Credit card Processing Archives - Page 7 of 13 - Payment Processing News

Category: Credit card Processing

February 21st, 2014 by Elma Jane
QR Code for National Transaction Corporation

NationalTransaction.com QR Code

Emerging economies, such as the BRIC countries and the next layer of emerging markets, are seeing particularly fast growth of alternative payments, said Kevin Dallas, chief product and marketing officer for e-commerce at WorldPay. This means the complexity of the payment landscape will increase further. Merchants will need to ensure they understand diverging regional and sector trends in preferred methods of payment.

In three years alternative payments will eclipse credit card payments as the dominant way to pay online, according to a report yesterday from London-based e-commerce processor WorldPay. In Your Global Guide to Alternative Payments (Second Edition), WorldPay found card payments online, which accounted for 57 percent of transactions in 2012, will fall to 41 percent in 2017. Alternative payment methods (defined by the report as anything other than credit or debit cards including bank transfers, direct debits, e-wallets, mobile, COD and others) will rise to 59 percent of online transactions in the next three years. Part of the reason is the preferred payment methods in some of the fastest growing e-commerce markets are not cards.

The report predicts e-wallet transactions alone will equal the number of credit card transactions online at 41 percent, becoming the most popular method of paying online globally by 2017. Currently, PayPal is the most popular alternative payment method in the world with a market share of 57 percent. China’s Alipay is second at 20 percent.

Posted in Credit card Processing, Digital Wallet Privacy, e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Mobile Payments, Mobile Point of Sale, Near Field Communication, Visa MasterCard American Express Tagged with: , , , , , , , , , , , , , , , , , , ,

February 20th, 2014 by Elma Jane
Android-iPhone-Credit-Card-Reader

Android-iPhone-Credit-Card-Reader

Several options exist for mobile credit card processing.

Credit card processing on iPhone/ipad/Android/BlackBerry or Tablets – Using NTC’s portable credit card readers, merchants can now swipe credit cards on iPad or Android tablet devices. NTC’s Virtual Merchant solution allows users to download a secure application to interfere your smartphone with our merchant account services seamlessly. The application and credit card processing data on the carriers network or a WiFi connection to the internet.

NTC’s MagTek Bullet Swipe Credit Card Reader for Android Phones and Tablets.

Using any Android 2.2. or higher device you can process credit card transactions securely to the smartphone via Bluetooth and utilize wireless devices internet connection (WiFi or Carrier) to send the credit card processing data encrypted for processing approval.

Security anywhere. With the BulleT Secure Credit Card Reader Authenticator (SCRA), security comes with the flexibility and portability of a Bluetooth wireless interface. Small enough to fit into the palm of your hand, the BulleT enables secure wireless communications with a PC or mobile phone using the popular Bluetooth interface. Not only does the BulleT encrypt card data from the moment the card is swiped, but it also enables card authentication to immediately detect counterfeit or altered cards.

Ideal for merchant services accounts and financial institutions’’ mobile credit card processing, NTC’s BulleT offers MagnaSafe credit card processing security features with the convenience of a Bluetooth interface. This powerful combination assures credit card data protection, transaction security and convenience needed to secure mobile credit card processing with strong encryption and 2-factor authentication. The BulleT is specifically designed to leverage the existing magnetic stripe credit card reader as a secure token empowering cardholders with the freedom and confidence of knowing that their credit card transactions are secure and protected anytime, anywhere. Android Credit Card Swipe Reader for Android Phones and Tablets on your wireless mobile merchant account.

 

NTC’s MagTek iDynamo Credit Card processing swipe reader for iPhone and Ipad.

Credit card processing on an iPhone has never been easier. Simply attach NTC’s  iDynamo card reader to your iPhone or iPad device, install our Virtual Merchant software from the App Store and you’re ready to go. Take advantage of lower credit card processing rates by processing swiped transactions instead of  keying the credit card in later and get paid faster. From the company that leads with Security from the Inside MagTek has done it again with the iDynamo, a secure card reader authenticator (SCRA) designed to work with the iPhone and iPad. The iDynamo offers MagnasafeTM security and delivers open standards encryptions with simple, yet proven DUKPT key management, immediate tokenization of card data and MagnePrint card authentication to maximize data protection and prevent the use of counterfeit cards. Mobile merchants can now leverage the power of their iPhone/iPod Touch products without the worries of handling or storing sensitive card data at any time. Ideal for wireless mobile merchant accounts and mobile credit card processing, the iDynamo offers MagneSafe security features combined with the power of iPhone and iPod Touch products. This powerful combination assures convenience and cost savings, while maximizing credit card data protection and credit card transaction security from the moment the card is swiped all the way to authorization. No other credit card reader beats the protection offered by a MagnaSafe product.

