New guide shows mobile security advantages over traditional payment methods
Rolling Meadows, IL, USA (20 July 2016)—Advancements in mobile payment security technology are curbing risks and improving consumer trust beyond levels traditionally associated with plastic payment cards, according to new research from global IT association ISACA.
A complimentary guide released today, “Is Mobile the Winner in Payment Security?,” outlines several advantages of mobile payments relative to physical and e-commerce transactions. Tokenization, device-specific cryptograms and two-factor authentication are described as key improvements positioning mobile payments appeal to both consumers and vendors.
ISACA’s “Is Mobile the Winner in Payment Security?”is a free download at www.isaca.org/mobile-payments.
“Mobile payments, with embedded, improved and transparent security controls, are a great example of how security can act as a business enabler, contributing to the creation of end-user trust,” said Christos Dimitriadis, Ph.D., CISA, CISM, CRISC, who is ISACA Board chair and group director of information security for INTRALOT.
Some of the mechanisms empowering advancements in mobile payment technology include:
- Tokenization. Secure mobile payment applications—or mobile wallets—do not transmit a card’s primary account number (PAN), instead sending a randomly generated token to the point of sale (POS) terminal and payment network. This token safeguards the consumer’s data while in transit. “Tokenization is the security solution that is pushing mobile payments ahead of card payments in consumer sensitive financial information protection in the continuous race to stay ahead of hackers and other threats,” according to the ISACA guide. The tokens can be configured to only work for transactions that match specific criteria for an exact period of time, specific retailer and certain monetary amount. Only the issuing bank and authorized entities can securely map tokens back to the original payment card data.
- Device-specific cryptograms. The cryptogram ensures that the payment originated from the card-holder’s device. If a hacker obtains mobile payment transaction data, the cryptogram that is sent to the POS terminal with the token is unable to be used on another mobile device. This helps render any stolen data unforgeable and useless.
- Two-factor authentication. This provides an additional layer to guard against mobile payment fraud by utilizing two independent mechanisms for authentication. Among the common credentials used are something the user knows (such as a password), something physical that the user has (such as a payment card or phone) and a biometric such as a fingerprint, voice print or facial recognition.
If a mobile device containing a mobile wallet is lost, the mobile device can be remotely erased. And since the consumer’s payment card information is not on the mobile device, the payment cards do not need to be replaced.
Like consumers, merchants stand to benefit from mobile payments in many instances. “A key benefit for merchants is that enhanced security should lower fraud and thereby lower costs,” according to the guide. The report also notes that integrating mobile payments into a merchant’s business creates opportunities for more robust customer loyalty programs and allows for purchases in circumstances when customers do not have access to their physical payment card.
The security advantages of mobile payments may surprise the public as well as security experts who perceive mobile payments as risky. ISACA’s 2015 Mobile Payment Security Study shows that only 23 percent of IT and cybersecurity professionals said they believe mobile payments keep personal information safe. Still, the global number of mobile payment users is expected to reach 1.09 billion by 2019, according to Ovum, up from 44.55 million in 2014.
While modern mobile payment methods offer many benefits, the guide also notes some potential vulnerabilities, including during the one-time enrollment when users register a payment card in the mobile wallet application. Mobile wallet providers use methods such as sending payment card data and a device’s geographical coordinates to issuing banks, and any discrepancies can result in a call seeking additional verification.
The guide encourages vendors that adopt mobile payment options to regularly re-evaluate risk control measures to ensure any new scenarios that could emerge are sufficiently addressed.
ISACA (www.isaca.org) helps professionals around the globe realize the positive potential of technology in an evolving digital world. By offering industry-leading knowledge, standards, credentialing and education, ISACA enables professionals to apply technology in ways that instill confidence, address threats, drive innovation and create positive momentum for their organizations. Established in 1969, ISACA is a global association with more than 140,000 members and certification holders in 187 countries. ISACA is the creator of the COBIT framework, which helps organizations effectively govern and manage their information and technology. Through its Cybersecurity Nexus (CSX), ISACA helps organizations develop skilled cyber workforces and enables individuals to grow and advance their cyber careers.
LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial
Kristen Kessinger, +1.847.660.5512, email@example.com
Joanne Duffer, +1.847.660.5564, firstname.lastname@example.org
Jay Schwab, +1.847.660.5693 email@example.com