How we protect you:
- Our dedicated security teams are always on guard to anticipate, address and help identify security threats.
- 24/7 surveillance and security systems strictly control access to all of our facilities.
- We have a proven track record with state-of-the-art security solutions that help protect data both in transit and at rest, such as encryption, tokenization and fraud rules.
- We monitor payment channels for suspicious transactions to detect fraud.
How you can protect yourself:
- Monitor your accounts. Check your accounts regularly and look for unusual withdrawals, deposits and transactions. Set up fraud watches, email and text alerts on all of your accounts.
- Scan systems for malware or spyware regularly.
- Protect your information. Do not provide personal information to anyone you don’t know, especially in email. Fraudulent (“phishing”) emails may ask you to click a link to verify or change your account in some way. Avoid clicking on the links or sharing any of your information.
- Report anything unusual. If you suspect fraudulent activity on your account, contact your bank or credit card company as soon as possible — they can take steps to reduce the impact.
- Increase your sign in security. Use different username and password combinations when online — and change them regularly. When possible, choose strong authentication options for your accounts. This may include two different security checks when you log in. Examples could include a password, image, answering a security question, a six-digit mobile phone PIN and more. This double check will reduce the likelihood of someone being able to fraudulently change or access your account.
- Require more than card information for payment authorization. Include pay fields for email address, phone number and cardholder address.
- Adhere to rules and recommended practices within the PCI DSS Standard, or payment card industry standard.
- Monitor for chargebacks. While many customer chargebacks are legitimate, fraudsters are opportunistic. If some chargebacks seem atypical, such as bulk orders with a higher-than-average dollar value or multiple orders from one customer in a short time frame, call our Customer Care team.
Consider these common fraud-deterrent tools:
- Firewalls – These are network security systems that monitor and control incoming and outgoing network traffic based on predetermined security rules and transaction parameters.
- CAPTCHA or reCAPTCHA – A program or system aimed at distinguishing human input from bots with images.
- Honeypots – These are decoy systems that operate alongside production systems that lure in fraudsters.
- Device fingerprinting – Helps identify bots with technology that detects the originating device.
- Key stroke recognition – Another biometric tool that uses the unique manner in which an individual types to recognize as human and not a bot.