
 
REVISED DECEMBER 19, 2016 ©2014 by the Kellogg School of.docx
REVISED DECEMBER 19, 2016 ©2014 by the Kellogg School of.docxREVISED DECEMBER 19, 2016 ©2014 by the Kellogg School of.docx
REVISED DECEMBER 19, 2016 ©2014 by the Kellogg School of.docxronak56
 

Ähnlich wie Secure Payments Stay Ahead of Fraud (20)

The Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant AcquirersThe Internet of Things: A Prime Opportunity for Merchant Acquirers
The Internet of Things: A Prime Opportunity for Merchant Acquirers
 
Next generation payment technologies gain acceptance
Next generation payment technologies gain acceptanceNext generation payment technologies gain acceptance
Next generation payment technologies gain acceptance
 
key-trends-in-merchant-security
key-trends-in-merchant-securitykey-trends-in-merchant-security
key-trends-in-merchant-security
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning Algorithm
 
Strong Authentication for Payments
Strong Authentication for PaymentsStrong Authentication for Payments
Strong Authentication for Payments
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
 
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
FT Partners Research: Transaction Security - At the Nexus of E-Commerce, Paym...
 
ATM Fraud Prevention Management White Paper from ESQ
 ATM Fraud Prevention Management White Paper from ESQ ATM Fraud Prevention Management White Paper from ESQ
ATM Fraud Prevention Management White Paper from ESQ
 
Digital Payment Market.pdf
Digital Payment Market.pdfDigital Payment Market.pdf
Digital Payment Market.pdf
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 
Payments 2020: Banks & Payments
Payments 2020: Banks & PaymentsPayments 2020: Banks & Payments
Payments 2020: Banks & Payments
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
 
Payments & Infrastructure - Part II. Verifone
Payments & Infrastructure - Part II. VerifonePayments & Infrastructure - Part II. Verifone
Payments & Infrastructure - Part II. Verifone
 
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Credit Card Business Plan
Credit Card Business PlanCredit Card Business Plan
Credit Card Business Plan
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
 
REVISED DECEMBER 19, 2016 ©2014 by the Kellogg School of.docx
REVISED DECEMBER 19, 2016 ©2014 by the Kellogg School of.docxREVISED DECEMBER 19, 2016 ©2014 by the Kellogg School of.docx
REVISED DECEMBER 19, 2016 ©2014 by the Kellogg School of.docx
 

Mehr von Cognizant

Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Cognizant
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingCognizant
 
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesIt Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesCognizant
 
Intuition Engineered
Intuition EngineeredIntuition Engineered
Intuition EngineeredCognizant
 
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...Cognizant
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesCognizant
 
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility MandateThe Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility MandateCognizant
 
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...Cognizant
 
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Cognizant
 
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Cognizant
 
Green Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityGreen Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityCognizant
 
Policy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for InsurersPolicy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for InsurersCognizant
 
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalThe Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalCognizant
 
AI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to ValueAI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to ValueCognizant
 
Operations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachOperations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachCognizant
 
Five Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the CloudFive Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the CloudCognizant
 
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedGetting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedCognizant
 
Crafting the Utility of the Future
Crafting the Utility of the FutureCrafting the Utility of the Future
Crafting the Utility of the FutureCognizant
 
Utilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data PlatformUtilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data PlatformCognizant
 
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...Cognizant
 

Mehr von Cognizant (20)

Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
 
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesIt Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
 
Intuition Engineered
Intuition EngineeredIntuition Engineered
Intuition Engineered
 
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
 
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility MandateThe Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
 
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
 
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
 
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
 
Green Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityGreen Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for Sustainability
 
Policy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for InsurersPolicy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for Insurers
 
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalThe Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
 
AI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to ValueAI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to Value
 
Operations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachOperations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First Approach
 
Five Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the CloudFive Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the Cloud
 
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedGetting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
 
Crafting the Utility of the Future
Crafting the Utility of the FutureCrafting the Utility of the Future
Crafting the Utility of the Future
 
Utilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data PlatformUtilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data Platform
 
