Let's Chat!
Tailoring the right solution for each business is what we are passionate about. Based on an initial chat with you, we'll be able to prepare a unique proposal for you and your business. We are based in Brisbane
Take a moment to connect with us using the form below, or call us directly on:
1300 255 337 (Mon. to Fri. 10 am - 4 pm):
Data from Australian Payments Clearing Association (APCA) to June 2016 shows that 0.0279% ($530million) of all credit card and cheque transactions were fraudulent. Over the last ten years, the amount of fraud has increased significantly due to a rise in online transactions (where the physical card is not present), and sophistication of the technology used by the criminals.
Types of Credit Cards
- Stored value cards - gift cards, phone cards, petrol cards and in-store cards
- Debit cards - connected to a bank account
- Credit cards - connected to a credit account with an agreement that funds will be paid to the provider at a later date.
Types of Credit Cards Fraud
- Card not presented - making purchases over phone or the internet; it is easy to provide another person’s card details
- Counterfeit card - using fake credit cards, created by ‘skimming’ the data from legitimate cards
- Card not received - cards stolen from mailbox before the recipient receives the card; the thief activates and uses the card before the correct owner realises it has not been received
- Application fraud - using a false identity for a credit card application
Merchant Responsibilities
A business that uses credit card details must take care of security of credit card details. As a merchant you will be bound by the institution that issues the credit card payment facility and their terms of use. These institutions are in turn bound by the PCI Security Standards, (a global governing body), as well as local laws.
- Do not store ANY sensitive cardholder details on computer or paper—this means you may not store any numbers, dates, security code or photocopy of the card. The only detail you may store is the customer’s name.
- Some online payment gateways do store the data in encrypted form, this may be acceptable - you will need to check the provider’s information about security and privacy.
- Ensure access to sensitive information during the transaction is limited to approved users
- Ensure card readers, point-of-sale systems and online payment systems are secure and limited to approved users only. Never allow staff members or customers to remove the device from the point-of-sale area. Consider locking the device in place.
- Record any serial numbers provided by the facility provider and check your device against the number provided - these must match.
- Mark all devices and cables with an identification number or symbol to show that it is your device.
- Use approved merchant facilities only
- Make sure all your computer and online systems are protected with firewall, passwords, user integrity, and backups
- Change passwords regularly
- Check any physical merchant devices for skimming devices
- Check that receipts issued by the device have the exact and correct merchant name.
Subscribe by email and instantly get FREE Illustrated eBook. Adequate ‘positive’ cash flow is essential for the survival of any business, yet this is something that over 50% of small business owners struggle to manage.