Stopping the Post-EMV Surge in Online Fraud

Stopping the Post-EMV Surge in Online Fraud

The predicted increase in online fraud in the U.S. has arrived with the adoption of chip card technology (also known as EMV).

According to data from ACI Worldwide, while online transactions grew in the U.S. by 12 percent, there was a 43 percent increase in online fraud. This spike has been expected, given what was seen in the countries that have already implemented EMV. They experienced a significant reduction in counterfeit card fraud, while online fraud spiked dramatically.

The end of 2016 saw nearly 1.81 million merchants in the U.S. switch to accepting EMV chip cards, more than double the year previous.  Experts therefore expect the online fraud figure to continue to rise as even more offline retailers adopt EMV for use in point-of-sale (POS) transactions. As fraudsters are shut out of the in-store channel by EMV, they turn their attention to the online one. Thieves are becomingly increasingly sophisticated in the area, now using fully automated bots to place fraudulent orders using stolen customer data.

Such personal data is now in abundant supply on the black market due to wide-scale data breaches at large retailers and financial institutions. According to Javelin, the number of identity-theft victims rose to a record 15.4 million last year from 13.1 million in 2015. The use of automated botnets to commit online fraud in the U.S. increased by 47% between Q3 2015 and Q2 2016 according to PYMNTS.com. That figure is even higher for orders involving luxury goods—an increase of 87% during the same period.

To fend off these attacks, businesses continue to seek technology to help them stem the tide. Juniper predicts online retailers and financial institutions will increase spending by 30 percent on fraud prevention solutions, hitting $9.2 billion annually by 2020.

Reducing Online Fraud Without Friction

The greatest asset in online payment—the high speed and volume it enables—is also potentially its weakest point. It’s clear the prevention of fraud requires a more thorough review of transactions before they are processed but, at the same time, adding friction to slow down and reduce purchasing volume is not an acceptable solution for either businesses or consumers.

Retailers and other enterprises need the means to protect those transactions from fraud, while still maintaining a positive customer experience. Fortunately, there is a method of tightening security in online purchases that does not introduce friction or otherwise slow down transactions. Through the use of software, retailers can collect information from the device being used to place an order to better assess transaction riskiness and identify potential fraudsters. By noting geographical and time attributes, plug-ins, IP addresses, and other relevant information contained within the device, merchants can better uncover high-risk indicators and establish the device’s trustworthiness.

Armed with this information, online merchants can more precisely identify the bots and other fraudulent techniques and prevent fraudsters from placing orders while continuing to deliver outstanding service to their genuine customers. No friction needs to be added to the ordering process at all. In this system, retailers get the best of both worlds—fast transactions that effectively lock out the fraudsters.

With the widespread adoption of EMV in the U.S., the surge in online fraud is coming. Fortunately, the solution to it is out there and it is only up to retailers to seize it.  


About the Author

Michael Lynch is the Chief Strategy Officer at InAuth.

Featured

  • Survey: 84 Percent of Healthcare Organizations Spotted Cyberattack in Last 12 Months

    Netwrix, a vendor specializing in cybersecurity solutions focused on data and identity threats, surveyed 1,309 IT and security professionals globally and recently released findings for the healthcare sector based on the data collected. It reveals that 84% of organizations in the healthcare sector spotted a cyberattack on their infrastructure within the last 12 months. Phishing was the most common type of incident experienced on premises, similar to other industries. Read Now

  • Keynote Speakers Announced for ISC West 2025

    ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), unveiled its 2025 Keynote Series. Featuring a powerhouse lineup of experts in cybersecurity, retail security, and leadership, each keynote will offer invaluable insights into the challenges and opportunities transforming the field of security. Read Now

    • Industry Events
    • ISC West
  • Study: Video Doorbells Have a 71% Service Attach Rate

    Parks Associates recently announced a new white paper, Consumer IoT Product Development: Managing Costs, Optimizing Revenues, which provides companies with a business-planning blueprint to evaluate how a consumer IoT solution will perform across its lifetime. Subscription services, such as video storage and professional monitoring, can be critical for covering ongoing cloud and support costs Read Now

  • Michigan City Fights Retail Crime With AI-Powered Video Surveillance, 911 Camera Sharing

    To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Read Now

Featured Cybersecurity

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3