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
 

Secure Payments Stay Ahead of Fraud

  • 1. Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters Against a backdrop of growing vulnerability to fraud and breaches, merchants and card issuers must reinforce their secure payments infrastructure and processes, or risk losing customers to the competition. The best way forward is a layered approach in which commercial enterprises work with consumers to mitigate risk and improve fraud detection and prevention, our latest research reveals.
  • 2. 2 KEEP CHALLENGING January 2016 Executive Summary Amid the continuing cat-and-mouse game of fraudsters probing payment infrastructures for vulnerabilities, as well as the passage of the EMV1 chip card migration deadline, the payments industry continues its struggle to plug security gaps. Criminals have upped their game and are attacking organizations on multiple fronts, and finding new ways to exploit loopholes in new technologies, even as organizations embrace them. This has increased organizations’ risk exposure, undermined consumer confidence in merchants and issuers, and threatened the integrity of the global payments industry. To better understand the current state of payment security, we recently surveyed 509 U.S. consumers, 50 issuers and 52 merchants and acquirers. The survey findings were quite revealing: • Merchants have been slow to adopt technologies such as EMV, encryption and tokenization, even though these tools and techniques can enhance data security at various stages of the payment lifecycle. On the issuer side, the EMV shift is taking longer than expected due to large installed bases and the associated card replacement costs. Fewer than 50% of issuers said they would replace magnetic-stripe cards completely by the end of 2015. • Merchants (66%) and issuers (78%) believe that as online shopping increases, fraud will shift to card-not-present (CNP) transactions such as online and mobile commerce — regardless of EMV adoption — because criminals typically exploit new payments areas that offer the lowest resistance to fraud. • Card issuers and merchants admit to a lack of an in-depth understanding not only of the emerging vulnerabilities but also the solutions required to prevent new forms of fraud. They also expressed low confidence in existing processes and solutions that can prevent fraud and data breaches. As a result, they plan to employ technologies such as artificial intelligence and advanced analytics, in addition to empowering consumers with tools to monitor and control their cards/accounts effectively. • On the flip side, consumers exhibit less confidence in the payment security provided by merchants than that of issuers. They claim to be interested in taking charge of their card/account security and want to be better armed with tools to defend themselves against fraud. • Consumers also reaffirmed the conventional wisdom that they are reluctant to shop at stores affected by fraud or data breaches. On the card issuer side, more than 80% of consumers are likely to shift to a competitor if their account security is compromised. While merchants and issuers have put several security measures in place, a rapidly evolving payments landscape, combined with fraudsters’ increasing sophistication, warrants additional measures.
  • 3. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 3 Overall, the survey clarifies the key concerns of merchants, issuers and customers and paints a composite picture of the array of initia- tives underway to overcome security concerns (see Figure 1). While merchants and issuers have put several security measures in place, a rapidly evolving payments landscape, combined with fraud- sters’ increasing sophistication, warrants additional measures. We believe merchants and issuers should adopt a holistic approach that addresses all potential vulnerabilities and secures personal and transactional data throughout the payments lifecycle. For merchants, this involves adopting a layered security approach, using a combination of EMV, tokenization and encryption to protect “card-present” transactions, as well as applying multi-factor authen- tication and internal fraud prevention tools to secure CNP transac- tions. Issuers should continue to strengthen their fraud monitoring and prevention systems and consider centralizing their anti-fraud efforts, in addition to providing customers with mobile tools and apps to control their account/card usage. Merchants and issuers should take it upon themselves to increase fraud awareness by con- tinuously educating and communicating with customers.
  • 4. 4 KEEP CHALLENGING January 2016 Digital Invades the Payments Landscape A slew of technological innovations is sweeping the U.S. payments space, originat- ing from financial technology (fintech) companies, established technology giants and mobile phone carriers, as well as merchants, social media businesses and non- banking players. All are seeking a share of the $354 billion North American retail payments market.2 Players such as Apple, Google, PayPal and Venmo are pushing the envelope by introducing innovative solutions that offer quicker and less expen- sive payments and money transfers (P2P payments). In fact, Wall Street banks are investing heavily in upstart fintech companies, which are expected to gain $4.7  trillion in annual revenues from traditional financial services companies, according to Goldman Sachs estimates.3 Our study finds that merchants are beginning to support mobile payments (using technologies such as NFC, QR codes and beacons) for in-store payments. Apple Pay has established itself within a year of its launch (see Figure 2) as a go-to payments option. Nearly 60% of merchants said support of mobile payments was important or very important to their overall growth strategy. Currently, 44% of merchants support mobile payments, and 85% expect to do so by the end of 2016. Moreover, more merchants are planning to add mobile point-of-sale (PoS) capabili- ties in their stores. M-commerce and e-commerce merchants are also beginning to support mobile payments. Big banks, which had sat on the sidelines, are now gearing up to launch their own payment solutions (mobile wallets), in addition to supporting partners’ mobile wal- lets to provide customers with more choices. Our study reveals that about 54% of banks plan to offer mobile payment solutions (see Figure 3).
