Fraud prevention and security (2024)

  • Home
  • Business
  • Merchant support
  • Fraud prevention and security
  • Merchant support
Understanding chargebacks
Know the meaning of authorisation
Never refund to another card or payment method
Protect payment card data
Never process payments for others
Avoid funds transfer fraud
Avoid authentication by-pass techniques
Safeguard your EFTPOS machine
Know the risks of MOTO hand-keyed transactions
Know the risks of eCommerce transactions
Avoid card testing
Security

Suspect a transaction is fraudulent?

Call our customer support team immediately.

Call customer support

Understanding fraud prevention

Every business needs to be aware of, and prepared for, fraud. From chargebacks to funds transfer fraud, it’s important for merchants to refresh their knowledge.

Here are eleven ways to help you stay on the front foot and to minimise the risk of fraud.

Understand chargebacks

The chargeback framework provides a process for cardholders to dispute transactions processed by merchants, most commonly because their card was used without their consent or the merchant didn’t provide the goods and services the cardholder expected.

There are two types of main chargeback types – fraud chargebacks and non-fraud chargebacks.

Fraud chargebacks occur where the cardholder claims that their card was used without their consent. The merchant must then prove the cardholder, and not another person in possession of the card or card details, initiated and completed the transaction.

Non-fraud chargebacks happen where the cardholder claims that the merchant did not provide goods and services as described. The merchant must then prove the goods and/or services were provided in accordance with the agreement between the two parties.

For eCommerce merchants, it is particularly important to ensure that Tyro website requirements are met and all appropriate information is made available to cardholders when making payments. Further information on Tyro website requirements can be found here

Chargebacks are managed in accordance with the regulations set by each card scheme, for example Mastercard and Visa, and they make the ultimate determination of financial liability. Where the regulations permit, Tyro will take steps to defend chargebacks and seek to shift liability from our merchant to the cardholder.

Refer to Tyro’s chargebacks guide for more information.

Know the meaning of authorisation

The authorisation process undertaken by an EFTPOS machine or eCommerce solution confirms that the card used in the payment transaction has not been blocked by the card issuer and has sufficient funds to cover the transaction value.

Authorisation may return an “approval”, however this does not mean that the card is being used by the genuine cardholder, and this is an important consideration when processing Mail Order/Telephone Order (MOTO) and eCommerce transactions. Chargebacks may still be received, even when authorisation/approval is provided.

When providing refunds, only refund to the card used in the corresponding payment transaction and never provide a refund for more than the value of the corresponding sale.

If a merchant processes a payment on a card and then refunds to a different card or by another payment method such as a bank transfer, the different card or other payment destination has immediate access to the funds and a chargeback may be received against the card used in the corresponding payment transaction, leaving the merchant out-of-pocket.

Before refunding card-present transactions, always check the value of the transaction on the EFTPOS paper receipt and never refund to a value above this amount.

FRAUD TREND ALERT: Cash Refunds

There has been an increase in fraudsters pressuring merchants for cash refunds, as well as refunds onto a different card than the one used to make the corresponding payment. It’s important to be vigilant and we encourage you to insist on refunding to the card from which the corresponding payment was made.

Protect payment card data at all times and avoid ADC events

An Account Data Compromise (ADC) event occurs when a third party gains unauthorised access to card data held in a physical and/or electronic form. This stolen card data may then be used to commit fraud.

ADC events can be detected in different ways, with the most common way being via a Common Point of Purchase (CPP) event. A CPP occurs when card issuers detect abnormal levels of fraud activity on their cards and triangulate this fraud to a common identifier, for example a specific merchant facility.

ADC events have broad-ranging impacts on the compromised merchant, cardholders, acquirers, and card issuers, and damage the brand and integrity of the card payments eco-system. Depending on the nature and extent of the ADC, the card schemes may warrant that a forensic investigation is required to identify the cause of the compromise and the amount of card data that has been placed at risk. Once an ADC event has been contained, Tyro will prescribe steps required to be taken by the merchant to achieve Payment Card Industry Data Security Standard (PCI DSS) compliance and/or allow card processing to re-commence. This may include compliance validation by way of a Qualified Security Assessor (QSA).

