Threat Monitoring

The information below serves as a supplement to the uComm Security page – offering more detail regarding what the uComm Global Transaction Gateway monitors and reports for each of the parties that can pose a threat to a transaction: merchants, processors, consumers, and cyber criminals.

With this comprehensive and granular view, risk managers are able to see the source of transaction failures.

Merchants

The reports and monitoring of/for merchants include:

    • AVS/CVV reporting – Has the merchant disabled them to get a lift in sales? How many suspect transactions are being accepted? Are the AVS/CVV trend lines reflective of real changes in sales and marketing efforts and demographics or are there inexplicable changes?
    • Excessive refunds and credits reporting
    • Chargeback notifications and reporting
    • Sales trend reports, specifically looking for things such as abnormal sales velocity, unsuspected spikes in sales, irregular shipping delays, impending fulfillment issues, and sharp drops in sales
    • Daily risk monitoring, audit reports, and security violation tracking
    • Merchant flags for custom rule violations – such as transaction amounts, volume, etc.

 

Processors

The reports, services, and monitoring of/for processors include:

    • Isolation of problematic transactions by correlating alerts, transaction scoring, and POS entry method
    • Ongoing analysis of the merchant’s security score and scoring flags
    • Separate monitoring of 4 different types of merchants in the Merchant Risk Queue
      • Standard – merchants who, after the first 90 days have one or fewer flagged transactions
      • Limit – merchants who have triggered the Limit Flags and require close monitoring
      • New Merchant – boarded in last 30 days and require close monitoring
      • Tape Merchant – merchants who process through a 3rd party where data is settled on a separate backend
Consumers

The reporting, services, and monitoring associated with consumers includes:

    • Negative consumer database with frequent updates
    • Customer spending limits which enable customer service intervention on large and/or suspicious orders
    • Customer scoring (every customer is assigned a score)
      • Regulate spending by history (transactions, amount, frequency)
      • Regulate spending by negative behavior (chargebacks, refunds, disputes)
      • Account controls to limit attempts and amounts by day, week and month  – option to reject, approve, or flag for review
      • Merchant best practices reviews (AVS not matching, CVV not provided, multiple refunds, chargebacks)

 

Cyber Criminals

The reporting, services, and monitoring associated with protection from criminals includes:

    • Protection from IP hopping and brute force attacks
    • Review of transactions in real time
    • Blocking of suspect transactions before settlement
    • Negative databases from multiple merchant/retail sources as well as global fraud reporting agencies contributes to evergreen fraud management
    • Regular negative database updates (IP addresses, phone numbers, names, card numbers)
    • Sales velocity monitoring by card number, IP address, and phone number
    • Custom rules and filters
    • Ability to ability to reject, approve, or flag for review any suspect transactions based on custom rules or account controls / pre-defined filters