  • 5. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 5 Digital currencies and cryptocurrencies are gaining acceptance as demand increases for faster and lower cost global money transfers. Despite their question- able origins, inherent flaws and controversies, digital currencies such as Bitcoin are being positioned as solutions to some of the payments industry’s long-standing problems, such as the extended processing times typically associated with checks and credit cards. Digital currencies allow users to transfer money, as little as a penny at a time, anywhere in the world within minutes. These transactions do not involve banks, and users are typically charged a nominal fee.4 Digital currencies can offer merchants a range of benefits over credit and debit cards. These include:  Lower transaction fees. As there is no dependency on a trusted third-party, fees can be less than a dollar, compared with credit card fees of 2% to 5% and other charges.  Better transaction security. The use of cryptographic algorithms makes digital currencies more secure. Further, users do not need to disclose any personally identifiable information.  Faster transaction settlement and relief from costly chargebacks and purchase returns. This is possible because payments do not include credit card numbers or bank transactions. Another looming threat – and opportunity – is the emergence of the Internet of Things (IoT), which will lead to many connected devices and even wearables being equipped with payment capabilities. (For more on this topic, read our white paper “Gearing up for the Internet of Payments.”) For instance, MasterCard has launched a program to turn a vast array of consumer products, such as wristbands, key fobs and jewelry, into payment devices.5 Visa is working on a connected car solution that allows consumers to pay for fuel, food, parking, etc. from their vehicles.6 Microchip implantation in humans is already a reality, with individuals and employees (e.g., Sweden-based Epicenter) using them to operate equipment such as phones, com- puters and photocopiers, as well as unlock doors and pay for food. The IoT’s endless possibilities are set to radically change the way payments are made in the future. Rising Threat of Fraud and Data Breaches As merchants and issuers try to take advantage of the opportunities presented by the shifting payments landscape, they should be mindful of the lurking risks. Fraudsters are becoming increasingly sophisticated and are attacking merchants and issuers on many fronts. Cost of Fraud and Data Breaches The U.S. accounts for about 48% ($7.9 billion) of the global gross card fraud loss, although it represents only 21% ($6.2 trillion) of total card purchases.7 This is primarily due to the card industry’s continued dependence on older magnetic-stripe technology. This makes extracting sensitive card data easier for thieves who can use it to make CNP purchases and create counterfeit cards for card-present transactions. The average cost of fraud for merchants increased by 94% during 2014 through 2015, undercutting 1.32% of revenues.8 Criminals are also using malware to break into merchants’ networks and steal card and customer details stored in back-end databases. Recent high-profile data breaches involved the installation of malware at PoS terminals — most of which still run out- dated operating systems such as Windows XP — or database systems to copy large volumes of card data and customer records.9 The average data breach cost to U.S. businesses increased by about 10% from $5.85 million in 2014 to $6.53 million in 2015.10 Data breaches often lead to fraud, as criminals use stolen card data for pur- chases, as is reported to be the case at Home Depot.11
  • 6. 6 KEEP CHALLENGING January 2016 Chances of Switching Banks if Online Account Is Compromised Figure 5 Source: Cognizant Research Center Response Base: 509 Highly likely Likely No Do not know 30% 58% 6% 6% The impact of fraud and data breaches goes beyond hefty chargebacks, penal- ties, stolen customer data and goods, and other financial and operational costs. It causes irreparable damage to an organization’s reputation. Our study puts this in sharp relief.  Merchants affected by fraud or a data breach often struggle to regain customer trust. Consumers are particularly reluctant to return to merchants when their own data has been stolen (see Figure 4). In the case of banks, most customers are likely to switch to the competition if their online account is compromised (see Figure 5). CNP Fraud: Poised to Explode As the U.S. slowly adopts EMV to block card-present fraud, history reveals that fraud will shift to other payment channels with weaker defenses. CNP transactions are the obvious target because they only require a card number and CVV (card verification value) to make payments. While counterfeit card fraud declined by more than half in the UK from 2005 to 2008 after transitioning to EMV, the region also witnessed a 79% spike in CNP fraud in that timeframe. Canada, France and Australia witnessed similar spikes.12
  • 7. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 7 Thieves have increased cross-border fraud in the U.S., which involves using stolen card data to conduct fraudulent transactions in another country, either through counterfeit cards or online purchases. As more U.S. merchants embrace EMV tech- nology, which offers protection against counterfeit cards, CNP transactions are expected to become a bigger target for fraud. Moreover, as merchants support new payment approaches across physical and digi- tal channels, they are exposed to greater fraud risk. For instance, mobile payments accounted for just 14% of overall m-commerce transactions in 2014, but contrib- uted to 21% of total fraudulent transactions.13 Further, chargeback rates for CNP transactions are higher than card-present transactions, which increases fraud costs for e-commerce and m-commerce players. Our study reveals that about 78% of issuers and 66% of merchants believe CNP fraud will