04.10.2016 Views

PCM Vol.2 - Issue 4

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Following the regular and high profile<br />

breaches of companies, personal<br />

credentials have flooded the dark web,<br />

ready to be bought up by the next<br />

criminal gang. These myriad pieces of<br />

personal information can be stitched<br />

together with data from further attacks<br />

to build convincing identity profiles that<br />

easily defeat static identity checking<br />

systems.<br />

Fraud and authentication issues now<br />

have a broad impact on a business’<br />

bottom-line. Merchants need to balance<br />

friction with user experience. Protecting<br />

the identities of users and employees<br />

means ensuring that only legitimate<br />

users gain access to the business<br />

platform.<br />

Do you see criminal activity such<br />

as fraudulent new accounts,<br />

unauthorized account access and<br />

card-not-present transactions as a<br />

greater threat to enterprise or the<br />

average consumer?<br />

These criminal activities impact both the<br />

enterprise and the customers involved.<br />

I believe that we are now living in a<br />

world where access to digital services<br />

is now an integral part of one’s daily<br />

life. The impact of a potential attack on<br />

a merchant is mostly financial, unless<br />

they have been involved in a large-scale<br />

breach or have been targeted by an<br />

organized gang. In that case, there are<br />

downstream brand impacts that the<br />

business has to deal with.<br />

Consumer impact, however, is more<br />

personal. In many cases, the consumers<br />

may be protected from the financial<br />

loss but the non-financial impacts<br />

can be severe and far-reaching. We<br />

fundamentally believe that the end<br />

users don’t differentiate between a<br />

network security failure or an account<br />

authentication failure, they simply care<br />

about the negative and far-reaching<br />

consequences of fraud. It is up to<br />

businesses to adopt robust fraud and<br />

security strategies that protect their<br />

end users, as well as secure their<br />

own revenue and growth. Users are<br />

increasingly demanding friction-free<br />

online experiences while expecting<br />

their transactions to be safe and<br />

secure. Businesses must ensure that the<br />

protection they put in place doesn’t end<br />

up creating a barrier to doing business.<br />

What can consumers do to protect<br />

sensitive data and what should<br />

they do if their account details are<br />

exposed?<br />

Consumers need to be aware of where<br />

they have left their digital footprints and<br />

personal credentials. Leaving seemingly<br />

benign but critical sensitive data on<br />

public sites is probably one of the biggest<br />

mistakes that an average consumer<br />

makes (taking a quiz on social media<br />

and giving permission to the app without<br />

realizing, or joining a free Wi-Fi network<br />

in a public area and giving permissions,<br />

for example). These seemingly unrelated<br />

data points are being stitched together<br />

by the fraudsters to sign up for services,<br />

make purchases or request instant<br />

loans.<br />

In the event that one’s account details<br />

are exposed, it is crucial to go back and<br />

change the password and other critical<br />

information on all sites and apps.<br />

How does leveraging the collective<br />

power of your global client base assist<br />

in enterprise risk mitigation?<br />

Cybercriminals have been fast to<br />

leverage the network effect and selforganize<br />

to exploit lax security and weak<br />

fraud prevention solutions. We believe<br />

that it takes a network to fight a network.<br />

ThreatMetrix offers businesses a single<br />

fraud and security solution consisting<br />

of several tightly integrated fraud<br />

prevention technologies that support<br />

robust user authentication without<br />

adding friction. The ThreatMetrix<br />

platform includes multiple forms of<br />

device identity, malware protection,<br />

web threat protection, reputation and<br />

behavioral analytics.<br />

The ThreatMetrix Digital Identity<br />

Network is the foundation of our<br />

solution and leverages anonymized<br />

global shared intelligence from daily<br />

consumer interactions including logins,<br />

payments and new account originations.<br />

The Network harnesses real-time shared<br />

intelligence from billions of transactions<br />

collected against tens of thousands of<br />

The cybercriminals’ technical mechanisms are intricate.<br />

011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!