Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 1 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Strong Customer Authentication (SCA): what to expect

by The Gurus
March 25, 2022
in Editor's News
people using hubspot
Share on FacebookShare on Twitter

SCA is a new set of rules from the Financial Conduct Authority (FCA) to help protect customers from fraud when they are shopping online, UK Finance explains. With increasing amounts of purchases being made online, these new rules will help to ensure that customers are safe when shopping and their money is better protected.

The changes will mean that when customers buy something online, they will be asked to verify their identity, for example, through their banking app or a one-time passcode via text or phone call.

From 18 January card issuers started declining some non-compliant transactions, with all non-compliant transactions being declined after the 14 March deadline. Now that the deadline has passed, Daniel Holmes, fraud prevention SME at financial RiskOps platform Feedzai, offered the IT Security Guru readers some insights on the implications of SCA coming into effect:

One of the consequences of this change is that SCA will create additional friction and authentication requirements during the consumer check-out process. Despite some attempts to manage consumer expectations in the lead up to this change, it will take time for them to adapt to the new requirements.

While it is too soon to back this up with data, it is likely that SCA will create consumer confusion in the short term, potentially leading to an increase in abandonment as consumers react to the new user experience. Banks need to ensure their consumers embrace the new user journey if they want to keep their card ‘top of wallet’. To do this the banks must be savvy with several things, including:

    • Being shrewd with exemptions. Being smart here enables payment players to mitigate one of the major SCA risks of too much-unexpected consumer friction 
    • Adopting leading-edge transaction monitoring and data technologies to only create challenges when necessary – a strong analytical strategy is key 
    • Resolving challenges quickly with a secure and user-friendly authentication strategy. Adoption of passive controls, such as device recognition and behavioural biometrics, could be key to maintaining a positive user experience. Those institutions that opt for multiple forms of overt authentication, such as SMS OTP and passwords, may find themselves quickly losing consumer confidence as they grow frustrated

What does the future for SCA look like? Only time will tell, but this is certainly not the end. SCA was introduced to tackle unauthorised fraud. Since the legislation was shared, the industry has seen a huge swing towards scams and authorised fraud. SCA may well inadvertently accelerate this shift, bringing down unauthorised fraud, but pushing up authorised fraud.

Furthermore, many businesses will have delivered their SCA strategy in a ‘tick box’ fashion, in order to hit the regulatory deadline. It is likely these strategies will mature and improve as consumer feedback is gathered and as banks observe best practices from around the industry.

Banks may begin exploring delegated authentication in an attempt to streamline the user experience. This practice enables banks to effectively outsource their cardholder’s authentication requirements to the merchant. Banks will of course require confidence that the merchant can execute strong authentication controls, and ensure that their cardholder remains secure as well as satisfied with the service they receive.

 

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Teens arrested amidst Lapsus$ crackdown

Next Post

Russia preparing to conduct cyberattacks, White House warns

Recent News

JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information