grow regardless of EMV adoption as virtual transactions increase and criminals hunt for new opportunities. Further, the growth in cross-border e-com- merce and new forms of payments are likely to increase CNP fraud. Fighting Fraud: Security Improvement Measures Recent instances of fraud and high-profile data breaches have served as a wakeup call for the payments industry, which has started taking serious measures to improve security. Along with accelerating the mandatory shift to EMV, the indus- try is focusing on encryption, tokenization and multi-factor authentication, along with a host of internal tools and controls to limit fraud and improve transactional security. Our research found that merchants and issuers are taking varying approaches to securing payments and shoring up their infrastructure and process vulnerabilities. Merchants Many merchants are implementing technologies such as EMV, tokenization and encryption to combat card-present fraud but are unprepared to deal with rapidly evolving CNP fraud.  EMV: The U.S. is the last major country to adopt EMV chip technology in its payment cards. EMV cards contain embedded chips that generate a one-time code required to approve a transaction when used at an EMV-enabled PoS terminal. This validates the integrity of the card and prevents fraud through counterfeit cards. Also, as of Oct. 1, 2015, merchants and issuers that have migrated to EMV are exempted from financial liability for any card-present fraud. » Adoption: Nearly 80% of acquirers are working with their merchants on EMV migration and are focused on high-risk segments, such as retail, gambling and hospitality. Educating merchants about the ramifications of liability shift and changes to chargeback processing is still a work in progress for many acquirers.  Encryption: Point-to-point encryption involves scrambling payment data as soon as it enters the PoS terminal to minimize exposure to sensitive data. The data is then sent via a secured network for processing, where it is decrypted by the payment processor securely without intermediaries. This protects data from hackers or other outsiders as it moves between various entities in the payments network. » Adoption: Nearly half of the merchants we surveyed have fully implemented encryption (see Figure 6, next page).
  • 8. 8 KEEP CHALLENGING January 2016 Merchants' Adoption of Tokenization Figure 7 Source: Cognizant Research Center Note: Percentages do not add up to 100 due to rounding. Response Base: 52 Don’t know 17% 27% In progress 19% Planning to implement 19% No plans 17% Fully implemented  Tokenization: Merchants store large amounts of card data in their back-end systems for reconciliation, chargebacks, customer service, loyalty schemes, etc., making these systems an attractive target for criminals. Even if merchants encrypt payment data, the key must be stored with the data, which exposes it to theft. Tokenization – which involves replacing sensitive cardholder data, such as permanent account numbers (PAN), with randomly generated alphanumeric characters (tokens) – greatly reduces the burden of storing sensitive data in-house. The merchant sends PAN data to a token service provider (TSP), which returns a non-sensitive token and stores the PAN in a highly secured database called a token vault. Merchants can use this token in place of the actual card numbers, so that even if thieves managed to steal the tokens, they would only find random numbers that are worthless outside the payments environment. » Adoption: About 46% of merchants surveyed have either fully implemented or are in the process of implementing tokenization (see Figure 7). On-premise solutions are the preferred deployment model for about half of merchants that have already implemented or are planning to implement tokenization (see Figure 8, next page). Terminal vendor solutions (36%) and product solutions implemented in-house (36%) are the preferred tokeniza- tion standards vs. acquirer or in-house developed solutions.
  • 9. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 9 Securing E-commerce and M-commerce Transactions The merchants we surveyed use various tools to prevent e-commerce and m-com- merce fraud (see Figure 9, next page). Address verification services (AVS) and card verification are still the most widely used solutions even for m-commerce, despite the fact that m-commerce and e-commerce pose very different fraud risks. Since CNP fraud is expected to increase, merchants and financial institutions must consider advanced and more reliable authentication solutions or multi-factor authentication, using tools such as device authentication and biometrics. However, these tools are not in wide use. For instance, biometrics has been adopted by only 5% of the e-commerce merchants we surveyed. Issuers Issuers are working to address card-present fraud by replacing magnetic-stripe cards with new EMV chip cards. They are also providing customers with mobile tools that enable better control over their card/account security.  EMV: The annual cost of counterfeit card fraud in 2015 was $3.6 billion.14 In the case of card-present fraud, issuers bear a larger share of fraud losses than merchants, which reinforces the need to quickly replace magnetic-stripe cards with EMV chip cards. However, issuers are replacing magnetic-stripe cards at a glacial pace due to high costs and a large customer base. Approximately 70% of issuers have replaced less than 25% of magnetic-stripe credit and debit cards with EMV cards, according to our research (see Figure 10, page 11). Only 42% of issuers indicated they will replace magnetic-stripe cards completely by year-end-2015, while another 38% said they plan to do so by year-end-2016. Many issuers are using more than one criterion for replacing magnetic-stripe cards with EMV chip cards. Only 42% said they are proactively replacing existing cards before they expire (see Figure 11, page 11).  Tokenization: Issuers have historically been wary of tokenization, as they believed the approach ceded too much control to card networks that also act as TSPs. They were also concerned about strong consumer brands (e.g., Apple, Google, etc.) coming between them and their customers in the emerging m-wallet space. However, the benefits of tokenization in reducing issuer and customer risk, as well as securing actual card data, appear to have mitigated issuer concerns. Our research finds that 64% of issuers are currently using tokenization. Visa/ MC/Amex tokenization approach is the preferred solution, followed by product solutions implemented in-house (see Figure 12, page 12).