The PCI DSS applies to any entity that accepts or processes payment cards, which importantly includes merchants and their chosen service providers. It is described as the global standard adopted by the payment card brands for all entities that process, store or transmit cardholder data and/or sensitive authentication data.

Larger transacting merchants are required to validate compliance with the PCI DSS on a periodical basis. However, all merchants should take steps to protect card data by ensuring that their systems and those of their service providers, including eCommerce shopping carts, are regularly reviewed for malware and unauthorised access, patched, and virus protected to maintain the integrity of card data being stored, processed, and transmitted. Merchants should avoid storage, processing, and transmission of card data wherever possible.

Use of a Hosted Payment Page (HPP) provided by a PCI DSS compliant payment gateway reduces the scope of the PCI DSS for merchants, however does not eliminate all security threats.

Read more information on the PCI DSS.

FRAUD TREND ALERT: Compromised Data

Fraudsters are targeting eCommerce shopping carts as a means to capture card data and use this data to commit fraud. Merchants should ensure that patching is maintained on shopping carts and systems environments are regularly reviewed for malware and unauthorised access, patched and virus protected.

Never process payments for others

If a merchant processes payments on behalf of a third party, the merchant wears the liability for those transactions. This might include chargebacks and financial penalties that result from fraud, non-delivery of goods/services, or compliance breaches relating to the sale of illegal goods or engagement in financial crimes.

Avoid funds transfer fraud

Never increase the value of a payment transaction to cover monies owed by a cardholder to an unknown third party such as a courier service, and never make payments to these third parties via money or bank transfers.

Fraudsters use Funds Transfer Fraud as a mechanism to extract cash from merchants, generally by placing larger value orders over the phone. This often results in monies being transferred to (say) a courier engaged in the fraudulent activity, and a fraud chargeback being received because the card used in the payment transaction was stolen.

FRAUD TREND ALERT: Funds Transfer Fraud

There has been a notable increase in fraudsters targeting restaurants, cafes, event managers, pharmacies, and motor mechanics with this fraud method. If you’re asked to inflate the value of a transaction to cover a third-party payment for a courier, florist, caterer, wedding planner, musician, celebrant, vehicle transporter, etc. and if this is an add-on cost to a higher value Mail Order Telephone Order (MOTO) transaction, then please be aware that this may be a scam.

Avoid authentication by-pass techniques

EFTPOS machines have security features to protect merchants from fraud. To benefit from these security features, always tap or dip the card and refrain from using MOTO functionality when the cardholder is present.

If a card fails to be read by the EFTPOS machine when tapped or dipped, request a different card from the cardholder.

A magnetic stripe transaction should only be processed when directed by the EFTPOS machine. Please ensure the card looks genuine and is being correctly tapped or dipped into the EFTPOS machine before allowing use of the magnetic stripe, as the cardholder may be seeking to by-pass authentication provided by contactless and dipped transactions.

Note that transactions should never be split into smaller amounts, especially when this is requested by the cardholder, as this may result in chargebacks.

Safeguard your EFTPOS machine

When merchants dip the card and ask the cardholder to key their PIN, they should maintain focus on the EFTPOS machine at all times and never allow the cardholder to operate the EFTPOS machine when unattended. This will prevent the cardholder from cancelling the authenticated chip transaction, engaging the MOTO functionality on the EFTPOS machine if this is enabled, and processing a card-not-present transaction that leaves the merchant vulnerable to fraud chargebacks.

When unattended, specifically out of business hours, ensure the EFTPOS machine is stored safely to avoid theft and manipulation and check the EFTPOS machine each day for any signs of tampering.

FRAUD TREND ALERT: EFTPOS Machine Manipulation

There is evidence of fraudsters pretending to tap their Smartphone on the EFTPOS machine to give the impression that they are performing a contactless transaction, whilst pressing buttons on the EFTPOS machine to activate MOTO and hand-key the transaction. It’s important for merchants to maintain control of their EFTPOS machine at all times and avoid being distracted when cardholders are asked to key their PIN. If you have Mail Order Telephone Order (MOTO) enabled on your merchant facility and would like to have this functionality removed, please contact Tyro Customer Support on 1300 108 976.

