Loading...

15 May 2026 10:52

Mobile & Digital

Mobile Payments and Security – Better Be Safe than Sorry

Mobile Payments and Security – Better Be Safe than Sorry

Mobile Payments and Security – Better Be Safe than Sorry

Mobile Payments and Security – Better Be Safe than SorryAny new technology is great, but it’s only as great as the security framework its’ built on. There’s no question that the rise of latest payment methods and technologies have brought convenience for everyone, but it has also raised concerns on security and the risk of usage – from the card holder to the merchants and the businesses that offer these services.

Merchants today have multiple payment acceptance channels for their disposal such as online payments, in store card payments, wallets and NFC. It comes as no surprise that the growth of smartphones have led it to become a focal point in today’s payments. In 2014, the number of connected mobile devices surpassed on Earth for the first time with explosive growth from zero to 7.2 billion mobile devices in just three decades.

It can be extremely difficult for mobile security to keep pace with such new innovations and use cases that are constantly emerging for these devices. According to a report from LexisNexis Risk Solutions Inc. m-commerce merchants saw a 70 percent spike in the revenue lost to fraud in 2014. Additionally, the report stated that more than one-fifth (21 percent) of all fraudulent transactions are attributed to the mobile channel.

On-Device Security

Smartphone apps are becoming popular among consumers and merchants to pay and to accept payments. The security of such on device apps should also be at par when it comes to protecting card data and cryptographic keys and functions. Most smartphones can be encrypted which makes them even more secure and inaccessible by other users. Additionally, the app must be robust, free from any outside modifications and hacks. Some service providers make it a point that the app doesn’t work on rooted devices.

The Card Switch

In an effort to improve security and reduce frauds, banks and credit card issuers have switched from magnetic strip-based cards to microchip-based cards. The Chip-and-PIN cards (EMV – Euro, MasterCard and Visa) have computer chips embedded in them making them less vulnerable to fraud for in-person transactions. Because EMV uses better data security, this standard is being adopted by more and more countries to fight cybercrime and their citizens.

The EMV cards have already been in use in Latin America, Europe, Canada, Asia Pacific, Africa and Middle East. Surprisingly, the United States has lagged behind many countries including India in adopting this fraud-reducing technology with only 7.5% of cards been EMV so far. A swift adoption expects more than half a billion of these EMV cards to be in use by the end of 2015.

Merchant Verification

Payment solution providers must take that extra care to make sure the merchants that are using their solutions are thoroughly checked and verified. Their onboarding process should include a brief compliance process to ensure that both the business and principal are good fits. During the pre-sales merchants must be required to fulfill the checklist given by the solution providers and complete KYC (Know Your Customer) documentation and risk verification has to be undertaken.

Once the merchants are on boarded their transactions should also be monitored to understand the transaction flow and nature of merchant business. By validating the first 10 transactions and high value transactions with the end-customer by making calls is a good practice. Moreover, regular merchant monitoring can help identify unusual and abnormal transactions based on the assigned threshold limits for the account.

Solution providers should also provide a comprehensive, fraud management system to identify, prevent, and protect against fraudulent transactions before it happens in Card-Present (CP) and Card-Not-Present (CNP) transactions.

Merchant Responsibilities

Merchants also have an important role in curtailing frauds by taking necessary measures in limiting their exposure to account data compromises and protecting their customer’s information. Merchants should not store any cardholder data that is not needed to run their business. In case of high valued transactions always cross check the cardholder data with the user. They must ensure all printed copies are physically secured for at least a year to handle charge back issues.

As the payment landscape changes (introduction of biometrics for payments), it has become even more important for payment companies to mitigate fraud and improve security. As the saying goes – prevention is better than cure, but it’s also a good thing to be alert and follow safe practices for your payments. As days go by, new and improved security measures are being developed to fight frauds, improve security and things should only get better.

 