  • 10. 10 KEEP CHALLENGING January 2016 Securing E-Commerce and M-Commerce Transactions While EMV will reduce card-present fraud, issuers must brace themselves for an onslaught of CNP fraud. Our research reveals that issuers plan to implement the latest fraud prevention solutions (i.e., artificial intelligence to improve fraud detec- tion) in the near future, along with traditional tools such as rules-based alerts and analytics to combat CNP fraud (see Figure 13, page 12).
  • 11. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 11 Issuers are already using various customer authentication methods to prevent CNP fraud, with device authentication being the most used (see Figure 14, next page). Adoption of solutions that offer better protection of CNP fraud, such as 3-D Secure and biometrics, is still very low. Empowering Customers In addition to investing in security improvements, 46% of the issuers we surveyed are trying to empower customers with more control over their cards/accounts. Techniques include mobile tools and apps that allow customers to switch cards on and off remotely, and providing mobile alerts to customers when they detect suspicious activity (see Figure 15, page 13). Among issuers offering such controls, 43% said a majority of their customers use them, and 48% report only partial adoption. Such tools can lead to improved loyalty, as noted by 75% of customer respondents, in addition to reducing the financial and security burden on banks.
  • 12. 12 KEEP CHALLENGING January 2016
  • 13. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 13 When asked who should be accountable for fraud, 54% of consumers indicated that banks and merchants are equally responsible. However, 30% of customer believe merchants alone are responsible. Confidence in Current Security Measures: A Reason to Worry Merchants and issuers believe they are inadequately prepared to deal with growing security threats. Only 37% of merchants are very confident of their current fraud and data breach solutions (see Figure 16, next page). Issuers are more confident in card fraud prevention solutions than in CNP fraud solutions (see Figure 17, next page), but overall confidence is still low. Further, 60% of issuers do not know whether their organization takes an integrated or siloed approach to fraud prevention that incorporates different fraud prevention solutions for different payment channels. When customers were asked how confident they were in the ability of issuers and merchants to protect sensitive data, 60% expressed high to very high confidence in issuers. When asked who should be accountable for fraud protection, about half (54%) of consum- ers placed equal responsibility on banks and merchants, while a third believe merchants alone are responsible (see Figure 18, next page). Interestingly, more customers are concerned about security when shopping on their mobile device than online and in physical stores (see Figure 19, page 15). Consumers affected by fraud indicated that issuers were more quick to respond than merchants (see Figure 20, page 15); in fact, nearly one-third said merchants did not respond at all. In addition to communicating with customers, issuers are also taking swift remedial measures, our survey finds. Following the recent Apple Pay fraud, 34% of issuers developed more stringent Apple Pay sign-up processes for customers adding cards; 46% said they are now working with mobile payment companies to improve security. Key Areas of Vulnerability Despite the adoption of EMV, tokenization and encryption to secure data across the transaction lifecycle (see Figure 21, page 15), data vulnerability still requires organizational attention (see Figure 22, page 16), whether because of technology limitations or improper implementation. For example, in 2011, criminals in Belgium rigged EMV chip cards to accept any PIN input, as well as talk to the card issuer to gain transaction authorization.15 Card data can still be stolen from non-EMV merchants, while lost or stolen EMV cards can be used to make purchases in physical stores, as many card issuers support customer signatures instead of a PIN.
  • 14. 14 KEEP CHALLENGING January 2016 Merchant Confidence in Processes and Solutions Used to Prevent Fraud and Data Breach Solutions Figure 16 Note: Percentages do not add to 100 due to rounding. Source: Cognizant Research Center Response Base: 52 Very confident Somewhat confident 37% 58% Not very confident 6% Customer Opinion on Who is More Accountable for Fraud Figure 18 Source: Cognizant Research Center Response Base: 509 Both equally Retailers/merchants Do not know 54% 30% 10% Banks 6% However, merchants that have not yet implemented any of the above technologies must review all the channels and links that carry card data and secure them using a holistic approach.
  • 15. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 15
  • 16. 16 KEEP CHALLENGING January 2016 A Holistic Approach to Addressing Payment Security Challenges Because the types of vulnerability in the payments ecosystem are both complex and evolving, it is imperative that merchants and issuers consider a holistic approach to address the risks. We suggest the following:  Merchants should adopt a layered security approach to prevent fraud and ensure secure payment data.  Issuers should continue to improve their fraud monitoring and detection measures by centralizing fraud prevention efforts, and deploying real-time and behavioral analytics.  Merchants and issuers should increase fraud awareness among cardholders by educating, empowering and engaging with them continuously. Merchant Strategy: A Layered Security Approach Because no single solution exists that offers complete protection, we believe mer- chants should fortify payment security with multiple lines of defense, culminating in a layered approach.  