Know the risks of Mail Order/Telephone Order (MOTO) hand-keyed transactions

MOTO transactions are riskier than card-present transactions and are more likely to result in a chargeback. In the event of a chargeback, it is the merchant’s responsibility to prove that the actual cardholder (and not a fraudster in possession of the card details) initiated and completed the transaction, meaning that the risk of MOTO transactions resides with the merchant, not Bendigo Bank, Tyro or the cardholder.

MOTO transactions should only be processed when the value of the transaction sits within the merchant’s risk appetite for loss. It is often said that if a purchase (or sequence of purchases) seems too good to be true, then it probably is, and caution should be taken before shipping goods or providing services. MOTO payments should never be processed when the cardholder is present, because this bypasses the security features provided by the EFTPOS machine.

If a merchant has MOTO enabled on their merchant facility and would like to have this functionality removed, they should contact Tyro Customer Support on 1300 108 976.

Know the risks of eCommerce transactions

eCommerce transactions are riskier than card-present transactions and are more likely to result in a chargeback. In the event of a chargeback, it is the merchant’s responsibility to prove that the actual cardholder (and not a fraudster in possession of the card details) initiated and completed the transaction, meaning that the risk of eCommerce transactions resides with the merchant, not Bendigo Bank, Tyro or the cardholder.

eCommerce transactions should only be processed when the value of the transaction sits within the merchant’s risk appetite for loss. It is often said that if a purchase (or sequence of purchases) seems too good to be true, then it probably is, and caution should be taken before shipping goods or providing services.

Fraud can occur in many different ways and there is no silver bullet when it comes to fraud prevention. That said, merchants should apply caution when processing:

  • Unusually high-value orders
  • Multiple transactions on the same card to different shipping addresses, or the use of multiple cards with the same shipping address
  • Multiple different cards originating from the same email address or IP address
  • Multiple transactions on the same card in a short time period, especially for large value items
  • Orders with different billing and shipping addresses, especially for large value items
  • Bulk orders, especially for high-value goods or infrequently purchased high-quality items
  • Orders with unusual addresses or addresses that can’t be verified
  • Orders requiring expedited shipping, particularly for large value items or duplicate items
  • Orders from higher risk jurisdictions, especially where the goods being sold are commonly available in that jurisdiction
  • Refunds when the cardholder requests the refund to a different card or cards

Care should also be taken when processing Click & Collect transactions, where cardholders pay online and collect in store, specifically where this involves the sale of alcohol or high-value goods. Merchants should have procedures in place to validate the identity of the cardholder. For example, by sighting the physical card and checking that the card is genuine and the name on the card matches the identification provided by the person collecting the goods, and confirm the age of the individual collecting the goods when there are applicable age restrictions.

When shipping goods, it is advisable to request cardholders to sign for deliveries and provide photo ID, however this does not guarantee protection in the event of a chargeback.

Avoid card testing

Fraudsters test the validity of stolen card credentials by using automated scripts to process large volumes of transactions through eCommerce merchant facilities. Each time the transaction is sent by the eCommerce Facility to the card issuer for authorisation, the fraudster receives an approve or decline decision and can determine whether the card is still active. Card testing is most common at charity merchants and utility organisations, however, other merchant categories can be targeted.

Tyro recommends the use of CAPTCHA/reCAPTCHA technology in the purchasing flow on merchant websites to disrupt the use of automated scripts, and validate that the cardholder is human, and limit the potential for chargebacks.

Tyro Payment Card Industry Data Security Standard (PCI DSS) Requirements

What is the PCI DSS?

The Payment Card Industry Data Security Standard (PCI DSS) is a data security standard designed to assist merchants and their service providers in appropriately protecting card data. It is adopted by the major card schemes, including Mastercard and Visa.

Who does the PCI DSS apply to?

The PCI DSS applies to all businesses. Compliance obligations differ depending on the number of transactions processed and the nature of these transactions.

What are PCI DSS levels?

Each business is assigned a PCI DSS level, which is determined by the number of transactions processed per year and the nature of these transactions. High transacting businesses are considered to be Level 1 and low transacting merchants are considered to be Level 4.

Tyro will seek to determine your PCI DSS level at the time of on-boarding, however this level may change over time.

What are my PCI DSS compliance obligations?

Merchants in levels 1, 2, and 3 have an obligation to attest to their level of compliance on an annual basis and provide periodical updates to Tyro on their compliance activities. There is no requirement for Level 4 merchants to attest to PCI DSS compliance, however there is an obligation for these merchants to comply with the Standard.

