The holiday shopping season has always been a make-it-or-break-it time for retailers but this year holds unprecedented challenges due to the remarkable increase in fraud brought about by the supply chain crisis, the COVID-19 pandemic, and the increase in organized smash-and-grab theft around the country. I recently shared insights with TotalRetail about what retailers and customers need to do to stop scammers in their tracks this December. Keep reading to learn my top three tips, or read the full article for the full scoop.
- Watch out for phishing scams: The supply chain crisis is making it difficult for retailers to keep items in stock, stressing out customers and creating an opportunity for fraudsters. Fraudsters regularly create phishing sites that are designed to resemble big-box retail sites in order to lure in hurried customers eager to purchase hard-to-find gifts and steal their personal and credit card information.
- Beware of porch pirates: As the COVID-19 pandemic drags on, consumer behavior continues to shift toward e-commerce. Unfortunately, all that shipping gives thieves the opportunity to steal packages while the rightful recipient is away. Requiring a customer’s signature is one way to cut down on such theft.
- Complete identity verification at every step: It’s imperative that retailers take every step to verify their customer’s identity to ensure the legitimacy of a transaction. Implementing device intelligence, phone-centric identity signals, and biometrics can even be used to detect irregularities in data and intelligently control and mitigate loss.
Read the full story on TotalRetail.
To learn about Prove’s identity solutions and how to accelerate revenue while mitigating fraud, schedule a demo today.

Keep reading

Learn about the new Developer Portal and how it can help developers implement identity verification.

Learn how to streamline identity verification with KYC software while maintaining a seamless user experience.

Compare SAML and OpenID Connect in this article to understand their differences and learn when to use each protocol for secure authentication.