Securing card-present transactions. A layered approach to securing card-pres- ent transactions involves using EMV, tokenization and encryption. Organizations Assessing Vulnerabilities Transaction Phase Key Points of Vulnerability Pre-Authorization: Request initiated for transaction authorization.  PoS device: The physical device that captures payment card credentials in a physical store.  CNP channels: Virtual PoS, such as e-commerce websites, m-commerce apps, etc., that capture card credentials.  Mobile devices: Smartphones, tablets and other smart devices used to execute transactions and run apps that store and manage token creden- tials. Authorization Processing: Captured payment credentials transmitted from the PoS terminal to the issuer host for authorization. Transmission of data that is encrypted using symmetric encryption (which uses the same key to encrypt and decrypt data), as intruders who steal encryption keys can crack the encrypted data. Transmission of card data sent by merchants in clear form to a TSP for tokenization, as hackers can attempt to steal the clearly readable data. De-tokenization of payment tokens while they are sent to the issuer host for authorization, as it reveals a clear PAN, making it susceptible to theft. Post-Authorization and Back-Office Processing: Cardholder data stored in merchant systems. Card data held by merchants for batch settlement at the end of the day and stored in back-end databases for purposes such as chargebacks, marketing, customer loyalty programs, etc. Such systems are often targeted by thieves to gain access to large amounts of aggregated cardholder data. Source: Cognizant Research Center Figure 22
  • 17. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 17 Encrypting data at the PoS using point-to-point encryption can secure data against hackers while it travels between the merchant and processor. should take the plunge by complying with the technical and operational require- ments of PCI DSS.16 Although it does not guarantee complete protection – as seen in recent data breaches at merchants that adhered to PCI DSS guidelines – PCI DSS ensures a basic level of security and can form the foundation of a layered approach. The next level of defense — and the core component of this approach — is EMV adoption. When combined with PCI DSS, EMV can enhance the security of payments data that reaches merchants’ systems. However, data is exposed once it enters the merchant’s network. Encrypting data at the PoS using point-to-point encryption can secure data against hackers while it travels between the merchant and processor (data in transit). Topping these layers with a tokeni- zation solution – with token vault management provided by a sourcing partner rather than handled in-house – reduces the burden of managing sensitive data, vastly mitigating the fallout from data breaches (data at rest).  Securing CNP transactions. Because CNP fraud is more complex, criminals committing such fraud are considered to be more sophisticated. Using multi-factor authentication – a process of verifying the authenticity of customers using at least two inputs, such as card number, PIN and biometric factors – can mitigate CNP fraud to a large extent. Merchants should also consider device authentication to identify devices that customers normally use for shopping before sending the transaction for authorization. A case in point is Amazon’s multi-factor authentication, which requires customers to enter a code sent to their mobile device or generated by a smartphone authen- ticator app once they sign in with their existing username and password. This means thieves stealing a customer username and password would still require access to the mobile phone to log in. Enabling multi-factor authentication is a simple, one-time process. Customers can ask Amazon to remember each device, which will stop prompts for the code when that device is used. For PCs, the device refers to a specific browser (Chrome, Firefox, etc.). 3-D Secure adds a strong protective layer, as it requires cardholders to enter a static password (stored with the issuer) or a one-time password (generated by the issuer) sent to their mobile phones before paying for purchases. This can reduce chargebacks for merchants and shifts the liability to the issuer when a transaction is disputed. Merchants should note that adding multiple authentications can negatively impact customers’ ease of purchase, and force them to abandon the transaction or the merchant. Behavioral and real-time fraud analytics can help merchants better understand customer purchasing trends and patterns, and preempt fraud attempts effectively. Key Considerations Merchants should consider the cost and complexity of implementing the aforemen- tioned technologies. For instance:  A small merchant that is compliant with PCI DSS and that processes low-value purchases may face fewer chargebacks and counterfeit card issues and, therefore, should focus on encrypting data both in transit and at rest.  A large e-tailer may invest primarily in tokenization and strong customer authen- tication for safer online transactions.  Similarly, a large merchant facing counterfeit card threat should consider EMV and data encryption, as well as tokenization, if data is stored in-house.
  • 18. 18 KEEP CHALLENGING January 2016 Merchants should implement network segmentation to prevent hackers from moving horizontally within the network. When issuers integrate their risk management efforts in a centralized unit, they can better apply the intelligence gained from one channel or product to other risk areas, enabling them to more effectively quell threats and realize efficiencies. Merchants should focus on securing PoS terminals by using strong passwords rather than default ones, as well as restricting general Internet activity on PoS com- puter systems. They should also implement anti-virus software and update it regularly, as well as firewalls to isolate PoS systems from other networks. Another line of defense is to implement net- work segmentation to prevent hackers from moving horizontally within the merchant’s network. Merchants with an in-house token vault should use strong authen- tication to limit physical and virtual