Why is it important to protect card data?

Criminals seek to steal card data from one merchant and use this data to commit fraud against other merchants, leading to financial loss for these other merchants and inconvenience for the cardholders whose data has been stolen. These attacks are formally known as Account Data Compromise (ADC) events, or less formally as hacking events, and acquirers are required by the card schemes to investigate these events in order to understand the manner in which card data was stolen and the extent to which card credentials were placed at risk.

By protecting card data, merchants reduce the potential for criminal activity, protect themselves and their customers, and assist in protecting the integrity of the card payments ecosystem.

Where should I start with my compliance activities?

Compliance with the PCI DSS is an ongoing journey and requires consistent activity and investment.

Level 3 and 4 merchants should start by considering the Prioritised Approach made available by the Payment Card Industry Security Standards Council (PCI SSC) and noted below.

Level 1 and 2 merchants should also consider the Prioritised Approach, however they should also engage the services of appropriately qualified security professionals to assist them on their compliance journey.

What are the implications of not complying with the PCI DSS?

Non-compliance with the PCI DSS may leave you vulnerable to a hacking event and compromise the good name of your business and the credentials of your customers.

If you are unable to validate compliance with the PCI DSS in an agreed time-frame, whether this requirement relates to your PCI DSS level or actions required to be taken following a hacking event, Tyro may withdraw your merchant facility and this may hamper your efforts to obtain merchant services from another acquirer.

Merchants falling victim to hacking events or failing to validate PCI DSS compliance may also be liable for card scheme fines.

eCommerce merchants are most at risk from hacking events. How should I protect my business?

All merchants should take steps to protect card data by ensuring that their systems and those of their service providers, including eCommerce shopping carts, are regularly reviewed for malware and unauthorised access, patched, and virus protected to maintain the integrity of card data being stored, processed, and transmitted.

Tyro recommends that eCommerce merchants avoid storage, processing, and transmission of card data wherever possible, and instead opt for storage of card data in a PCI DSS compliant environment by way of a Hosted Payment Page (HPP).

Find more detailed information on PCI DSS and your obligations as a Bendigo Bank EFTPOS or eCommerce powered by Tyro customer, please access the Tyro website.

Things you should know

Bendigo Bank EFTPOS and eCommerce powered by Tyro is issued by Tyro Payments Limited ACN 103 575 042 AFSL 471951. Bendigo Bank bank accounts are issued by Bendigo and Adelaide Bank Limited ABN 11 068 049 178 AFSL/ACL 237879.

Fraud prevention and security (2024)

FAQs

How do you solve security and fraud risk? ›

How to Prevent Fraud
  1. Practice safe internet use. Privacy is an important issue, especially in the information age. ...
  2. Destroy private records. ...
  3. Secure your mail. ...
  4. Be careful with your Social Security Number. ...
  5. Check your credit report. ...
  6. Be aware of scams.
Apr 8, 2023

What to do when fraud is detected? ›

Article: 6 Steps to Take after Discovering Fraud
  1. Don't pay any more money. ...
  2. Collect all the pertinent information and documents. ...
  3. Protect your identity and accounts. ...
  4. Report the fraud to authorities. ...
  5. Check your insurance coverage, and other financial recovery steps.

Why is fraud detection difficult? ›

Class Imbalance — Practically only a small percentage of customers have fraudulent intentions. Consequently, there's an imbalance in the classification of fraud detection models (that usually classify transactions as either fraudulent or non-fraudulent) which makes it harder to build them.

Which of the following are detection methods that help identify fraud select all correct answers? ›

5 Methods of Detecting Fraud in Organizations
  • Fraud detection by tip lines. ...
  • Fraud detection by external auditors. ...
  • Fraud detection by internal auditors and inspector generals. ...
  • Fraud detection by dedicated departments. ...
  • Fraud detection by accident.
Aug 2, 2018

What are the four possible responses to fraud risk? ›

  • Fraud prevention. System of internal. controls.
  • Fraud detection. Monitor and. review.
  • Fraud response. Timely investigation. and corrective action.

Can fraud risk be eliminated? ›

A proactive approach to managing fraud risk is one of the best steps organizations can take to mitigate exposure to fraudulent activities. Although it is most likely not possible or economical to completely eliminate all fraud risk, organizations can take proactive and constructive steps to reduce their exposure.

