can’t be wrong.
Insights. Updates. Stories.
Delivered directly to you.
Last post we learned about what exactly is a chargeback versus a refund and what is a regular chargeback procedure. Today we are going to dive a little deeper into chargebacks, discussing their legality, the industry average for chargebacks and differences and similarities of chargeback orders.Read More
“Can I get a refund?” – A question that no retailer wants to hear, the automatic guarantee of a refund by a merchant has become ingrained into 21st century America. From expensive jewelry to small ticket items, purchased in person or over the web, the ability to return goods to merchants in exchange for a customers money back goes almost unquestioned. But many merchants do not wish to offer refunds over frustrations of the costs involved. When a customer cannot obtain a refund directly from a merchant, they begin the process called a chargeback. In a perfect business world there would be no refunds, no chargebacks. But we are inhabitants of an imperfect world working in an imperfect marketplace, and chargebacks happen all the time. Why they happen, how they happen and what to do about it is going to be covered in this three part series.Read More
We have all stumbled across that email name which has given us pause. Aside from possibly preventing individuals from getting a job, there are several serious issues that come with a non standard email name. While a typical email account might consist of firstname.lastname@example.org, email@example.com or firstname.lastname@example.org, an email account such as email@example.com or firstname.lastname@example.org immediately raises questions of legitimacy. While there are a few common creative tweaks to an email, such as putting a birth year or a number at the end such as Johndoe01 or johndoe1978, a randomly inserted group of numbers is highly irregular. Some might dismiss the email names as purely uncreative thinking or laziness at the time of naming, but often the answer is more insidious with potentially fraudulent results for companies as they add customers.Read More
It seems to happen so often these days that unless we are personally affected we don’t even blink an eye. Company wide data breaches happen when hackers steal personal customer information, and the disaster can alienate customers in the best of circumstances and destroy a company in the worst. Most of us have heard of the larger profile breaches, making nationwide news with each occurrence. But for a small business working hard to gain valuable customers one by one, the loss of customer information to online thieves can be devastating. A recent infographic by Bank of America, outlines the increase in attacks against small businesses.Read More
Today Signifyd and Indaba Group are announcing a strategic partnership. Both companies are Magento partners whose ecommerce platform serves more than 150,000 merchants World Wide.Read More
Today we are announcing our launch in Magento Connect as a Silver industry partner. The Magento ecommerce platform serves more than 150,000 merchants World Wide. We are excited that Signifyd’s fraud prevention solution is now available to all Magento merchants.Read More
Welcome back for another entry in our series: The top 10 phrases used in the fraud industry (and an explanation of what they really mean!) Today we are talking about device fingerprinting, a method in which anti-fraud companies such as Signifyd tag specific devices (laptops, desktops, phones and tablets) used by fraudsters to disallow those devices from completing a purchase online.Read More
Online cyber gangs stealing credit card numbers and other important pieces of personal information have unfortunately made news more frequently as identity theft and online fraud continue their assent alongside the shift away from traditional brick and mortar shopping. As ecommerce sales continue to grow, validating an online customer has become an increasingly important task for internet retailers and few places are more important for validating those customers than social networks. But what and how are some of the ways that fraudsters are using and abusing social media? A quick story experienced by many people shows one method online criminals commonly use.Read More
I was at work, sending emails, when my cell phone began to ring. I looked at the number and didn’t recognize it, but seeing as how I was in sales and I frequently give out my cell number to potential clients I picked up thinking it might be a prospect. To my surprise there was an employee from the online poker warehouse Discount Pokershop.com from whom I had recently placed an order. The women calling me was trying to verify my identity and double checking if I had indeed ordered what is now in hindsight a ridiculous amount of chips ($328.97 to be exact). After verifying that I had indeed purchased the chips the day before, I was reassured that I would receive shipment of my order in about a week.Read More