Mobile Security : 5 Ways Retailers Can Protect Mobile Transactions From FraudApril 2013 By Andreas Baumhof
Mobile retail sales grew at an exponential rate in 2012, and the channel shows no signs of slowing down this year. In fact, mobile transactions are expected to top $1 trillion worldwide by 2017. If anything, mobile commerce is poised to become even more firmly entrenched in the marketplace as retailers gear up to provide consumers with more enhanced mobile shopping experiences.
However, the rapid expansion of the mobile channel is also bringing to light a new slate of challenges and risks into the retail landscape, including the daunting task of securing mobile transactions from an evolving array of cyber threats designed to capture sensitive data from customers and brands.
Assessing the Mobile Threat
The most common mobile security threats have been adapted from proven cybercrime techniques in the financial and e-commerce markets. Like the crooks in other channels, mobile cybercriminals capture credit card numbers, gift card data and other sensitive customer information. The effectiveness of mobile-based cyber attacks is supported by a misperception that mobile devices are more secure than other platforms.
Mobile Security Tips for Retailers
Although mobile is a less mature channel than traditional e-commerce, retailers need to give mobile transactions the same priority and due diligence as other online transactions. By incorporating the following tips into your mobile commerce strategy, you can dramatically improve transaction security and prevent an erosion of trust within your customer base:
1. Unified security approach: Mobile is an extension of e-commerce, not a segregated and distinct business unit. To defend against sophisticated cyber attacks, implement a unified security system capable of managing both mobile and other online transactions. All mobile transactions should be funneled through the same back-end security system as desktop/laptop transactions, and mobile access points should be monitored just as throughly as every other connection channel.