How long does fraud detection take? ›

How Long Does a Bank Fraud Investigation Take? Typically bank fraud investigations take up to 45 days.

What are red flags in fraud detection? ›

Unrestricted access to assets or sensitive data (e.g., cash, personnel records, etc.) Not recording transactions resulting in lack of accountability. Not reconciling assets with the appropriate records. Unauthorized transactions.

What are the chances of getting caught for fraud? ›

So, how often do credit card frauds get caught? Unfortunately, the answer is not very often. Less than 1% of all credit card fraud cases are actually solved by law enforcement. This means that if you are a victim of credit card fraud, your chances of getting your money back are pretty slim.

What is the most difficult fraud to detect? ›

Collusion is two or more individuals coordinating a fraudulent scheme and is more difficult to detect.

What type of fraud is most difficult to detect? ›

Answer: b. The non-recording of transactions. For auditors, the most difficult type of misstatement to detect fraud is when the transactions are not recorded. This is difficult because the auditor has no basis and reference on tracing and vouching of documents.

How are most frauds detected? ›

Data mining classifies, groups and segments data to search through millions of transactions to find patterns and detect fraud. Neural networks learn suspicious-looking patterns and use those patterns to detect them further. Machine learning automatically identifies characteristics found in fraud.

What are the two major approaches to fraud detection? ›

Fraud detection techniques. There are two ways to detect fraud: using artificial intelligence or manual processes.

What are the 3 things that lead to fraud? ›

According to Albrecht, the fraud triangle states that “individuals are motivated to commit fraud when three elements come together: (1) some kind of perceived pressure, (2) some perceived opportunity, and (3) some way to rationalize the fraud as not being inconsistent with one's values.”

What are the 3 things present for fraud to occur? ›

In the 1970s, criminologist Donald R. Cressey published a model called the “fraud triangle”. The fraud triangle outlines the three conditions that lead to higher instances of occupational fraud: motivation, opportunity, and rationalization.

What are the five pillars of fraud? ›

This unit works closely with business lines to strengthen their current practices across the five pillars of prevention, detection, response, remediation and reporting in fraud risk management.

What are the 3as to prevent fraud? ›

The 3 'As' of Fraud Prevention: Authentication, Authentication, Authentication | Credit Union Times.

How often does bank fraud get caught? ›

It really depends on the actions taken by a cardholder after they notice a possible attack and the prevention methods a bank or card issuer takes to detect fraud. Some estimates say less than 1% of credit card fraud is actually caught, while others say it could be higher but is impossible to know.

Do banks refund money if scammed? ›

Contact your bank immediately to let them know what's happened and ask if you can get a refund. Most banks should reimburse you if you've transferred money to someone because of a scam.

Can fraud go undetected? ›

The problem appears to run deep; according to the study, 41% of companies allegedly “misrepresent their financial reports,” 10% of “large, publicly traded companies” are allegedly committing securities fraud, and two-thirds of corporate fraud goes undetected.

What are the six symptoms of fraud? ›

Symptoms of fraud can be separated into six groups: (1) accounting anomalies, (2) internal control weaknesses, (3) analytical anomalies, (4) extravagant lifestyle, (5) unusual behavior, and (6) tips and complaints.

What is one of the most common red flags of fraud behavior? ›

Unusually close association with a vendor or customer. Excessive control issues or unwillingness to share duties. Recent divorce or family problems. A general “wheeler-dealer” attitude involving shrewd or unscrupulous behavior.

What are green flags in fraud? ›

These indicators could be shortages in stock, close nexus with third parties, missing documents, shortages in collections etc. On the contrary there could be other symptoms which leads to greater sense of assurance and comfort in a particular situation but which may potentially infuse with fraud.

What percent of fraud cases are solved? ›

Just one in 1,000 frauds are solved by police as officers are accused of “looking for excuses not to investigate”.

What is the highest punishment for fraud? ›

The maximum punishment for an offence under section 420 of IPC is imprisonment for a term which may extend to seven years, with or without monetary fine.

How long do you go to jail for fraud in the US? ›

Fraud sentences can include: ‍First Offense: Probation, up to one year in jail, or a prison sentence of three-12.5 years. ‍ One Conviction: Prison term of 4.5-23.25 years.

