When it comes to mobile transactions and payments, consumer expectations are evolving. When a consumer purchases an item or service, he or she naturally expects to receive that service. When a traveler books a hotel room, for example, he or she expects that room to be available upon arrival.

Furthermore, the consumer’s personal information should be used solely for the purpose of completing that transaction, not to solicit future business. Most importantly, the consumer demands robust security around the transaction to protect his or her personal information from fraudsters who may be looking to fund a vacation of their own with stolen credit card data.

These expectations have remained largely unchanged over the past several decades. What has changed, however, is the way vendors, retailers, financial institutions and other service providers process mobile transactions and payments.

Digital Transactions and the IoT

A transaction, financial or otherwise, is an exchange between a source — usually a person using a smart device — and a recipient. The digital ecosystem known as the Internet of Things (IoT) is based on the intelligent integration of billions of devices, all of which are potentially vulnerable to cyberthreats.

Fraudsters can bring down entire systems by compromising just a handful of devices. The Mirai botnet, for example, enslaved millions of connected devices to attack Dyn, a major domain name provider, in October 2016. This unprecedented distributed denial-of-service (DDoS) attack took down many popular websites by sending massive amounts of traffic that Dyn’s servers couldn’t handle. The incident served as a wake-up call for the security industry and demonstrated cybercriminals’ ability to affect large swaths of the internet by hijacking the very devices that initiate a growing portion of transactions around the world.

Best Practices for Securing Mobile Transactions and Payments

Mobile transaction technology is growing more complex and faster as providers endeavor to improve the user experience. This presents myriad challenges related to privacy, monitoring and cybersecurity in general. The fastest and most convenient transaction technologies are often the least secure. For this reason, providers need to see the bigger picture and focus not only on securing their own assets and systems, but also the overall transaction, from the source device to the final recipient of the payment.

Consumers can protect themselves by implementing multifactor authentication on their devices and practicing good password hygiene. Providers should invest in cognitive technologies to monitor user behavior and digest both structured and unstructured threat data that could tip the security team off to specialized malware on the network.

Read the white paper: How digital banking is transforming fraud detection

More from Endpoint

Deploying Security Automation to Your Endpoints

Globally, data is growing at an exponential rate. Due to factors like information explosion and the rising interconnectivity of endpoints, data growth will only become a more pressing issue. This enormous influx of data will invariably affect security teams. Faced with an enormous amount of data to sift through, analysts are feeling the crunch. Subsequently, alert fatigue is already a problem for analysts overwhelmed with security tasks. With the continued shortage of qualified staff, organizations are looking for automation to…

Threat Management and Unified Endpoint Management

The worst of the pandemic may be behind us, but we continue to be impacted by it. School-aged kids are trying to catch up academically and socially after two years of disruption. Air travel is a mess. And all businesses have seen a spike in cyberattacks. Cyber threats increased by 81% while COVID-19 was at its peak, with 79% of all organizations experiencing a loss of business operations during that time. The risk of cyberattacks increased so much that the…

3 Ways EDR Can Stop Ransomware Attacks

Ransomware attacks are on the rise. While these activities are low-risk and high-reward for criminal groups, their consequences can devastate their target organizations. According to the 2022 Cost of a Data Breach report, the average cost of a ransomware attack is $4.54 million, without including the cost of the ransom itself. Ransomware breaches also took 49 days longer than the data breach average to identify and contain. Worse, criminals will often target the victim again, even after the ransom is…

How EDR Security Supports Defenders in a Data Breach

The cost of a data breach has reached an all-time high. It averaged $4.35 million in 2022, according to the newly published IBM Cost of a Data Breach Report. What’s more, 83% of organizations have faced more than one data breach, with just 17% saying this was their first data breach. What can organizations do about this? One solution is endpoint detection and response (EDR) software. Take a look at how an effective EDR solution can help your security teams. …