Page 39 - GS180301
P. 39
Education
able to be analyzed for risk as- 10. Real-time data orchestration: For online games and gaming, reduced
sessment and slows down fraud- data available within a transaction (for example, lack of delivery/ship-to
sters (without overburdening le- address) can result in insufficient information to precisely quantify risk.
gitimate players), causing fraud- Accessing third-party data sources in real time can provide crucial context,
sters to move on to easier targets. helping to correctly evaluate borderline transactions.
5. Multiple stages: Put checks in 11. Experienced human intelligence: Systems developed and tuned by
place throughout the buying path fraud industry experts have an inherent advantage against adaptable
‒ during account registration, be- human adversaries.
fore authorization, at authoriza-
tion and post-authorization to 12. Strategic representments: Rich data collected by enterprise-class fraud
provide more opportunities to prevention systems can provide powerful evidence during representment,
identify fraudsters. whether combating innocent friendly fraud or malicious digital shoplifting.
6. Double authentication: Re- For more details on combating online gaming fraud, download Kount's ebook
quire PINs and/or confirmation at http://info.kount.com/ebooks/level-up-your-profits-and-beat-fraud.
by text message to thwart fraud-
sters possessing limited compro- Don Bush joined Kount as Director of Marketing in October 2010 and became Vice President of
mised account data.
Marketing in December 2012. Previously, he was Director of Marketing at CradlePoint, a leading
7. Chargeback alerts: Electronic manufacturer of wireless routing solutions in the mobile broadband industry. Don has worked in
notification from chargeback several management roles within the technology segment for over 20 years with both hardware/
alert services warn you immedi- software manufacturers and as a partner in two top technology marketing agencies. Contact him
ately whenever a TC-40 (fraud) at don.bush@kount.com or visit www.kount.com.
claim is issued, allowing busi-
nesses to take remedial steps, in-
cluding suspending the account
and/or notifying the actual user,
issuing a refund and avoiding
chargeback fees and fines, and
using data to identify other fraud
instances perpetrated by the at-
tacker.
8. All payment types: Fraud pre-
vention shouldn't be limited by
the payment, processor or trans-
action types it can assess. Wheth-
er processing credit and debit
cards, payment services like Pay-
Pal, international payment pro-
viders or cryptocurrencies like
bitcoin, your ability to assess and
quantify fraud danger should
never be compromised.
9. Device and channel neutral-
ity: Whether an order originates
on desktop, mobile, phone or fax,
the same multilayered approach
and multiple screening technolo-
gies should be applied ‒ while
still providing customization
that facilitates optimized results
based on the unique attributes of
that channel.
39