The site you requested may not be relevant in your area.

country flag
Skip to main content

How we protect you:

  • Our dedicated security teams are always on guard to anticipate, address and help identify security threats.
  • 24/7 surveillance and security systems strictly control access to all of our facilities.
  • We have a proven track record with state-of-the-art security solutions that help protect data both in transit and at rest, such as encryption, tokenization and fraud rules.
  • We monitor payment channels for suspicious transactions to detect fraud.

How you can protect yourself:

  • Monitor your accounts. Check your accounts regularly and look for unusual withdrawals, deposits and transactions. Set up fraud watches, email and text alerts on all of your accounts.
  • Scan systems for malware or spyware regularly.
  • Protect your information. Do not provide personal information to anyone you don’t know, especially in email. Fraudulent (“phishing”) emails may ask you to click a link to verify or change your account in some way. Avoid clicking on the links or sharing any of your information. 
  • Report anything unusual. If you suspect fraudulent activity on your account, contact your bank or credit card company as soon as possible — they can take steps to reduce the impact.
  • Increase your sign in security. Use different username and password combinations when online — and change them regularly. When possible, choose strong authentication options for your accounts. This may include two different security checks when you log in. Examples could include a password, image, answering a security question, a six-digit mobile phone PIN and more. This double check will reduce the likelihood of someone being able to fraudulently change or access your account.
  • Require more than card information for payment authorization. Include pay fields for email address, phone number and cardholder address.
  • Adhere to rules and recommended practices within the PCI DSS Standard, or payment card industry standard.
  • Monitor for chargebacks. While many customer chargebacks are legitimate, fraudsters are opportunistic. If some chargebacks seem atypical, such as bulk orders with a higher-than-average dollar value or multiple orders from one customer in a short time frame, call our Customer Care team.

Consider these common fraud-deterrent tools:

  • Firewalls – These are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules and transaction parameters.
  • CAPTCHA or reCAPTCHA – A program or system aimed at distinguishing human input from bots with images.
  • Honeypots – These are decoy systems that operate alongside production systems that lure in fraudsters.
  • Device fingerprinting – Helps identify bots with technology that detects the originating device.
  • Key stroke recognition – Another biometric tool that uses the unique manner in which an individual types to recognize as human and not a bot. 

Request a call back

We want to hear from you. Please contact us through the form below and we'll give you a call between the hours of 9:00 AM and 7:00 PM EST, Monday-Friday. 

Form submitted successfully

An Elavon representative will reach out to you shortly.

Please fill the required fields and submit again


Available Mon. – Fri.
9:00 AM - 7:00 PM EST

Customer Support

Available 24/7

By providing us with an email address you are expressly consenting to receiving email communications — including but not limited to Marketing material/advertising, promotions, sales campaigns, and questioner/research surveys.By providing us with a telephone number for a cellular phone or other wireless device, including a number that you later convert to a cellular number, you are expressly consenting to receiving communications — including but not limited to prerecorded or artificial voice message calls, text messages, and calls made by an automatic telephone dialing system—from us and our affiliates and agents at that number. This express consent applies to each such telephone number that you provide to us now or in the future and permits such calls for non-marketing purposes. Calls and messages may incur access fees from your cellular provider. We accept relay calls. Your privacy is important to us. By clicking “submit” you agree to our terms and conditions.