SlideShare a Scribd company logo
1 of 9
5 BEST PRACTICE TIPS
for E-commerce Merchants to

Protect Payments
So you're selling your products
and services online? GREAT
Just make sure the payment
data you're collecting
doesn't get compromised, or
your profits will!
TIP 1

Deploy SSL (Secure Socket Layer)

SSL is a protocol used on the web for:

Encrypting website data so that
data sent from the browser to the
server and back is protected

Authenticating your website so
visitors know you are who
you say you are

HTTPS = HTTP with SSL
TIP 2

Protect your IT environment

Deploy a firewall solution to
protect your applications,
databases and web servers

Deploy intrusion-detection
systems/intrusion-prevention
systems (IDS/IPS)

Train technical staff to properly
manage security including firewalls,
digital certificates, and SSL encryption
TIP 3

Authenticate your customers
Request Credit Verification Value (CVV)
information in addition to Primary Account
Number and expiration date

Consider using 3D Secure (Verified by Visa,
MasterCard SecureCode) if you process risky
transactions. It is mandatory in some countries,
highly recommended in others, and enables
fraud liability shift to the issuing banks.
(you will not be liable in case of fraud, your
customer’s bank will be)
TIP 4

Deploy fraud management solutions
Create simple fraud rules
- Create exception rules for transactions if there is no Address
Verification Service (AVS) match

- Use white/black lists
- Determine if you should reject transactions from a defined BIN
range (specific card brands) or originating from certain IP
location address/range (specific countries)

Create more complex rules and utilize new innovative
solutions
- Device identification (device fingerprinting)
- Statistical models

- Sophisticated rules engine, combining industry white/black lists,
with custom rules to match your business and statistical models
TIP 5

Protect sensitive data if you need to store it

If you store customer profile data to enable
an easier checkout process
- Do not store the credit card number, instead
request a token from your Payment Service
Provider
- Only display the last 4 digits of the card in the
customer profile, not the full card/token
- Never store the Credit Verification Value – ask
your customer to enter their CVV when they
complete the check-out process
Final Thoughts
An easy way to secure sensitive
customer data is to use a Payment
Gateway offering a Hosted Payment
Page or API with direct post
capabilities to capture payment data
and process the payment.

However, you still need to
take extra measures to
protect your customers’
data and to stay compliant
with the PCI-DSS.
Thank you for viewing
this presentation!
For more information:
Call
Email
Visit
Engage

1.866.853.3845
sales@merchantlink.com
www.merchantlink.com
www.merchantlink.com/blog

More Related Content

Viewers also liked

CPITN survey at Kolhapur district
CPITN survey at Kolhapur districtCPITN survey at Kolhapur district
CPITN survey at Kolhapur districtombaghele
 
Riigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriisRiigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriisKristjan Eljand
 
Amca winter 2012
Amca winter 2012Amca winter 2012
Amca winter 2012AMCABoard
 
AMCA Info 2014
AMCA Info 2014AMCA Info 2014
AMCA Info 2014AMCABoard
 
CPITN survey at Nagpur district
CPITN survey at Nagpur districtCPITN survey at Nagpur district
CPITN survey at Nagpur districtombaghele
 
Ridge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeriesRidge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeriesombaghele
 
Embriología faringe laringe
Embriología faringe laringeEmbriología faringe laringe
Embriología faringe laringeAdriana Furlong
 

Viewers also liked (7)

CPITN survey at Kolhapur district
CPITN survey at Kolhapur districtCPITN survey at Kolhapur district
CPITN survey at Kolhapur district
 
Riigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriisRiigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriis
 
Amca winter 2012
Amca winter 2012Amca winter 2012
Amca winter 2012
 
AMCA Info 2014
AMCA Info 2014AMCA Info 2014
AMCA Info 2014
 
CPITN survey at Nagpur district
CPITN survey at Nagpur districtCPITN survey at Nagpur district
CPITN survey at Nagpur district
 
Ridge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeriesRidge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeries
 
Embriología faringe laringe
Embriología faringe laringeEmbriología faringe laringe
Embriología faringe laringe
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

5 Best Practice Tips for E-commerce Merchants to Protect Payments

  • 1. 5 BEST PRACTICE TIPS for E-commerce Merchants to Protect Payments
  • 2. So you're selling your products and services online? GREAT Just make sure the payment data you're collecting doesn't get compromised, or your profits will!
  • 3. TIP 1 Deploy SSL (Secure Socket Layer) SSL is a protocol used on the web for: Encrypting website data so that data sent from the browser to the server and back is protected Authenticating your website so visitors know you are who you say you are HTTPS = HTTP with SSL
  • 4. TIP 2 Protect your IT environment Deploy a firewall solution to protect your applications, databases and web servers Deploy intrusion-detection systems/intrusion-prevention systems (IDS/IPS) Train technical staff to properly manage security including firewalls, digital certificates, and SSL encryption
  • 5. TIP 3 Authenticate your customers Request Credit Verification Value (CVV) information in addition to Primary Account Number and expiration date Consider using 3D Secure (Verified by Visa, MasterCard SecureCode) if you process risky transactions. It is mandatory in some countries, highly recommended in others, and enables fraud liability shift to the issuing banks. (you will not be liable in case of fraud, your customer’s bank will be)
  • 6. TIP 4 Deploy fraud management solutions Create simple fraud rules - Create exception rules for transactions if there is no Address Verification Service (AVS) match - Use white/black lists - Determine if you should reject transactions from a defined BIN range (specific card brands) or originating from certain IP location address/range (specific countries) Create more complex rules and utilize new innovative solutions - Device identification (device fingerprinting) - Statistical models - Sophisticated rules engine, combining industry white/black lists, with custom rules to match your business and statistical models
  • 7. TIP 5 Protect sensitive data if you need to store it If you store customer profile data to enable an easier checkout process - Do not store the credit card number, instead request a token from your Payment Service Provider - Only display the last 4 digits of the card in the customer profile, not the full card/token - Never store the Credit Verification Value – ask your customer to enter their CVV when they complete the check-out process
  • 8. Final Thoughts An easy way to secure sensitive customer data is to use a Payment Gateway offering a Hosted Payment Page or API with direct post capabilities to capture payment data and process the payment. However, you still need to take extra measures to protect your customers’ data and to stay compliant with the PCI-DSS.
  • 9. Thank you for viewing this presentation! For more information: Call Email Visit Engage 1.866.853.3845 sales@merchantlink.com www.merchantlink.com www.merchantlink.com/blog