Authored by V Krishna Kishore,Chief Operating Officer,Paynear Solutions Pvt. Ltd

(Visited 7 times, 1 visits today)
peri hokiperihokiduta76duta 76AWSBEThttps://sintnicolaasschool.com/https://abc1131aa.com/kincir88cakar76Slot mahjonghttps://www.abc1131.it.com/stc76aws micro engagement ai multiplier mahjongaws perspektif pemain winrate historisaws wild multiplier mahjong pgsoft intensaws durasi sesi scatter hitam turboaws perhitungan waktu algoritma bandito rtpaws pola rahasia simbol premium mahjongaws analisis kuantitatif simbol premium mahjongaws presisi data algoritma scatter mahjongaws transformasi rtp stabil pgsoft datamekanisme transisi simbol gold silver mahjong ways 2evolusi paylines dampak volatilitas mahjong wins 3probabilitas fitur scatter hitam ritme engine mahjonglogika akumulasi multiplier kemenangan mahjong ways 2evaluasi stabilitas rtp respon server mahjong wins 3mahjong wins pola scatter wildkajian scatter hitam mahjong wins 3aws formula mahjong detail spin terbaruaws interval spin scatter hitam mahjongaws konsistensi lucky neko ekspektasi realistisaws investigasi multiplier starlight princess kombinasiaws mindset pengguna rtp live mahjongaws validasi pola sweet bonanza rtpaws pergeseran rtp pgsoft lonjakan trenaws riset algoritma rtp pragmatic massifaws strategi fenomenal wildbandito harianlogika engine algoritma scatter hitam terbaruhubungan chain reaction multiplier mahjong ways 2perbandingan struktur engine mahjong wins 3 ways 2rahasia transisi simbol emas pg soft mahjongfaktor latensi server respon mahjong wins 3arsitektur strategi analisa pola mahjong wild deluxe logika sicbo kalkulasi gates of olympus slot onlineintelegensia permainan analisa pola presisi starlight princess teknik transisi baccarat mahjong ways 2 pgsoft kasino onlineprotokol elite optimalisasi teknik probabilitas blackjack ekosistem mahjong wins 3 pragmatic sweet bonanzasinopsis teknikal algoritma wild west gold taktik cerdas mahjong ways 2 pgsoft roulette rtp liveprotokol profit analisa pola transisi mahjong wins 3 prgmatic eskalasi peluang sugar rush sv388 blackjackaws evolusi spamspin live rtp mahjongaws gamechanger rtp live mahjongwinsaws kalkulasi ai mahjong terstrukturaws kondisi optimal scatter premium mahjongaws konsistensi strategi aman mahjong2aws logika putaran bonus konsistenaws monitoring rtp ekosistem mahjongwinsaws optimalisasi kestabilan mahjong konsistensiaws scatter berjejer koigate aiaws strategi multiplier gates olympus stabilssss1ss2ss3ss4ss5ss6ss7sinkronisasi rtp live peluang teknik sicbo analisa pola mahjong wild deluxe strategi gates of olympusanalisa teknik strategi mahjong ways 2 pgsoft taktik baccarat pola peluang rtp live starlight princessstrategi hibrida analisa peluang teknik blackjack pola taktik mahjong wins 3 pragmatic rtp live sweet bonanzaarsitektur peluang analisa strategi roulette taktik pola mahjong ways 2 pgsoft teknik rtp live wild west goldsinergi analisa peluang strategi mahjong wins 3 pragmatic teknik sugar rush taktik sv388 rtp livemetodologi analisa rtp live mahjong wild deluxe taktik dadu sicbo pola peluang paten gates of olympustaktik manajemen peluang analisa pola mahjong ways 2 pgsoft teknik baccarat strategi rtp live starlight princessmetrik akurat analisa peluang blackjack taktik strategi mahjong wins 3 pragmatic teknik pola rtp live sweet bonanzakonvergensi analisa kemenangan strategi peluang roulette taktik pola mahjong ways 2 pgsoft teknik rtp live wild west goldoptimalisasi momentum pola strategi sugar rush analisa mahjong wins 3 pragmatic teknik peluang sv388taktik cerdas pola mahjong wild deluxe teknik dadu sicbo strategi gates of olympus rtp live tertinggistrategi sinkronisasi probabilitas analisa rtp live starlight princess teknik mahjong ways 2 pgsoft pola taktik baccaratformula pola silang teknik analisa blackjack strategi pola mahjong wins 3 pragmatic taktik peluang rtp live sweet bonanzamanipulasi momentum teknik strategi roulette analisa pola mahjong ways 2 pgsoft taktik peluang rtp live wild west goldmetodologi cerdas taktik rtp live sugar rush analisa pola mahjong wins 3 pragmatic strategi peluang sv388investigasi algoritma smart tumble mahjong ways 2mekanisme rng scatter hitam mahjong terbaruanalisis multiplier volatilitas mahjong wins 3anatomi frekuensi gold frame mahjong wayssinkronisasi engine visual mahjong wins 3luckyneko turbospin multiplier terupdatescatter berlapis mahjongwins polascatter hitam turbospin probabilitasvalidasi kredibilitas sweetbonanza rtpwild probabilitas multiplier mahjongai microengagement multiplier mahjongwinsanalisa sistematis wildbandito otomisasihistoris multiplier gates perspektifintensitas spin starlight konsistensymbolstutter multiplier gatesolympusdata putaran starlight scatterdata spin pgsoft rng scatterinteraksi pengguna luckyneko komunitasspinotomatis pragmatic putaran konsistenstatistik simbol ekspektasi akurat Top