SlideShare ist ein Scribd-Unternehmen logo
1 von 9
5 BEST PRACTICE TIPS
for E-commerce Merchants to

Protect Payments
So you're selling your products
and services online? GREAT
Just make sure the payment
data you're collecting
doesn't get compromised, or
your profits will!
TIP 1

Deploy SSL (Secure Socket Layer)

SSL is a protocol used on the web for:

Encrypting website data so that
data sent from the browser to the
server and back is protected

Authenticating your website so
visitors know you are who
you say you are

HTTPS = HTTP with SSL
TIP 2

Protect your IT environment

Deploy a firewall solution to
protect your applications,
databases and web servers

Deploy intrusion-detection
systems/intrusion-prevention
systems (IDS/IPS)

Train technical staff to properly
manage security including firewalls,
digital certificates, and SSL encryption
TIP 3

Authenticate your customers
Request Credit Verification Value (CVV)
information in addition to Primary Account
Number and expiration date

Consider using 3D Secure (Verified by Visa,
MasterCard SecureCode) if you process risky
transactions. It is mandatory in some countries,
highly recommended in others, and enables
fraud liability shift to the issuing banks.
(you will not be liable in case of fraud, your
customer’s bank will be)
TIP 4

Deploy fraud management solutions
Create simple fraud rules
- Create exception rules for transactions if there is no Address
Verification Service (AVS) match

- Use white/black lists
- Determine if you should reject transactions from a defined BIN
range (specific card brands) or originating from certain IP
location address/range (specific countries)

Create more complex rules and utilize new innovative
solutions
- Device identification (device fingerprinting)
- Statistical models

- Sophisticated rules engine, combining industry white/black lists,
with custom rules to match your business and statistical models
TIP 5

Protect sensitive data if you need to store it

If you store customer profile data to enable
an easier checkout process
- Do not store the credit card number, instead
request a token from your Payment Service
Provider
- Only display the last 4 digits of the card in the
customer profile, not the full card/token
- Never store the Credit Verification Value – ask
your customer to enter their CVV when they
complete the check-out process
Final Thoughts
An easy way to secure sensitive
customer data is to use a Payment
Gateway offering a Hosted Payment
Page or API with direct post
capabilities to capture payment data
and process the payment.

However, you still need to
take extra measures to
protect your customers’
data and to stay compliant
with the PCI-DSS.
Thank you for viewing
this presentation!
For more information:
Call
Email
Visit
Engage

1.866.853.3845
sales@merchantlink.com
www.merchantlink.com
www.merchantlink.com/blog

Weitere ähnliche Inhalte

Andere mochten auch

CPITN survey at Kolhapur district
CPITN survey at Kolhapur districtCPITN survey at Kolhapur district
CPITN survey at Kolhapur districtombaghele
 
Riigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriisRiigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriisKristjan Eljand
 
Amca winter 2012
Amca winter 2012Amca winter 2012
Amca winter 2012AMCABoard
 
AMCA Info 2014
AMCA Info 2014AMCA Info 2014
AMCA Info 2014AMCABoard
 
CPITN survey at Nagpur district
CPITN survey at Nagpur districtCPITN survey at Nagpur district
CPITN survey at Nagpur districtombaghele
 
Ridge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeriesRidge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeriesombaghele
 
Embriología faringe laringe
Embriología faringe laringeEmbriología faringe laringe
Embriología faringe laringeAdriana Furlong
 

Andere mochten auch (7)

CPITN survey at Kolhapur district
CPITN survey at Kolhapur districtCPITN survey at Kolhapur district
CPITN survey at Kolhapur district
 
Riigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriisRiigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriis
 
Amca winter 2012
Amca winter 2012Amca winter 2012
Amca winter 2012
 
AMCA Info 2014
AMCA Info 2014AMCA Info 2014
AMCA Info 2014
 
CPITN survey at Nagpur district
CPITN survey at Nagpur districtCPITN survey at Nagpur district
CPITN survey at Nagpur district
 
Ridge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeriesRidge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeries
 
Embriología faringe laringe
Embriología faringe laringeEmbriología faringe laringe
Embriología faringe laringe
 

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

5 Best Practice Tips for E-commerce Merchants to Protect Payments

  • 1. 5 BEST PRACTICE TIPS for E-commerce Merchants to Protect Payments
  • 2. So you're selling your products and services online? GREAT Just make sure the payment data you're collecting doesn't get compromised, or your profits will!
  • 3. TIP 1 Deploy SSL (Secure Socket Layer) SSL is a protocol used on the web for: Encrypting website data so that data sent from the browser to the server and back is protected Authenticating your website so visitors know you are who you say you are HTTPS = HTTP with SSL
  • 4. TIP 2 Protect your IT environment Deploy a firewall solution to protect your applications, databases and web servers Deploy intrusion-detection systems/intrusion-prevention systems (IDS/IPS) Train technical staff to properly manage security including firewalls, digital certificates, and SSL encryption
  • 5. TIP 3 Authenticate your customers Request Credit Verification Value (CVV) information in addition to Primary Account Number and expiration date Consider using 3D Secure (Verified by Visa, MasterCard SecureCode) if you process risky transactions. It is mandatory in some countries, highly recommended in others, and enables fraud liability shift to the issuing banks. (you will not be liable in case of fraud, your customer’s bank will be)
  • 6. TIP 4 Deploy fraud management solutions Create simple fraud rules - Create exception rules for transactions if there is no Address Verification Service (AVS) match - Use white/black lists - Determine if you should reject transactions from a defined BIN range (specific card brands) or originating from certain IP location address/range (specific countries) Create more complex rules and utilize new innovative solutions - Device identification (device fingerprinting) - Statistical models - Sophisticated rules engine, combining industry white/black lists, with custom rules to match your business and statistical models
  • 7. TIP 5 Protect sensitive data if you need to store it If you store customer profile data to enable an easier checkout process - Do not store the credit card number, instead request a token from your Payment Service Provider - Only display the last 4 digits of the card in the customer profile, not the full card/token - Never store the Credit Verification Value – ask your customer to enter their CVV when they complete the check-out process
  • 8. Final Thoughts An easy way to secure sensitive customer data is to use a Payment Gateway offering a Hosted Payment Page or API with direct post capabilities to capture payment data and process the payment. However, you still need to take extra measures to protect your customers’ data and to stay compliant with the PCI-DSS.
  • 9. Thank you for viewing this presentation! For more information: Call Email Visit Engage 1.866.853.3845 sales@merchantlink.com www.merchantlink.com www.merchantlink.com/blog