PCM Vol.2 - Issue 4
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Following the regular and high profile<br />
breaches of companies, personal<br />
credentials have flooded the dark web,<br />
ready to be bought up by the next<br />
criminal gang. These myriad pieces of<br />
personal information can be stitched<br />
together with data from further attacks<br />
to build convincing identity profiles that<br />
easily defeat static identity checking<br />
systems.<br />
Fraud and authentication issues now<br />
have a broad impact on a business’<br />
bottom-line. Merchants need to balance<br />
friction with user experience. Protecting<br />
the identities of users and employees<br />
means ensuring that only legitimate<br />
users gain access to the business<br />
platform.<br />
Do you see criminal activity such<br />
as fraudulent new accounts,<br />
unauthorized account access and<br />
card-not-present transactions as a<br />
greater threat to enterprise or the<br />
average consumer?<br />
These criminal activities impact both the<br />
enterprise and the customers involved.<br />
I believe that we are now living in a<br />
world where access to digital services<br />
is now an integral part of one’s daily<br />
life. The impact of a potential attack on<br />
a merchant is mostly financial, unless<br />
they have been involved in a large-scale<br />
breach or have been targeted by an<br />
organized gang. In that case, there are<br />
downstream brand impacts that the<br />
business has to deal with.<br />
Consumer impact, however, is more<br />
personal. In many cases, the consumers<br />
may be protected from the financial<br />
loss but the non-financial impacts<br />
can be severe and far-reaching. We<br />
fundamentally believe that the end<br />
users don’t differentiate between a<br />
network security failure or an account<br />
authentication failure, they simply care<br />
about the negative and far-reaching<br />
consequences of fraud. It is up to<br />
businesses to adopt robust fraud and<br />
security strategies that protect their<br />
end users, as well as secure their<br />
own revenue and growth. Users are<br />
increasingly demanding friction-free<br />
online experiences while expecting<br />
their transactions to be safe and<br />
secure. Businesses must ensure that the<br />
protection they put in place doesn’t end<br />
up creating a barrier to doing business.<br />
What can consumers do to protect<br />
sensitive data and what should<br />
they do if their account details are<br />
exposed?<br />
Consumers need to be aware of where<br />
they have left their digital footprints and<br />
personal credentials. Leaving seemingly<br />
benign but critical sensitive data on<br />
public sites is probably one of the biggest<br />
mistakes that an average consumer<br />
makes (taking a quiz on social media<br />
and giving permission to the app without<br />
realizing, or joining a free Wi-Fi network<br />
in a public area and giving permissions,<br />
for example). These seemingly unrelated<br />
data points are being stitched together<br />
by the fraudsters to sign up for services,<br />
make purchases or request instant<br />
loans.<br />
In the event that one’s account details<br />
are exposed, it is crucial to go back and<br />
change the password and other critical<br />
information on all sites and apps.<br />
How does leveraging the collective<br />
power of your global client base assist<br />
in enterprise risk mitigation?<br />
Cybercriminals have been fast to<br />
leverage the network effect and selforganize<br />
to exploit lax security and weak<br />
fraud prevention solutions. We believe<br />
that it takes a network to fight a network.<br />
ThreatMetrix offers businesses a single<br />
fraud and security solution consisting<br />
of several tightly integrated fraud<br />
prevention technologies that support<br />
robust user authentication without<br />
adding friction. The ThreatMetrix<br />
platform includes multiple forms of<br />
device identity, malware protection,<br />
web threat protection, reputation and<br />
behavioral analytics.<br />
The ThreatMetrix Digital Identity<br />
Network is the foundation of our<br />
solution and leverages anonymized<br />
global shared intelligence from daily<br />
consumer interactions including logins,<br />
payments and new account originations.<br />
The Network harnesses real-time shared<br />
intelligence from billions of transactions<br />
collected against tens of thousands of<br />
The cybercriminals’ technical mechanisms are intricate.<br />
011