{"id":4650,"date":"2014-09-15T16:09:30","date_gmt":"2014-09-15T16:09:30","guid":{"rendered":"https:\/\/evssolutions.com\/online-security-for-ecommerce-shopping-carts\/"},"modified":"2023-04-19T19:31:10","modified_gmt":"2023-04-19T19:31:10","slug":"online-security-for-ecommerce-shopping-carts","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/online-security-for-ecommerce-shopping-carts\/","title":{"rendered":"Online Security for eCommerce Shopping Carts"},"content":{"rendered":"
Online shopping has taken over the retail world in a big <\/p>\n Source: Inforgraphic In a recent article by Symantec, they outlined the major <\/p>\n
\nway. Consumers no longer have to leave the comfort of their homes in order to
\nget the things they need and want. As the population has become more connected
\nthrough the Internet and less available for leisurely shopping, ecommerce has
\nexploded and become the preferred method of shopping for many customers. In
\n2013, online shopping brought in around $240 billion worldwide and $54 billion
\nin the US just during the holidays<\/a>
\nlast year. Consumers like online shopping because its easier to compare prices
\nand products, read reviews, and web-exclusive promotions. When
\npolled, the number one factor that makes online
\nshopping<\/a> satisfactory for users is ease of checkout. While countless
\nstudies mention the ease of check out and comparing prices, it came as quite a
\nshock that few studies even mentioned security. Shopping cart security should
\nbe the first concern of any major ecommerce provider because it could end up
\ncosting them loss business, law suites, and unhappy customers.<\/p>\n
\nList<\/a><\/p>\n
\nvulnerabilities in ecommerce systems<\/a> and how they open up windows for
\nhackers and cyber thieves to get in. One of the major vulnerabilities of
\necommerce and online shopping carts is weak authentication and authorization.
\nSites that do not prohibit multiple failed logins can be attacked very easily.
\nMany shopping sites also allow users to enter their email address as their
\nusername and rarely change their password due to abundance of online accounts.
\nThis also opens a window for any thief with an email address and password as
\nwell. When sites implement a shopping cart or any payment function on their
\nsite, they need to assess their fraud prevention
\nmeasures<\/a>. Identity authentication using knowledge-based-authentication<\/a>
\ncan help prevent hackers from accesses a site. By using real time authentication
\nbusinesses can add another layer of security to apply to their online shopping
\ncarts and payment processing.<\/p>\n