Every time I start to put my information into an online form, especially if it’s my credit card number or a banking transaction, I almost always pause. There was a time when I entered customer data without a second thought. Now, with the constant news of breaches and attacks, even those not in the cybersecurity field are now more aware of the risks. As a business, this pause may be the difference between a customer turning away and making a purchase. So how do you ensure both transaction security and a smooth visit?

Balancing Transaction Security With Usability

Before I share my customer information or financial data I ask myself if I trust this website and this company with it. I first ask myself several questions. Have there been recent media reports of breaches at the business? Is the company known and trusted? Then the business must jump one more hurdle — does the website ‘feel’ secure?

However, there is a catch. Even if the website is super secure, it may be cumbersome with transaction security or the process disjointed. I’ll close the browser and find another company to do business with. Yes, my standards are likely a bit different from those of the typical consumer because I’m a UX and cybersecurity journalist, but a recent McKinsey report showed I’m not alone. Customers expect brands to create both an engaging and secure customer experience. By building in highly visible security protocols and features, companies can ease cybersecurity anxiety and build customer loyalty. But there’s a (very) fine balance between a customer experience that’s secure and one that’s seamless.

Multifactor Authentication

Here are three keys to balance transaction security with usability:

First, offer options for multifactor authentication (MFA). The good news is that MFA efforts are working. X-Force recently reported that the significant decrease in both business email compromise (BEC) attacks and attackers’ use of credential theft in 2020 points to the increase in successful use of MFA. Customers typically expect some form of MFA. Their acceptance of this type of transaction security will likely only increase as Google rolls out its automatic enrollment of all users in MFA in the coming months.

However, MFA is not all created equal. I know I much prefer MFA using text messages since I often shop from my phone. My mother-in-law, who only makes purchases from her desktop, gets irritated when companies use anything other than email. Many companies are starting to offer customers a choice of MFA method, including biometric options. Customers then feel confident in the companies’ transaction security and control of the process. Companies should put the MFA process and other transaction security during checkout instead of before the purchase. That way, you’ll reduce the number of customers who leave without buying,

Fully Homomorphic Encryption

Next, consider using fully homomorphic encryption (FHE). Informing customers that you use data encryption may provide them some peace of mind. However, consumers are increasingly realizing that when using traditional encryption, the data must be unencrypted to perform calculations. By using FHE for secure transactions, organizations can use the data while it’s still encrypted, which makes it both usable and secure.

Some challenges with using FHE for transaction security still exist. It can have infrastructure problems, a lack of computing power and be too technically complex for its own good. Despite this, many organizations are moving forward with this more secure encryption method. By using a managed service provider that uses expert cryptography, businesses can do two things at once. They’ll improve customer confidence and data security while not taking time away from customer service.

Consent Management for Transaction Security

Lastly, use consent management for smoother transaction security. Customers want to feel in control — and actually be in control — of their data. When companies use a consumer identity and access management (CIAM) program, customers can make decisions about their own data, which improves their overall experience. For example, make sure that customers can opt in or out of your using their data. They should also be able to manage their consent at any time through a profile. You should also provide an audit of all consent changes customers make.

By consciously looking at all choices from both the security design and the customer experience points of view, you are more likely to strike the fine balance. The more informed and in control customers remain about both security and the process behind it, the more likely they are to walk away from the experience satisfied.

More from Data Protection

Beyond Requirements: Tapping the Business Potential of Data Governance and Security

3 min read - Doom and gloom. Fear, uncertainty and doubt. The "stick" versus the "carrot". What do these concepts have in common? They have often provided the primary motivation for organizations’ data governance and security strategies. For the enterprise, this mindset has perpetuated the idea that data governance, data security and data privacy are reactive cost centers existing due to externally imposed requirements or mandates.Yet, what if data governance and security practices could upend the prevailing paradigm and demonstrate direct business value?[button link="https://community.ibm.com/community/user/security/events/event-description?CalendarEventKey=8d7fdc61-97bf-43b0-b7d6-018756e436a6&CommunityKey=aa1a6549-4b51-421a-9c67-6dd41e65ef85&Home=%2fcommunity%2fuser%2fsecurity%2fcommunities%2fcommunity-home%2frecent-community-events"…

3 min read

Heads Up CEO! Cyber Risk Influences Company Credit Ratings

4 min read - More than ever, cybersecurity strategy is a core part of business strategy. For example, a company’s cyber risk can directly impact its credit rating. Credit rating agencies continuously strive to gain a better understanding of the risks that companies face. Today, those agencies increasingly incorporate cybersecurity into their credit assessments. This allows agencies to evaluate a company’s capacity to repay borrowed funds by factoring in the risk of cyberattacks. Getting Hacked Impacts Credit Scoring As per the Wall Street Journal…

4 min read

IBM Security Guardium Ranked as a Leader in the Data Security Platforms Market

3 min read - KuppingerCole named IBM Security Guardium as an overall leader in their Leadership Compass on Data Security Platforms. IBM was ranked as a leader in all three major categories: Product, Innovation, and Market. With this in mind, let’s examine how KuppingerCole measures today’s solutions and why it’s important for you to have a data security platform that you trust. The Transformation of the Data Security Industry As digital transformation continues to expand, the impact it has had on enterprises is very apparent when…

3 min read

SaaS vs. On-Prem Data Security: Which is Right for You?

2 min read - As businesses increasingly rely on digital data storage and communication, the need for effective data security solutions has become apparent. These solutions can help prevent unauthorized access to sensitive data, detect and respond to security threats and ensure compliance with relevant regulations and standards. However, not all data security solutions are created equal. Are you choosing the right solution for your organization? That answer depends on various factors, such as your industry, size and specific security needs. SaaS vs. On-Premises…

2 min read