Premium Content

Access "Ezzie Schaff: Fighting online fraud requires delicate balance"

Published: 19 Oct 2012

I've been battling online fraud for a decade and the job doesn't get any easier. The fraudsters are continually looking for new ways to deceive and steal, requiring constant vigilance. In the past, fraudsters were easier to spot, such as someone in another country ordering an international shipment. Today, sophisticated fraudsters are using tactics likes spoofing their IP addresses and using U.S.-based shippers. Every day, we're up against new schemes. What may have worked to fight fraud even just a year or two ago can quickly become ineffective. At Ice.com, where we sell high-ticket jewelry items that cost anywhere from $50 to $50,000, we have to be especially on guard. In retail, jewelry usually commands a higher street value, making it particularly attractive to criminals. While you can't completely eliminate fraud, you can minimize it. One countermeasure we've found to be highly successful in beating back fraud is knowledge-based authentication (KBA). We use the technology to verify the identities of customers calling into our call center with high-risk ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Does Windows 8.1 meet the demands of the BYOD age?
    windows_shopping_8-1.png
    E-Handbook

    The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...

  • Application security policy after Heartbleed
    ISM_0914.png
    E-Zine

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...

  • Devising a security strategy for the modern network
    countering_cybercrime.png
    E-Handbook

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...