access to the vault. To mitigate the threat of data theft after de-tokenization, merchants should configure firewalls to restrict IP traffic and limit the number of applications that make de-tokenization requests to the token vault. Issuer Strategy: Centralize Fraud Risk Efforts Issuers responding to our survey indicated the prevalence of siloed approaches to fraud risk management, which can lead to redundant efforts, difficulty sharing risk information across departments, and the inability to gain a complete picture of the risks they face. When organizations integrate their disparate risk management efforts in a cen- tralized unit, they can better apply the intelligence gained from one channel or product to other risk areas, enabling them to more effectively quell threats and realize operational and cost efficiencies. Doing so requires organizations to consoli- date the large amounts of customer and transactional data residing within silos and identify customers uniquely across channels and interactions to provide a unified view. By combining organizational data with data from external sources such as social media, and leveraging advanced analytics, organizations can produce deep insights into customer behavior that can help them detect anomalies early in pur- chasing behavior. These insights can also be used to provide alerts to customers, such as location-based fraud warnings, and reduce false positives. Involve Customers In addition to bolstering security, training employees and build- ing an incident response team, merchants and issuers should also incorporate customers into their overall risk management efforts. We recommend that customers’ risky behaviors be continually studied and dealt with by employing a combination of the three Es:  Educate: Customers must be continuously educated on various forms of fraud, precautions that can protect mobile devices from rogue apps, malware, etc., and steps to take if they suspect fraud.  Empower: Empowering customers with tools that give them greater control over their accounts and improve security can go a long way toward improving confidence and driving traffic across channels. Issuers can provide mobile apps that allow customers to limit card spending in certain geographies, cap transaction limits, abort transactions, block and unblock cards, etc., which can mitigate fraud significantly.  Engage: Engaging customers through regular communication using relevant channels in post-incident management is critical to increasing customer confidence and ensuring customer loyalty.
  • 19. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 19 Research Methodology The survey was conducted online in the U.S. in July 2015, and included 509 customers, 50 issuers and 52 merchants and acquirers.
  • 20. 20 KEEP CHALLENGING January 2016
  • 21. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 21
  • 22. 22 KEEP CHALLENGING January 2016 References  “Beyond the Point of Sale: Six Steps to Stronger Retail Security,” SANS Institute, Nov. 5, 2015, https://www.sans.org/reading-room/whitepapers/analyst/point-sale-steps- stronger-retail-security-36102.  “Tokenization in Financial Services,” Financial Services Roundtable, Mar. 2015, http://fsroundtable.org/cto-corner-tokenization-financial-services/.  “Multi-Layered Security Strengthens Payment Structures: How to Prepare a Comprehensive Strategy,” Verifone, 2014, http://www.verifone.com/media/4041137/verifone-comprehensive-multilayered- security-white-paper.pdf.  “Tokenization Is the Way to Prevent E-commerce Security Breaches,” Network- World, Aug. 25, 2014, http://www.networkworld.com/article/2597398/tech-primers/tokenization-is- the-way-to-prevent-e-commerce-security-breaches.html.  “What Data Thieves Don’t Want You to Know: The Facts about Encryption and Tokenization,” First Data, 2012, https://www.firstdata.com/downloads/thought- leadership/TokenizationEncryptionWP.pdf.  “How to Enable Multifactor Security on Amazon,” Krebsonsecurity.com, Nov. 15, 2015, http://krebsonsecurity.com/2015/11/how-to-enable-multifactor-security-on- amazon/#more-33033.  “The Double-Edged Sword of Tokenization Helps Issuers But Also Poses a Subtle Threat,” Digital Transactions, Oct. 12, 2015, http://digitaltransactions.net/news/story/The-Double-Edged-Sword-of-Tokeniza- tion-Helps-Issuers-But-Also-Poses-a-Subtle-Threat.  “Tokenization: Benefits and Challenges for Securing Transaction Data,” Security Week, Nov. 4, 2014, http://www.securityweek.com/tokenization-benefits-and-challenges-securing- transaction-data. Note: All company names, trade names, copyrights and products referenced in this white paper are the property of their respective owners. No company referenced in this white paper sponsored this white paper or the contents thereof.
  • 23. SECURE PAYMENTS: HOW CARD ISSUERS AND MERCHANTS CAN STAY AHEAD OF FRAUDSTERS 23 Footnotes 1 EMV stands for the first initials of Europay, MasterCard and Visa, the three companies that created the standard. 2 “Global Payments 2015: Listening to the Customer’s Voice,” The Boston Consulting Group, Oct. 9, 2015, https://www.bcgperspectives.com/content/articles/financial-institutions-digital- economy-global-payments-2015-listening-customer-voice/. 3 “Why Wall Street Is Pouring Money into Companies that Want to Eat its Lunch,” Business Insider, Mar. 21, 2015, http://www.businessinsider.in/Why-Wall-Street-is-pouring-money-into-compa- nies-that-want-to-eat-its-lunch/articleshow/46640241.cms. 4 “Bitcoin and the Digital-Currency Revolution,” The Wall Street Journal, Jan. 23, 2015, http://www.wsj.com/articles/the-revolutionary-power-of-digital-cur- rency-1422035061. 5 “MasterCard Launches New Program that Can Turn any Consumer Gadget, Accessory or Wearable into a Payment Device,” MasterCard, Oct. 26, 2015, http://newsroom.mastercard.com/press-releases/mastercard-launches-new-pro- gram-that-can-turn-any-consumer-gadget-accessory-or-wearable-into-a-pay- ment-device/. 6 “The Connected Car: Visa Looks Ahead,” Visa, 2015, https://usa.visa.com/visa-everywhere/innovation/visa-connected-car.html. 7 “Global Card Fraud Losses Reach $16.31 Billion — Will Exceed $35 Billion in 2020, according to The Nilson Report,” BusinessWire.com, Aug. 4, 2015, http://www.businesswire.com/news/home/20150804007054/en/Global-Card- Fraud-Losses-Reach-16.31-Billion. 