Page 39 - GS180301
P. 39

Education





            able to be analyzed for risk as-      10. Real-time data orchestration: For online games and gaming, reduced
            sessment and slows down fraud-        data available within a transaction (for example, lack of delivery/ship-to
            sters (without overburdening le-      address) can result in insufficient information to precisely quantify risk.
            gitimate players), causing fraud-     Accessing third-party data sources in real time can provide crucial context,
            sters to move on to easier targets.   helping to correctly evaluate borderline transactions.

            5. Multiple stages: Put checks in     11. Experienced human intelligence:  Systems developed and tuned by
            place throughout the buying path      fraud industry experts have an inherent advantage against adaptable
            ‒ during account registration, be-    human adversaries.
            fore authorization, at authoriza-
            tion and post-authorization to        12. Strategic representments: Rich data collected by enterprise-class fraud
            provide more  opportunities  to       prevention systems can provide powerful evidence during representment,
            identify fraudsters.                  whether combating innocent friendly fraud or malicious digital shoplifting.

            6.  Double  authentication:  Re-  For more details on combating online gaming fraud, download Kount's ebook
            quire PINs and/or confirmation    at http://info.kount.com/ebooks/level-up-your-profits-and-beat-fraud.
            by text message to thwart fraud-
            sters possessing limited compro-  Don Bush joined Kount as Director of Marketing in October 2010 and became Vice President of
            mised account data.
                                              Marketing in December 2012. Previously, he was Director of Marketing at CradlePoint, a leading
            7. Chargeback alerts:  Electronic   manufacturer of wireless routing solutions in the mobile broadband industry. Don has worked in
            notification from chargeback      several management roles within the technology segment for over 20 years with both hardware/
            alert services warn you immedi-   software manufacturers and as a partner in two top technology marketing agencies. Contact him
            ately whenever a TC-40 (fraud)    at don.bush@kount.com or visit www.kount.com.
            claim is issued, allowing busi-
            nesses to take remedial steps, in-
            cluding suspending the account
            and/or notifying the actual user,
            issuing a refund and avoiding
            chargeback fees and fines, and
            using data to identify other fraud
            instances perpetrated by the at-
            tacker.

            8. All payment types: Fraud pre-
            vention shouldn't be limited by
            the payment, processor or trans-
            action types it can assess. Wheth-
            er processing credit and debit
            cards, payment services like Pay-
            Pal, international payment pro-
            viders or cryptocurrencies like
            bitcoin, your ability to assess and
            quantify fraud danger should
            never be compromised.

            9. Device and channel neutral-
            ity: Whether an order originates
            on desktop, mobile, phone or fax,
            the same multilayered approach
            and multiple screening technolo-
            gies  should  be  applied  ‒  while
            still  providing customization
            that  facilitates optimized results
            based on the unique attributes of
            that channel.





                                                                                                                39
   34   35   36   37   38   39   40   41   42   43   44