Page 33 - Cyber Warnings
P. 33







The truth is that most Retail Websites have already deployed the “Best Practices” to secure
their data. They cannot stop an individual with complete valid, stolen, credit card data from
being used!

And yet CyberID security can prevent the use of this Credit card stolen data. Any organization
issuing credit cards and providing account access via SecureAxcess can prevent fraudulent
data from being used, putting a dent into $190 Billion in fraud last year.

The organization issuing the credit card provides two options at logon, “Access Account” and
“Shop”. “Access Account” enters the secure portal but “Shop” just informs the company that you
are currently online and intend to shop. This simple act renders stolen credit card data useless!

The individual goes to a retail site and makes a purchase. At checkout, the charge is sent for
authorization.

With CyberID security at the bank, the bank can verify that the individual is online and intends to
shop. If they are not logged in, then even valid data is rejected because the data owner has not
authorized online shopping. When stolen credit card data cannot be used, the incentive to steal
it is removed.

Cyber Safety Harbor is your port in the cyber storm.



About The Author

Chris Murphy is the Founder, Innovator, Visionary and Inventor of
“Methods and systems for internet security via virtual software” the basis
of SecureAxcess technology and CyberID security. His vision is to improve
cyber security while developing a corporate/community partnership to
deliver quality service to all businesses no matter how large. (See
Community Development Program for more information.)

Chris is a lover of the arts and a supporter of organizations that provide arts education in public
schools. “Every advancement requires imagination and the arts in school is where imagination
is fostered.”

Chris Murphy can be reached online at [email protected] and at our company
website http://www.cybersafetyharbor.com











33 Cyber Warnings E-Magazine – April 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   28   29   30   31   32   33   34   35   36   37   38