Guilty Until Proven Innocent: How Incorrectly Identifying Good Customers as Cybercriminals Damages Your Bottom Line
By
Reed Taussig
Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
Let's say a customer attempts to log in to a retail account using a new, unfamiliar device. If the customer used previously authenticated and trusted credentials (e.g., name, physical address, email address and credit card) to make a recent purchase from another retailer, the device can be authenticated in real time since the customer's key credentials have remained unchanged.
0 Comments
View Comments
Reed Taussig
Author's page
Related Content
Comments