{"id":4745,"date":"2012-01-12T20:20:00","date_gmt":"2012-01-12T20:20:00","guid":{"rendered":"https:\/\/evssolutions.com\/social-payments-pose-new-security-threats\/"},"modified":"2012-01-12T20:20:00","modified_gmt":"2012-01-12T20:20:00","slug":"social-payments-pose-new-security-threats","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/social-payments-pose-new-security-threats\/","title":{"rendered":"Social Payments Pose New Security Threats"},"content":{"rendered":"
In todays ever changing world of new technology, companies <\/p>\n What Mark so cleverly refers to as social security in her Allowing a database, application, or smart device to store <\/p>\n","protected":false},"excerpt":{"rendered":" In todays ever changing world of new technology, companies are constantly trying to provide the newest innovations, products, and services to survive. Consumers and businesses alike want everything, and they want it now. Two of the newest trends in payments<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,37],"tags":[],"class_list":["post-4745","post","type-post","status-publish","format-standard","hentry","category-identity-theft","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4745"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4745\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\nare constantly trying to provide the newest innovations, products, and services
\nto survive. Consumers and businesses alike want everything, and they want it
\nnow. Two of the newest trends in payments are mobile and social. Both of these
\nmeans allowing consumers to purchase from just about anywhere on the go. This
\nnew convenience may tempt consumers to proceed without caution and ID verification<\/a>.
\nSocial payments, while cutting edge and easy, pose some serious security
\nthreats.
<\/p>\n
<\/p>\n
\narticle, Social Security, Can You Marry Social Media and Payment Security? is a new issue
\nin the payment processing industry. Applications on devices that are used for
\nsocial payments allow users to store their personal information on the device
\nitself and then are transferred to the application. Merchants believe this is
\nsafer because personal accounts are less of a target than a bank of servers.
\nAs mentioned in EVSs blog Fraud Prevention Ricks For Banking Industry<\/a>, this is not always true. Leaving
\npersonal information open for application breeches as well.
<\/p>\n
<\/p>\n
\nany type of personal information will greatly increase the chance of identity
\ntheft and fraud. Using ID verification<\/a> and authentication through vendors such as EVS<\/a>, allows
\ntransactions to happen real time without ever storing or associating personal
\ndata with an identity. Hopefully in the future, these types of technology can
\ncome together to form the ultimate solution. Until that time comes, making sure
\ntransactions are passed through ID authentication<\/a> is the best way to decrease fraud.
<\/p>\n