Other credit card devices claim to encrypt data in the reader. NTC’s iDynamo encrypts the data inside the read head, closest to the magnetic stripe and offers additional credit card security layers with immediate tokenization of card data and MagnePrint card authentication. This layered approach to security far exceeds the protection of encryption by itself, decreases the scope of PCI compliance, and reduces fraud.

NTC’s  iDynamo is rugged and affordable, so it not only withstands real world use, it performs to the high standards set by MagTek as the leader in magnetic credit card swipe reading products for nearly 40 years.

Posted in Credit card Processing, Credit Card Reader Terminal, Credit Card Security, Digital Wallet Privacy, e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Merchant Services Account, Mobile Payments, Mobile Point of Sale, Payment Card Industry PCI Security, Smartphone Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

February 18th, 2014 by Elma Jane

For Ecommerce Testing, Clarify Conversion Goals

Before you can start any testing on your ecommerce site, you need to clarify your goals. Setting the right goals is the first step to making any improvements. There’s a saying, “Whatever you measure grows.” So, make sure you measure the right thing.

Goals may seem like the obvious part. After all, you already know you want more sales, right? But there’s more to goal setting than just deciding to try and increase your sales.

The Goals Waterfall

Your goals for your conversion-optimization tests should flow from your marketing goals, which ultimately flow from the organization’s overall goals and strategy.

Business Goals – Marketing Goals – Conversation Optimization Goals.

The goals from optimization testing should follow from a company’s overall goals and strategy

Your business goals should determine your website goals, which should be prioritized to determine your leading conversion optimization goal.

The conversion optimization goal for any test should be selected based on how well it supports the website’s goals. This is often an area where there’s confusion about what are the priority metrics to improve. Don’t get off track by following website goals that don’t support marketing goals.

 

Prioritize Goals

Most sites will have several key goals, so you’ll need to prioritize them. You can do this in three steps.

Rank your goals in terms of their relative value to your business:

Assigning values to goals. The values don’t have to be absolutely accurate revenue-producing numbers to begin. Pick a median goal on your list, and assign it an arbitrary amount, and then estimate the relative value of goals above and below it.

Estimating actual goal values. Now, to get even better results, you can refine these relative numbers with whatever hard data you have, such as average order value, lifetime value of a customer, or the close rate and value your sales team sees when following up on quote requests. Don’t worry about 100 percent accuracy. It’s better to start testing with relatively firm numbers than to delay until everything’s perfect.

 Priority          Goal

1                 Product Sale

2                 Quote Request

3                 Whitepaper Download

4                 Blog Comment

5                 Social-Media Profile Activity

 Tracking Your Goals

Once you’ve identified your most important conversion goal for your experiment, make sure you track it. Goals are a crucial part of your web analytics setup. If you don’t have keys goals in place, you’re missing out on half the value of your various reports.

That means translating your testing goal into a technical goal trigger that will be tracked by the analytics and testing tools you’re using. The goal you track must be represented by a specific action the visitor takes on the website, like a button click or a visit to a page. Think about an action on the site that the visitors will do only once they have completed the goal.

The key is that it should be an action as close to revenue as possible. So, if your goal is to sell a product, you should track a post-sale thank you page as the goal trigger. (If you also accept phone orders, you may need to tackle some advanced tracking techniques to get reliable test results.)

Goals with values attached to them, as explained above, are the only way to find your most valuable visitors, they’re crucial for effective conversion optimization testing.

Be sure to set up ecommerce revenue tracking as well. Increasing average order value can be just as effective as boosting your sales conversion rate, and you’ll want to be able to include that in your results analysis.

