Retail Online Integration

You will be automatically redirected to retailonlineintegration in 20 seconds.
Skip this advertisement.

Advertisement
Follow us on
Connect
Advertisement
 

3 Ways to Prevent Cybercriminals From Hijacking Your Holiday Mobile Sales

December 19, 2013 By Andreas Baumhof
Get the Flash Player to see this rotator.
 

Consumers should also create different logins and passwords for each account, and avoid using obvious phrases or information as passwords.   

2. Take a tailored approach to mobile security. Many retailers treat mobile devices as mini desktops and simply standardize security measures for both. Unfortunately, this is a flawed and potentially detrimental approach.

Just as a mobile website shouldn't be an exact replica of the desktop experience, mobile security requires its own set of specialized tactics. This includes implementing advanced device identification tools and ensuring back-end mobile app development processes never jeopardize security for speed-to-market. An effective security strategy will address the risks associated with mobile transactions without compromising user experience.    

3. Employ a comprehensive cybersecurity solution. The majority of attacks happen without consumers’ knowledge, which makes it critical for retailers to employ a sophisticated cybersecurity solution that offers comprehensive detection of suspicious and potentially fraudulent activity. 

An effective cybersecurity solution should leverage a global repository of fraud data to differentiate between authentic and suspicious mobile transactions and activity. It should also incorporate real-time analytics to evaluate the validity of logins, payments, new account registrations and remote access attempts. 

With mobile transactions on the rise this holiday shopping season, retailers must keep security top of mind. By understanding the unique threats cybercrime poses to mobile users and leveraging cutting-edge security technology, retailers can develop a comprehensive mobile strategy that doesn't compromise usability for security or vice versa.

Andreas Baumhof is the chief technology officer of ThreatMetrix, a provider of integrated cybercrime prevention solutions. Andreas can be reached at abaumhof@threatmetrix.com


 

SPONSORED CONTENT

MORE ON MOBILE >>

FROM THE BOOKSTORE

As important as email marketing is, being an expert at it is no easy task. But do not fret. Email Marketing 2014 provides the trends and best practices you need to follow. You'll find: 21 email trends charts featuring data from Who's Mailing What!Analysis of 11 effective cross-channel emails Best practices covering everything from email copywriting and design to data, metrics, CRM, deliverability and more4 email case studies Email Marketing 2014 Trends, Best Practices & Case Studies

As important as email marketing is, being an expert at it is no easy task. But do not fret. Email Marketing 2014 provides the trends and best practices you need to follow. You'll find: 21 email trends charts featuring data from Who's Mailing What!Analysis of 11 effective cross-channel emails Best practices...

ORDER NOW

Build a High-Impact, Low-Hassle Digital Sales Prospecting System That Works!Discover the “invisible funnel,” where self-educated buyers are making decisions before you know they existLeverage Funnel Optimized website design to identify your prospects’ key challenges before you ever speak to themIntegrate social media, content, and email to optimize the entire prospecting processMake every sales call count with behaviorally targeted email prospectingLeverage Twitter, Facebook, and LinkedIn to efficiently “prospect at scale”And more! Invisible Sale: How to Build a Digitally Powered Marketing and Sales System to Better Prospect, Qualify and Close Leads

Build a High-Impact, Low-Hassle Digital Sales Prospecting System That Works!
Discover the “invisible funnel,” where self-educated buyers are making decisions before you know they existLeverage Funnel Optimized website design to identify your prospects’ key challenges before you ever speak to themIntegrate social media, content, and email to optimize the entire prospecting...

ORDER NOW

 

COMMENTS

Click here to leave a comment...
Comment *
Most Recent Comments:

SUBSCRIBE TO DirectMarketingIQ Insider

Receive our FREE
e-newsletter:
     Privacy Policy
 

RETAIL ONLINE INTEGRATION MAGAZINE:

Get Your FREE Subscription to Retail Online Integration:
March/April 2014 Issue
     Privacy Policy