8 “2014 LexisNexis® True Cost of Fraud mCommerce: Merchants Struggle To Contain Rising Mobile Fraud Costs,” LexisNexis, Jan. 2015, http://lexisnexis.com/risk/downloads/whitepaper/true-cost-fraud-mobile-2014.pdf. 9 “The True Cost of Data Breaches in the Payments Industry,” Smart Card Alliance, Mar. 2015, http://www.emv-connection.com/downloads/2015/03/The-Cost-of-Data- Breaches.pdf. 10 “Average U.S. Organization Data Breach Cost 2006-2015,” Statista, 2015, http://www.statista.com/statistics/273575/average-organizational-cost- incurred-by-a-data-breach/. 11 “Data Breach at Home Depot Leads to Fraud,” Fortune, Sept. 23, 2014, http://fortune.com/2014/09/23/data-breach-at-home-depot-leads-to-fraud/. 12 “Card-Not-Present Fraud in a Post-EMV Environment: Combating the Fraud Spike,” Aite Group, 2014, http://www.emc.com/collateral/white-papers/card-not-present-fraud-post-emv- env-wp.pdf.  “Biohackers: Meet London's Living Synths Who Are Implanting Microchips into Their Own Bodies,” Evening Standard, Oct. 29, 2015, http://www.standard.co.uk/lifestyle/esmagazine/biohackers-meet-londons-living- synths-who-are-implanting-microchips-into-their-own-bodies-a3101646.html.
  • 24. 24 KEEP CHALLENGING January 2016 About the Authors Vaibhav Shirke is a chief architect with the cards and payments business within Cognizant’s Banking and Financial Services business unit. With over 20 years of experience and acting as a solution architect, he leverages strong domain knowl- edge to map industry standard solutions to changing market demands. Vaibhav leads the secure payments initiative within Cognizant and works very closely with leading financial institutions and merchants in helping them define a secure pay- ments roadmap. He can be reached at Vaibhav.Shirke@cognizant.com. Rajeshwer Chigullapalli is the General Manager of Cognizant Research Center and leads the unit’s fact-based thought leadership program. He has more than 20 years of experience in research and publishing and has published numerous whitepapers on topics across the banking and financial services industry and in other industry sectors. He can be reached at Rajeshwer.Chigullapalli@cognizant.com | linkedin. com/in/rajeshwer-chigullapalli-508a01a. Vinaya Kumar Mylavarapu is a Senior Research Associate with Cognizant Research Center, where he produces fact-based thought leadership across industries and sectors. He has more than 10 years of experience in business and industry research. Vinaya can be reached at Vinayakumar.Mylavarapu@cognizant.com | linkedin.com/ in/vinayakumarmylavarapu. Kamini Rajendran is Manager of Strategic Growth Opportunities within Cognizant’s Banking and Financial Services’ Payments Practice, a division focused on emerging trends in payments and establishing capabilities/ecosystems to sup- port partners. She has over 13 years of payments domain experience and leads the secure payments focus area across industry verticals. She can be reached at Kamini.Rajendran@cognizant.com. 13 “2014 LexisNexis® True Cost of Fraud mCommerce: Merchants Struggle to Contain Rising Mobile Fraud Costs,” LexisNexis, Jan. 2015, http://lexisnexis.com/risk/downloads/whitepaper/true-cost-fraud-mobile-2014.pdf. 14 “EMV Transition Will Still Leave Security Gaps,” Dell, Sept. 2015, https://powermore.dell.com/technology/emv-transition-will-still-leave-security- gaps/. 15 “How a Criminal Ring Defeated the Secure Chip-and-PIN Credit Cards,” Arstechnica.com, Oct. 20, 2015, http://arstechnica.com/tech-policy/2015/10/how-a-criminal-ring-defeated-the- secure-chip-and-pin-credit-cards/. 16 The Payment Card Industry Data Security Standard (PCI DSS) is a global standard for organizations accepting cards to protect customers’ payment card data throughout the transaction.
  • 25. World Headquarters 500 Frank W. Burr Blvd. Teaneck, NJ 07666 USA Phone: +1 201 801 0233 Fax: +1 201 801 0243 Toll Free: +1 888 937 3277 inquiry@cognizant.com European Headquarters 1 Kingdom Street Paddington Central London W2 6BD Phone: +44 (0) 207 297 7600 Fax: +44 (0) 207 121 0102 infouk@cognizant.com India Operations Headquarters #5/535, Old Mahabalipuram Road Okkiyam Pettai, Thoraipakkam Chennai, 600 096 India Phone: +91 (0) 44 4209 6000 Fax: +91 (0) 44 4209 6060 inquiryindia@cognizant.com © Copyright 2016, Cognizant. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the express written permission from Cognizant. The information contained herein is subject to change without notice. All other trademarks mentioned herein are the property of their respective owners. Codex: 1565 About Cognizant Research Services With over 100 analysts, Cognizant Research Center (CRC) offers a wide array of business, market and strat- egy research services across nearly every vertical indus- try. CRC specializes in research-as-a-service (RaaS), an end-to-end offering through which research is delivered via a range of models — from traditional full-time-equiv- alent-based, through “pay per use” services. Through RaaS, CRC primarily addresses the unevenly distributed research needs of marketing teams, on demand. Learn more by visiting www.cognizant.com/business-process- services/research-analytics. About Cognizant Banking and Financial Services Cognizant’s Banking and Financial Services business unit includes consumer lending, commercial finance, leasing insurance, cards, payments, banking, investment bank- ing, wealth management and transaction processing. It is the company’s largest industry segment, serving leading financial institutions in North America, Europe and Asia- Pacific, includinginclude six of the top 10 North Ameri- can financial institutions and nine of the top 10 European banks. The practice leverages its deep domain and con- sulting expertise to provide solutions across the entire financial services spectrum, and enables our clients to manage business transformation challenges, drive rev- enue and cost optimization, create new capabilities, mit- igate risks, comply with regulations, capitalize on new business opportunities, and drive efficiency, effective- ness, innovation and virtualization. For more, please visit http://www.cognizant.com/banking-financial-services.