A Single Goal

Web analytics tools can provide a ton of information, and it’s not uncommon for e-commerce sites to have a handful of key performance indicators. Example, you may track time on page and the add-to-cart rate, but when it comes to conversion optimization A/B testing, it’s important to focus on only the revenue-producing goals or goals for each test. Always make sure you are tracking revenue for each test variation. Otherwise, you could pick a conversion rate winner that inadvertently sells lower-value products.

Track revenue-producing goals for your A/B tests, but those other goals are still useful too. While not all web analytics goals are the best for A/B testing, they still may be helpful to generate hypotheses and explore new testing opportunities.

By paying attention to secondary goals, you can discover new testing avenues that help you get even more value from your ecommerce website.

Track as many goals and actions as you can with your web analytics tools so you can be free to explore your visitors’ behavior. Within web analytics is where you can do freeform exploration to generate ideas or hypotheses for your A/B tests. Then, validate those ideas through revenue-tracking controlled tests.

Posted in Best Practices for Merchants, Credit card Processing, Small Business Improvement Tagged with: , , , , , , , , , , , , , , , , , , , , , ,

February 18th, 2014 by Elma Jane

Payment Tokenization Standards

Tokenization is the process of replacing a traditional card account number with a unique payment token that is restricted in how it can be used with a specific device, merchant, transaction type or channel. When using tokenization, merchants and digital wallet operators do not need to store card account numbers; instead they are able to store payment tokens that can only be used for their designated purpose. The tokenization process happens in the background in a manner that is expected to be invisible to the consumer.

EMVCo – which is collectively owned by American Express, Discover, JCB, MasterCard, UnionPay and Visa – has announced that it is expanding its scope to lead the payments industry’s work to standardize payment tokenization. EMVCo says that the new specification will help provide the payments community with a consistent, secure and interoperable environment to make digital payments when using a mobile handset, tablet, personal computer or other smart device.

Key elements of EMVCo’s work include adding new data fields to provide richer industry information about the transaction, which will improve transaction efficiency and enhance the consumer and merchant payment experience by helping to prevent fraudulent card account use. EMVCo will also create a consistent approach to identify and verify the valid use of a token during payment processing including authorization, capture, clearing and settlement.

EMVCo’s announcement follows an earlier joint announcement from MasterCard, Visa and American Express that proposed an initial framework for industry collaboration to standardize payment tokenization. EMVCo says it will now build on this framework with collective input from all of its members and the industry as a whole.

Posted in Credit card Processing, Credit Card Reader Terminal, Credit Card Security, Digital Wallet Privacy, Electronic Payments, Financial Services, Payment Card Industry PCI Security, Visa MasterCard American Express Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

February 17th, 2014 by Elma Jane

Facts about Chargeback

Merchants know chargebacks are bad, but many aren’t aware of simple facts that can help them better understand and guard against fraud accordingly.

Do you know which month is the worst for fraud charge backs?

which transaction amounts are the most likely to be disputed?

or which U.S. states are the biggest offenders?

If not, a Big Data fraud science firm – will help you prepare for a smoother 2014.

Facts you’ll learn: 

The most common fraudulent chargeback amount.

The day of the week when chargebacks are most likely to occur.

The time of year charge backs are most likely to occur.

49% of all fraudulent chargebacks happen after 60 days or more from date of purchase.

$1,000 is the most common attempted unauthorized sales amount (followed by $2,500, $2,000, $1,500 and $5,000).

11% of all fraudulent transactions fall under the Merchant category “Code of 7299”.

Services. The word most often found in registered fictitious names for fraudulent merchant accounts is “Services”.

Wednesday Is the day of the week when the most chargebacks (19%) occur.

One-Third of all fraud chargebacks happen in the fall (September to November).

California Republic is the top state registered by fraudulent businesses, accounting for 14% of chargebacks the U.S. total.

Florida, Texas and New York round out the top four states with 12%, 9% and 7% respectively.

Posted in Best Practices for Merchants, Credit card Processing, Credit Card Security, Electronic Payments, Merchant Services Account, Payment Card Industry PCI Security Tagged with: , , , , , , , ,

February 14th, 2014 by Elma Jane

News from Target, increasing the number of cards compromised to 70 million and the expansion of data loss to mailing and email addresses, phone numbers and names, affirms that we are in a security crisis.

Card data is from a brand and business perspective, the new radioactive material. Add personally identifiable information (PII) to the list of toxic isotopes.

