Follow us on
Connect
Advertisement
 

3 Ways to Prevent Cybercriminals From Hijacking Your Holiday Mobile Sales

December 19, 2013 By Andreas Baumhof
Get the Flash Player to see this rotator.
 

Consumers should also create different logins and passwords for each account, and avoid using obvious phrases or information as passwords.   

2. Take a tailored approach to mobile security. Many retailers treat mobile devices as mini desktops and simply standardize security measures for both. Unfortunately, this is a flawed and potentially detrimental approach.

Just as a mobile website shouldn't be an exact replica of the desktop experience, mobile security requires its own set of specialized tactics. This includes implementing advanced device identification tools and ensuring back-end mobile app development processes never jeopardize security for speed-to-market. An effective security strategy will address the risks associated with mobile transactions without compromising user experience.    

3. Employ a comprehensive cybersecurity solution. The majority of attacks happen without consumers’ knowledge, which makes it critical for retailers to employ a sophisticated cybersecurity solution that offers comprehensive detection of suspicious and potentially fraudulent activity. 

An effective cybersecurity solution should leverage a global repository of fraud data to differentiate between authentic and suspicious mobile transactions and activity. It should also incorporate real-time analytics to evaluate the validity of logins, payments, new account registrations and remote access attempts. 

With mobile transactions on the rise this holiday shopping season, retailers must keep security top of mind. By understanding the unique threats cybercrime poses to mobile users and leveraging cutting-edge security technology, retailers can develop a comprehensive mobile strategy that doesn't compromise usability for security or vice versa.

Andreas Baumhof is the chief technology officer of ThreatMetrix, a provider of integrated cybercrime prevention solutions. Andreas can be reached at abaumhof@threatmetrix.com


 

SPONSORED CONTENT

MORE ON MOBILE >>

FROM THE BOOKSTORE

As important as email marketing is, being an expert at it is no easy task. But do not fret. Email Marketing 2014 provides the trends and best practices you need to follow. You'll find: 21 email trends charts featuring data from Who's Mailing What!Analysis of 11 effective cross-channel emails Best practices covering everything from email copywriting and design to data, metrics, CRM, deliverability and more4 email case studies Email Marketing 2014 Trends, Best Practices & Case Studies

As important as email marketing is, being an expert at it is no easy task. But do not fret. Email Marketing 2014 provides the trends and best practices you need to follow. You'll find: 21 email trends charts featuring data from Who's Mailing What!Analysis of 11 effective cross-channel emails Best practices...

ORDER NOW

A guide to delivering a better user experience through A/B testing: Offers best practices and lessons learned from over 100,000 experiments run by over 2,000 Optimizely customersDetails a roadmap for how to use A/B testing to personalize your customer's web experience and a practical guide to start A/B testing todayAuthors Dan Siroker and Pete Koomen are cofounders of Optimizely.com, an user-friendly testing system that more than 2,000 organizations use A/B Testing: The Most Powerful Way to Turn Clicks Into Customers

A guide to delivering a better user experience through A/B testing:
Offers best practices and lessons learned from over 100,000 experiments run by over 2,000 Optimizely customersDetails a roadmap for how to use A/B testing to personalize your customer's web experience and a practical guide to start A/B testing todayAuthors Dan...

ORDER NOW

 

COMMENTS

Click here to leave a comment...
Comment *
Most Recent Comments:

SUBSCRIBE TO eM+C Daily

Receive our FREE Daily
e-newsletter:
     Privacy Policy
 

RETAIL ONLINE INTEGRATION MAGAZINE:

Get Your FREE Subscription to Retail Online Integration:
July/August 2014
     Privacy Policy