Loading...

05 Apr 2026 00:18

Mobile & Digital

Mobile Payments and Security – Better Be Safe than Sorry

Mobile Payments and Security – Better Be Safe than Sorry

Mobile Payments and Security – Better Be Safe than Sorry

Mobile Payments and Security – Better Be Safe than SorryAny new technology is great, but it’s only as great as the security framework its’ built on. There’s no question that the rise of latest payment methods and technologies have brought convenience for everyone, but it has also raised concerns on security and the risk of usage – from the card holder to the merchants and the businesses that offer these services.

Merchants today have multiple payment acceptance channels for their disposal such as online payments, in store card payments, wallets and NFC. It comes as no surprise that the growth of smartphones have led it to become a focal point in today’s payments. In 2014, the number of connected mobile devices surpassed on Earth for the first time with explosive growth from zero to 7.2 billion mobile devices in just three decades.

It can be extremely difficult for mobile security to keep pace with such new innovations and use cases that are constantly emerging for these devices. According to a report from LexisNexis Risk Solutions Inc. m-commerce merchants saw a 70 percent spike in the revenue lost to fraud in 2014. Additionally, the report stated that more than one-fifth (21 percent) of all fraudulent transactions are attributed to the mobile channel.

On-Device Security

Smartphone apps are becoming popular among consumers and merchants to pay and to accept payments. The security of such on device apps should also be at par when it comes to protecting card data and cryptographic keys and functions. Most smartphones can be encrypted which makes them even more secure and inaccessible by other users. Additionally, the app must be robust, free from any outside modifications and hacks. Some service providers make it a point that the app doesn’t work on rooted devices.

The Card Switch

In an effort to improve security and reduce frauds, banks and credit card issuers have switched from magnetic strip-based cards to microchip-based cards. The Chip-and-PIN cards (EMV – Euro, MasterCard and Visa) have computer chips embedded in them making them less vulnerable to fraud for in-person transactions. Because EMV uses better data security, this standard is being adopted by more and more countries to fight cybercrime and their citizens.

The EMV cards have already been in use in Latin America, Europe, Canada, Asia Pacific, Africa and Middle East. Surprisingly, the United States has lagged behind many countries including India in adopting this fraud-reducing technology with only 7.5% of cards been EMV so far. A swift adoption expects more than half a billion of these EMV cards to be in use by the end of 2015.

Merchant Verification

Payment solution providers must take that extra care to make sure the merchants that are using their solutions are thoroughly checked and verified. Their onboarding process should include a brief compliance process to ensure that both the business and principal are good fits. During the pre-sales merchants must be required to fulfill the checklist given by the solution providers and complete KYC (Know Your Customer) documentation and risk verification has to be undertaken.

Once the merchants are on boarded their transactions should also be monitored to understand the transaction flow and nature of merchant business. By validating the first 10 transactions and high value transactions with the end-customer by making calls is a good practice. Moreover, regular merchant monitoring can help identify unusual and abnormal transactions based on the assigned threshold limits for the account.

Solution providers should also provide a comprehensive, fraud management system to identify, prevent, and protect against fraudulent transactions before it happens in Card-Present (CP) and Card-Not-Present (CNP) transactions.

Merchant Responsibilities

Merchants also have an important role in curtailing frauds by taking necessary measures in limiting their exposure to account data compromises and protecting their customer’s information. Merchants should not store any cardholder data that is not needed to run their business. In case of high valued transactions always cross check the cardholder data with the user. They must ensure all printed copies are physically secured for at least a year to handle charge back issues.

As the payment landscape changes (introduction of biometrics for payments), it has become even more important for payment companies to mitigate fraud and improve security. As the saying goes – prevention is better than cure, but it’s also a good thing to be alert and follow safe practices for your payments. As days go by, new and improved security measures are being developed to fight frauds, improve security and things should only get better.