The depressing vulnerabilities these breaches reveal are a result of skilled hackers, the Internet’s lack of inherent security, inadequate protections through misapplied tools or their outright absence. Security is very very hard when it comes to playing defense.

There is a set of new technologies that could, in a combination produce a defense in depth that we have not enjoyed for some time.

Looking at the Age of Context (ACTs)

Age of Context released, a book based on the hundreds of interviews conducted with tech start-up and established company leaders. A wide-ranging survey. They examine what happens when our location and to whom we are connected are combined with the histories of where and when we shop. Result is a very clear picture of our needs, wants and even what we may do next.

Combining the smartphone and the cloud, five Age of Context technologies ACTs, will change how we live, interact, market, sell and navigate through our daily and transactional lives. The five technologies are:

1. Big Data. Ocean of data generated from mobile streams and our online activity, can be examined to develop rich behavioral data sets. This data enables merchants to mold individually targeted marketing messages or to let financial institutions improve risk management at an individual level.

2. Geolocation. Nearly every cell phone is equipped with GPS. Mobile network operators and an array of service providers can now take that data to predict travel patterns, improve advertising efficiency and more.

3. Mobile Devices and Communications. These are aggregation points for cloud-based services, sending to the cloud torrents of very specific data.

4. Sensors. Smartphones, wearables (think Fitbits, smart watches and Google Glass) and other devices are armed with accelerometers, cameras, fingerprint readers and other sensors. Sensors enable highly granular contextual placement. A merchant could know not only which building we are at and the checkout line we are standing in but even which stack of jeans we are perusing.

 

5. Social. Social networks map the relationships between people and the groups they belong to, becoming powerful predictors of behavior, affiliations, likes, dislikes and even health. Their role in risk assessment is already growing.

The many combinations and intersections of these technologies are raising expectations and concerns over what is to come. Everyone has a stake in the outcome: consumers, retailers, major CPG brands, watchdog organizations, regulators, politicians and the likes of Google, Apple, Microsoft, Amazon, eBay / PayPal and the entire payments industry.

We are at the beginning of the process. We should have misgivings about this and as an industry, individuals and as a society, we need to do better with respect to privacy and certainly with respect to relevance.

Provided we can manage privacy permissions we grant and the occasionally creepy sense that someone knows way too much about us, the intersections of these tools should provide more relevant information and services to us than what we have today. Anyone who has sighed at the sight of yet another web ad for a product long since purchased or completely inappropriate to you understands that personalized commerce has a long way to go. That’s part of what the Age of Context technologies promise to provide.

ACTs in Security    

ACTs role in commerce is one albeit essential application. They have the potential to power security services as well, specially authentication and identity-based approaches. We can combine data from two or more of these technologies to generate more accurate and timely risk assessments.

It doesn’t take the use of all five to make improvements. One firm have demonstrated that the correlation of just two data points is useful, it demonstrated that if you can show that a POS transaction took place in the same state as the cardholder’s location then you can improve risk assessment substantially. (based off of triangulated cell phone tower data).

Powerful questions of each technology that ACTs let us ask:

Data – What have I done in the past? Is there a pattern? How does that fit with what I’m doing now?

Geolocation – What building am I in? Is it where the transaction should be? Which direction am I going in or am I running away?

Mobile – Where does device typically operate? How’s the device configured? Is the current profile consistent with the past?

Sensors – Where am I standing? What am I looking at? Is this my typical walking gait? What is my heart rate and temperature?

 

Social – Am I a real person? Who am I connected to? What is their reputation?

Knowing just a fraction of the answers to these questions places the customer’s transaction origination, the profiles of the devices used to initiate that transaction and the merchant location into a precise context. The result should improve payment security.

More payments security firms are making use of data signals from non-payment sources, going beyond the traditional approach of assessing risk based primarily on payment data. One firm have added social data to improve fraud detection for ecommerce payment risk scoring. Another firm, calling its approach Social Biometrics, evaluates the authenticity of social profiles across multiple social networks including Facebook, Google+, LinkedIn, Twitter and email with the goal of identifying bogus profiles. These tools are of course attractive to ecommerce merchants and others employing social sign on to simplify site registration. That ability to ferret out bogus accounts supports payment fraud detection as well.

