Page 40 - GS180901
P. 40

Education




                                     Safeguarding loyalty


                                  and rewards programs





                                                               After all, that's what fraudsters do, turn stolen goods and
                                                               services into cash as often and as quickly as they can.

                                                               Financial professionals regularly remind the public that
                                                               they should check their bank and credit card accounts daily.
                                                               It is only through such regular checks that accountholders
                                                               can spot fraudulent activity and act on it before it is too late.


                                                               Safeguarding rewards programs
                                                               Here are the three main factors businesses should consider
                                                               in keeping rewards programs safe:
                                                                     1. Keep the data safe: Minimize the amount of cus-
                                                                     tomer data collected. Loyalty schemes, if hacked, can
                                                                     lead to identity theft of your customers.

                                                                     2. Educate members: Loyalty points have a cash val-
        By Don Bush                                                  ue and should be treated with the same care as bank
        Kount Inc.                                                   and credit card accounts.
                                                                     3. Keep watch for fraudulent loyalty point transac-
                    ost companies prioritize the security of pay-    tions: The indicators of CNP fraud – such as new or
                    ment and transaction information over that       changed login credentials, changing or adding ad-
                    of loyalty and rewards programs. But don't       dresses, different Internet service provider address-
        M be fooled – anything of monetary value is fair             es, irregular spending patterns and testing on small
        game to criminals.                                           items before going for the big-ticket items – are all
                                                                     present for loyalty fraud too. Many of the techniques
        Loyalty and rewards programs are a huge draw for             used to fight CNP fraud can help fight loyalty fraud.
        consumers, encouraging them to spend money to get future
        benefits and discounts. Many save up points to use for a   Following are best practices for protecting loyalty accounts:
        big trip or purchase, making those points an extremely
        valuable asset. And, often, these loyalty accounts are       1. Advanced  screening technologies: Technologies
        extremely vulnerable to fraudsters looking to turn points    like device fingerprinting, geo-location, and proxy
        into cash.                                                   piercing provide a first line of defense. Using them,
                                                                     companies can know that consumers are who they
        There is an estimated $225 to $350 billion in loyalty        say they are, are where they say they are and are us-
        programs, which are commonly used by merchants in            ing the accounts they're entitled to use in a legitimate
        many industries. Thirty-four percent of consumers only       manner.
        log into their accounts every few months; only 23 percent
        check account balances even once a month, providing a        2. Machine learning: Computers have unlimited
        huge window of opportunity for fraudsters to operate for     capacity for finding the patterns that reveal suspi-
        weeks undetected.                                            cious "needles" worthy of greater scrutiny in an ever-
                                                                     expanding haystack of transactions, while avoiding
        How exactly do criminals access these accounts? Loyalty      unnecessary consumer interactions. This can help
        fraud tends to work along the same lines as card-not-present   protect accounts and the user experience.
        (CNP) fraud, with criminals gaining access through a mixture
        of phishing scams, identity theft and hacking weak email/    3.  Order  linking:  Fraudsters  will  use  multiple  ac-
        password combinations. Once criminals have these points,     counts and devices to make dozens or even hundreds
        they spend them, combine them with other accounts, sell      of fraudulent redemptions and/or combine points
        them or use them to receive an item that can be resold for cash.    into accounts to earn prizes of greater value. That's



        38
   35   36   37   38   39   40   41   42   43   44   45