 

Authored by V Krishna Kishore,Chief Operating Officer,Paynear Solutions Pvt. Ltd

(Visited 6 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisMPOGALAXYslot thailandAWSBEThttps://premium-soft.com/Consulta-Licencias/https://abc1131aa.com/kincir88Slot mahjongABC1131ABC1131 LOGINhttps://abc1131.hartanzah.com/https://www.abc1131.it.com/era77stc76e5 evolusi mahjong ways mengikuti tren interaksi digital moderne5 inovasi strategi permainan melalui data rtp hariane5 kajian mendalam mekanisme tumble mahjong ways dalam siklus kombinasi panjange5 kenaikan rtp mahjong ways hari ini picu perburuan pola terbaike5 kombinasi data rtp dan spin halus untuk konsistensi hasile5 lonjakan rtp mahjong ways hari ini bikin pola ini jadi favorite5 mahjong ways dalam pusaran transformasi interaksi digitale5 mahjong ways dan perubahan lanskap interaksi digital moderne5 memahami mekanisme scatter dan wild melalui analisis algoritmae5 memahami pola scatter dan wild lewat pendekatan algoritma moderne5 membandingkan model bisnis game lokal dan internasional dalam perkembangan industri digital indonesiae5 menggabungkan analisa rtp dengan teknik spin presisie5 mengupas mekanisme tumble mahjong ways dalam rangkaian kombinasi panjange5 mengurai pola scatter dan wild dengan pendekatan sistem algoritmae5 menyusuri perkembangan mahjong ways di era digital yang berubah cepate5 model bisnis game regional vs global tantangan dan peluang di pasar digital indonesiae5 optimalisasi rtp dengan teknik spin yang lebih terarahe5 optimalisasi strategi bermain dengan analisis rtp hariane5 pendekatan algoritma dalam membaca pola scatter dan wilde5 pendekatan rtp dan spin halus untuk hasil yang lebih stabilanatomi simbol wild insting strategis pemain elitsignifikansi formasi awal simbol navigasi sesistudi simbol premium mahjong ways 2 durasi sesimanajemen likuiditas internal target 70 jutalogika data intuisi visual mahjong wins 3 2026model adaptasi strategi berdasarkan pola permainan mahjong ways terkinipendekatan perilaku digital dalam memahami lonjakan tampilan mahjong waysscroll di waktu senggang mempertemukan mahjong ways 2 dengan penjelajah kontenpendekatan analitik dalam mengoptimalkan sistem mahjong ways berbasis pola multiplier digitalstrategi pola rahasia mahjong wild deluxe dadu sicbo gates of olympus taktik menang maximal rtp livepanduan lengkap strategi pola jitu rtp live mahjong ways 2 pgsoft baccarat starlight princesscara cerdas menang mahjong wins 3 pragmatic blackjack sweet bonanza teknik pola rtp live dan peluang jituoptimalkan teknik bermain mahjong ways 2 pgsoft roulette wild west gold dengan strategi polapola rtp live taktik patenteknik pintar mainh mahjong wins 3 pragmatic blackjack sugar rush sv388 analisa strategi dan pola efektifanalisa komprehensif peluang mahjong wild deluxe taktik dadu sicbo serta pola rtp live gates of olympusbedah taktik jitu analisa pola rtp live starlight princess teknik peluang baccarat dan strategi mahjong ways 2panduan profesional analisa peluang blackjack teknik pola mahjong wins 3 taktik strategi rtp live sweet bonanzarahasia veteran strategi analisa peluang roulette teknik pola mahjong ways 2 taktik rtp live wild bounty showdownbedah algoritma strategi rtp live sugar rush pola mahjong wins 3 pragmatic analisa peluang blackjack teknik taktik sv388aws free spin mahjong waysaws teknik spin mahjong winsaws rtp tengah malam starlightaws scatter konsisten mahjong waysaws pola gates olympus perkalianaws rtp malam wild banditoaws analisa agresif mahjong winsaws rtp scatter emas mahjong Top