This page contains a Flash digital edition of a book.
32 B 2 B Back office Promotion at Equiom


Global trust and corporate serv- ices provider Equiom has pro- moted Kerry Tasker to the position of manager within its e- Gaming team where she will be responsible for the management of Equiom’s clients’ e- Gaming li- cence


applications and ongoing administration.


All Blacks get stats


New Zealand’s Rugby Union team has signed an agreement to use OptaPro data and analysis software to power its player per- formance and opposition scout- ing. Steve Cliffe, Opta’s business development manager in Australia and New Zealand, said he was delighted to work with such illus- trious clients.


Drop in application DDoS


Prolexic, supplier of Distributed Denial of Service protection services, has said there has been an 8 per cent decline in 'application layer' attacks in the second quarter of 2012 com- pared to Q1, even though the total number of attacks rose 10 per cent.


NYX


locates deal


NYX Gaming Group has se-


lected Nevada-based GeoCom- ply Ltd to power its geolocation tools for regulated markets. Anna Sainsbury, CEO of GeoComply, commented: “NYX is making great progress penetrating mar- kets all over the world and we are looking forward to being a part of that global expansion.”


FRAUD


The need to remain vigilant in a world of virtual fraudsters


John Cannon, head of product strategy, financial crime at Callcredit Information Group, discusses his firm’s recent Fraud Summit which attracted keynote speakers such as Visa’s Peter Bayley, Trans Union Canada’s Sonja Schindeler, First Central’s Glenn Marr and the original Rogue Trader Nick Leeson.





One common theme to emerge at the Fraud Summit was that as pressures mount from the rising cost of living, the general econo-


my, incomes being held static, increasing levels of personal debt and increased pres- sure from lenders, it’s little wonder that cer- tain fraud trends are on the increase. 2012 Q1 fraud trends, as reported by


CIFAS, indicate that fraud is 30 per cent higher than in Q1 2011 and were 13 per cent higher than in Q4 2011. With CIFAS suggest- ing that these frauds are could be the result of financial pressures. The impacts of such pressures are clearly


being seen within the gaming sector where fraudsters have been quick to recognise that with the use of modern technology being embraced by gaming operators to offer their services across multiple channels there is a real attraction especially to the cy- bercriminal. Cybercrime is a growing problem in


today’s technology-focused society, as consumers become increasingly reliant on the internet for buying goods and services. With the emergence of contactless and mo- bile-based purchasing technologies, this problem is likely to increase rapidly if action isn’t taken. Typically, cybercrime often involves the


online financial services, retail and e-gam- ing sectors, all of which can provide rich


pickings for unscrupulous fraudsters tempted by the prospect of easy rewards at reduced risk. The most common forms of cybercrime in these sectors include ID fraud, account takeover, underage gaming, payment fraud, bonus abuse, and organised forms of fraud such as money laundering and insider fraud. Protected by the anonymi- ty that the internet offers, and from the safety of their homes, fraudsters can relatively eas- ily assume false identities, enabling them to gain access to restricted sites, create fraud- ulent online accounts or websites, or obtain confidential information – sometimes on an industrial scale. Techniques such as phish- ing or using malicious software such as Tro- jans or malware are also common. A key attraction is that in the gaming sec-


tor, the commodity is cash, rather than prod- ucts which the fraudster has to sell on in order to make money. Therefore choosing the right strategy at the right time can lead to rich rewards in the eyes of the fraudster. This may also prove to be true in the case of contactless credit / debit cards and mo- bile-based virtual payment systems, which are gradually gaining traction in both the UK and abroad. Although these technologies undoubtedly offer a quick and convenient way for consumers to make transactions on the move, and should be welcomed, con- cerns have already been raised about the se- curity and verification issues that they pres-


BettingBusinessInteractive • AUGUST 2012


ent - for example, if the mobile device is stolen, or if the details on a contactless card are accessed wirelessly through radio fre- quencies. How, then, can businesses reduce their


exposure to cybercrime while embracing the convenience that technology offers? Of course, there is a need for consumers them- selves to be vigilant, and it is clear that more education is needed. A recent survey by Callcredit found that nearly half of online shoppers do not check that the website they are buying from is secure and that their pay- ment details are encrypted, while two-thirds do not even check that the site has a genuine contact address or phone number - putting them at risk of falling victim to cybercrime. Businesses can play a key role in helping their customers to protect themselves, for example by reminding them of the need to protect their passwords, highlighting site


security measures and monitoring their ac- counts for unexplained transactions. Arguably, however, the greater responsi-


bility lies with the business itself, and imple- menting robust fraud detection measures can help to determine whether a customer is genuine, and that any card they use is veri- fied against the details they provide. Call- credit’s CallValidate tool provides certainty in matching a customer’s name, address and date of birth to the payment or bank ac- count number they use to load their account or withdraw funds to in a quick, ‘real-time’ check - helping to prevent identity fraud, payment fraud, and unauthorised withdraw- al of funds, account takeover and money laundering. Such tools play a key role in en- suring that both the gaming operator and at the same time the consumer are protected from the unscrupulous actions of today’s sophisticated cybercriminals.”


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40