What is a high fraud score? ›

Low Risk (10 – 49): Low possibility of fraud, but may include false negatives (risk). Medium Risk (50 – 69): No strong indication of positive or negative outcome. High Risk (70 – 89): High possibility of fraud, but may include false positives. Very High Risk (90 – 99): Highest possibility of fraud.

What are the 7 types of fraud? ›

Types of Consumer Fraud
  • Advance Fee Fraud. Debt Elimination Fraud. Nigerian Fraud.
  • Cashier's Check Fraud.
  • Fictitious/Unauthorized Banking.
  • High Yield Investment Fraud (Prime Bank Fraud)
  • Identity Theft.
  • Phishing.

Do all fraudsters get caught? ›

Exclusive: more than 96% of reported fraud cases go unsolved - Which? News.

What is the most common way to get scammed? ›

Common Scams
  • Advance Fee Scams. ...
  • Tech Support Scams. ...
  • Phishing. ...
  • Emergency Scams. ...
  • IRS or Government Imposter Scams. ...
  • Foreign Money Exchange Scams. ...
  • Counterfeit Cashier's Checks. ...
  • Bogus Debts.

Who gets scammed the most? ›

Older people are often assumed to be the main targets of financial fraudsters, but younger generations may actually be more at risk to fall victim to scams, research suggests.

What is faster fraud detection? ›

Faster Fraud Detection

False-positive transactions are checked by analysts and as a result, it resulted that they are not real frauds. This causes late detection of possible real frauds, and lost funds cannot be recovered. Machine learning provides great support to analysts in detecting false positives.

How can businesses avoid security and fraud risk? ›

Ten tips to prevent business fraud
  1. Be sceptical. ...
  2. Know your business inside out. ...
  3. Know your customers and suppliers. ...
  4. Identify areas where your business is vulnerable to fraud. ...
  5. Develop a strategy and talk about fraud. ...
  6. Take extra care against cyber attacks. ...
  7. Understand your finances. ...
  8. Secure and protect your property.

How do you handle fraud in the workplace? ›

If your organization has been infiltrated by a fraudulent employee, take these immediate steps:
  1. Put an end to the fraudulent activity once and for all. ...
  2. Conduct an investigation to gather facts. ...
  3. Have a closed-door meeting with the employee in question. ...
  4. Report the fraud to the proper authorities.
Dec 10, 2018

What are the main elements of fraud prevention? ›

6 elements of an Effective Anti-Fraud Program
  • The Control Environment. Demonstrate to employees and those you work with closely that you value integrity. ...
  • Risk Assessment. ...
  • Control Activities. ...
  • Information: Program Documentation. ...
  • Communication: Fraud Training Program. ...
  • Monitoring.
Nov 9, 2021

What are the three C's of successful fraud? ›

Fraudulent financial reporting occurs for many reasons, which can be grouped into three broad categories -- conditions, corporate structure, and choice, or the "3Cs." Internal auditors can use the 3Cs model to predict and uncover financial statement fraud, consistent with IIA Attribute Standard 1210.

What is the most common way employee fraud is discovered? ›

By far the most common way employee fraud is discovered is by a tip coming in. Half those tips come from employee-level sources. Employees will usually report suspicious behavior of coworkers to supervisors. Another large category of tipsters is customers.

What is the most common method of detection for fraud in the workplace? ›

Use a Hotline:

By far, tips are consistently the most common fraud detection technique. In fact, employee tips are the most common method to detect any unethical behaviour in the workplace. In the Report, over 40% of all cases were detected by a whistleblower tip.

Top Articles
Latest Posts
Article information

Author: Jerrold Considine

Last Updated:

Views: 6218

Rating: 4.8 / 5 (78 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Jerrold Considine

Birthday: 1993-11-03

Address: Suite 447 3463 Marybelle Circles, New Marlin, AL 20765

Phone: +5816749283868

Job: Sales Executive

Hobby: Air sports, Sand art, Electronics, LARPing, Baseball, Book restoration, Puzzles

Introduction: My name is Jerrold Considine, I am a combative, cheerful, encouraging, happy, enthusiastic, funny, kind person who loves writing and wants to share my knowledge and understanding with you.