Can you spot the honest customer… …from the fraudster? Presentation by: Alex Bowes, Corporate Sales Manager, 192.com Business Services.

Slides:



Advertisements
Similar presentations
By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Advertisements

Cross Border E-commerce: Challenges and Opportunities
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
New Products for the Public Sector The products that will change your work life Presented by: Derek O’Halloran Date: 14 th June 2007.
Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
IIA Fraud Seminar, Thursday 22 nd January 2009 Card Fraud Update Presented by: Úna Dillon, Head of Card Services, Irish Payment Services Organisation.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
Address Verification Service (AVS). Introduction Introduction o The internet Address Verification System (I-AVS) is a business service for resolving the.
Facts, Issues, and Considerations 7 May 2008 Steven Barnett Identity Theft.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
FIT3105 Security and Identity Management Lecture 1.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
1 Mon. December 3, 2001A Secure National ID Card Group 8 Chris Marinak Mike Cuvelier Adam Sowers Saud Bangash.
Do Now: Banking Basics By the end of this block you should have an understanding of personal banking services and how they can benefit you.
Ecommerce Applications 2009/10 Session 31 E-Commerce Applications E-payment.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
Identifying and recording big prize winners Keeping a register of winners Checking the exact identity of online gaming customers In-depth review of all.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Wireless Password: ONLINE GAMING / GAMBLING KNOW - YOUR - CUSTOMER AND RISK MANAGEMENT.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Defining Security Issues
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
BUSINESS B1 Information Security.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Identity theft: Real or Virtual? By: Alex Metzler.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Identity theft By Joey Pawoll. intro DeterDetectDefend.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Be Cautious of Identity Theft By: Sydney Langley.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Direct Debits in Europe The merchants perspective DRF Europe April 25-26, Basel Ronald Wallroth GlobalCollect Sven krahn Lycos.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Profits, Right Before Your Eyes. Instant Image Verification.
Identity Theft: Protect Yourself By Rachel Gaines.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
| Inspection Service Revenue Protection Program 1 Revenue Protection Program US Postal Inspection Service Mailers Technical Advisory Committee November.
1 Activities ACTIVITY 1: Why Do You Need a Bank? ACTIVITY 2:The Many Services of a Bank ACTIVITY 3: The ABCs of a Checking Account ACTIVITY 4: Opening.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
OBJECTIVE Understanding process and timelines for Vodafone customer orders.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
Managing False Information NiiBen C. A. Ayivorh AML/CFT Consultant Nii-Int’l L.L.C.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Fraud and the internet Sandra Peaston Assistant Director, Insight Cifas, The UK’s Fraud Prevention Service.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
By Brooke Rogers Identity theft is the act of acquiring and collecting a persons information with the intent of using it for criminal purposes. Identity.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Updating Address Records. The Preferred method for updating Address information is for the Person to login to WebAdvisor, access the User Account Menu…
Monty Faidley Director, Market Planning The Iowa story 3.
Identity Theft It’s a crime!
Nick Mothershaw - Experian
Regular Payments First and Subsequent Payments
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Manchester City Council Trading Standards & Manchester Markets
Jack J. Bensimon Countering Identity Theft and Synthetic Identities:
European Citizens’ Initiative, Commission regulation proposal Focus on IT aspects Jérôme Stefanini DIGIT.B.2 05/06/2018.
Subject Access Request Online Form
Federal Reserve Retail Payments Risk Forum
Protecting Your Company’s Most Valuable Asset
Clemson University Red Flags Rule Training
Presentation transcript:

Can you spot the honest customer… …from the fraudster? Presentation by: Alex Bowes, Corporate Sales Manager, 192.com Business Services

Agenda Strategic Objectives Trend Analysis Key Aspects Offline vs Online Who are the fraudsters? Online Verification Online Options Compliance Best Practice

Strategic Objectives Identify and protect your customers Deter and detect fraudsters Increase transaction levels with legitimate customers Increase profits – reduce risk

Trend Analysis Source: APACS UK Fraud Losses in £ Millions 2004 vs % -45% -22% -25% +21% £0M £20M £40M £60M £80M £100M £120M £140M £160M £180M £200M CNP Counterfeit Stolen/Lost Mail Non- Receipt ID Theft

Deterrence Investigation Fraudsters Customers Profits & Risk Systems PeopleProcesses Key Aspects…

Offline vs Online OfflineOnline Physical e.g.’s Vigilence Detectives e.g.’s Encryption Firewalls Identity e.g. photo IDse.g.’s Name + address D.O.B I.P. Validation Neural Networks

Who are the fraudsters? Organised across borders –Use a computer in Africa, –With a European IP address –And US credit card Sophisticated –With timing and source of fraud times Persistent –1 in 100 transactions is still worth it

Online Verification… Data Characteristics –Name, Address (Bill to / Ship to) –DOB, Mortality Document Details –Passports, Drivers License Personal Characteristics –Voice Recording –Biometric

Compliance… Regulators already impacting online gaming When will attention be re-focused on age- restricted products sold online –Alcohol sales –18+ DVD sales & rentals –Weapons & knives

Best Practice… Are larger retailers more prone to fraud? If the fraudsters are organised, then we need to be too. To shut them down completely rather than allow them to migrate. Communication and organisation between retailers and partners is the key.

To beat the fraudster… Ensure your systems are up to speed –But future proof for tougher checks, DOB checks, etc Be better organised than the criminals –Sharing information with peer group

Questions? Alex Bowes Corporate Sales Manager 192.com Business Services Mobile: +44 (0)