This page contains a Flash digital edition of a book.
Interactive FINANCIAL CRIME


Why a high-risk sector needs high- impact protection


Every business operating in today’s digital economy has to face risks related to fraud, cyber-attacks and other financial crime threats – but for online wagering or “iGaming” companies, these threats are multiplied exponentially.


Jonathan Bowman, Chief Technology Officer MiFinity Payments


Jonathan Bowman is the Chief Technical Officer of MiFinity Payments (formerly NXSystems). MiFinity’s digital wallet solution for the gaming industry offers players a seamless user experience and a broad variety of deposit and withdrawal options, while providing gaming companies with extensive global coverage – integrated with a vast network of financial institutions – as well as sophisticated authentication and fraud monitoring controls and comprehensive reporting. Click here to learn more.


How so? It’s like an equation: take all of the risk factors inherent to digital payments in any sector, then double them (since iGaming outfits operate in a two-sided transaction environment, money is constantly coming in and being paid out).


From there, add in the unique vulnerabilities of the wagering industry at large – including its inherent susceptibility to money laundering – and multiply it all by the creativity of tech-savvy financial criminals, drawn to an already high- risk, high-stakes sector. Te end calculation: an obvious hotbed for


fraud and security issues. iGaming companies are all too aware of the


issues they face, in part due to the additional business challenges that their unique vulnerabilities create. For example, banks and other financial institutions classify all companies in the wagering industry as “high- risk” – putting iGaming operators in an unenviable negotiating position when it comes to third-party processing fees and enterprise technology contracts. In addition, a recent report found that the online gaming industry was the


P70 NEWSWIRE / INTERACTIVE / 247.COM


target of half of the recorded distributed denial- of-service (DDoS) attacks in the third quarter of 2015. Tis high level of cyberattacks is attributable, in part, to how crowded the iGaming market is becoming. Research from Kaspersky Labs found that one out of every two DDoS attacks in the online wagering space was launched or funded by a rival business. With so many operators in the iGaming space


competing for the same base of player- customers (and their money), it is not surprising that the attacks often come from the competition… and it is also no shock that these player-customers have their own financial crime tricks up their (digital) sleeves. Te most popular of these tricks exploits the


online wagering industry’s heavy reliance on credit card-enabled transactions. Criminals frequently attempt to use stolen card numbers on wagering sites, and consumers play that to their advantage by committing “friendly fraud.” Friendly fraud occurs when a consumer uses credit card information to wager, but later claims that the related charges from a gaming outfit were actually unauthorized. Te consumer simply lost money, but can “win” an undue chargeback by telling the credit card company that he or she did not sanction the payment. Incidents of friendly fraud are commonly


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76