This triangulation of information is what creates notion of context. Apply it to security. If you can add the cardholder’s current location based on mobile GPS to the access device’s digital fingerprint to the payment card, to the time of the day when she typically shops, then the risk becomes negligible. Such precise contextual information could pave the way for the retirement of the distinction between card present and card-not-present transactions to generate a card-holder-present status to guide risk decision-making.

Sales First, Then Security        

The use of ACT generated and derived signals will be based on the anticipated return for the investment. Merchants and financial institutions are more willing to pay to increase sales than pay for potential cost savings from security services. As a result, the ACTs will impact commerce decision making first-who to display an ad to, who to provide an incentive to.

New Combinations  

Behind the scene, the impact of the ACTs on security will be fascinating and important to watch. From a privacy perspective, the use of the ACTs in security should prove less controversial because their application in security serves the individual, merchant and the community.

Determining the optimal mix of these tools will take time. How different are the risks for QR-code initiated transactions vs. a contactless NFC transaction? What’s the right set of tools to apply in that case? What sensor-generated data will prove useful? Is geolocation sufficient? Will we find social relationships to be strong predictor of payment risk or are these more relevant for lending? And what level of data sharing will the user allow-a question that grows in importance as data generation and consumption is shared more broadly and across organizational boundaries. It will be important for providers of security tools to identify the minimum data for the maximum result.

I expect the ACT’s to generate both a proliferation of tools to choose from and a period of intense competition. The ability to smoothly integrate these disparate tools sets will be a competitive differentiator because the difficulty of deployment for many merchants is as important as cost. Similar APIs would be a start.

Getting More from What We Already Have  

The relying parties in a transaction – consumers, merchants, banks, suppliers – have acquired their own tools to manage those relationships. Multi-factor authentication is one tool kit. Banks, of course issue payment credentials that represent an account and proxy for the card holder herself at the point of sale or online. Financial institutions at account opening perform know your customer work to assure identity and lower risk.

Those siloed efforts are now entering an era where the federated exchange of this user and transactional data is becoming practical. Firms are building tools and the economic models to leverage these novel combinations of established attributes and ACT generated data.

The ACTs are already impacting the evolution of the payments security market. Payment security incumbents, choose just two from the social side, find themselves in an innovation rich period. Done well, society’s security posture could strengthen.

Posted in Best Practices for Merchants, Credit card Processing, Credit Card Security, e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Payment Card Industry PCI Security, Point of Sale, Smartphone, Visa MasterCard American Express Tagged with: , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

February 13th, 2014 by Elma Jane

How To Target Customers Based on Past Purchase Behavior

One of the best ways to predict how someone will behave in the future is to look at what they’ve done in the past. By tracking a consumer’s past purchasing behavior, marketers can design highly targeted ads based on the specific preferences and tastes of individual customers.

The question, of course, is how to gain access to data about a consumer’s spending history without violating privacy standards. For many marketers, the answer is to partner with a vendor that provides card-linked offers. A survey of 300 marketers found that three-quarters believe card-linking marketing programs will replace existing types of advertising in the years to come – a strong vote of confidence from the very industry vendors are trying to tap.

 Here are tools that marketers can use to gather information about their customers’ past purchasing habits.

 1. BlueKai: Find prospects based on previous buying habits.

BlueKai offers marketers a third-party marketplace, known as the Audience Data Marketplace, where they can collect data on consumers in their target demographics. One type of data that marketers can collect is past purchasing behavior. Marketers can search for consumers who are likely to buy their products based on their previous spending habits. For example, an electronics brand may search for data about consumers who’ve purchased laptops in the past year. Using this information, marketers are able to create more targeted campaigns that are delivered only to those shoppers in qualified demographics.

 2. Cardlytics: Learn where else your customers shop.

Cardlytics provides advertisers with insight into the purchasing behavior of more than 30 million households. Marketers have the option to target only those buyers who have been active in their sector. Cardlytics tracks where a consumer shops, when they shop, where they live, and how much they spend. For example, a retailer might only collect information about consumers who have spent more than $1,000 at competing businesses in the tri-state area. Using the Cardlytics platform, advertisers can create targeted offers meant to improve loyalty or build stronger customer relationships. Cardlytics offers pay-for-performance pricing.

 3. Cartera: Reward consumers for shopping at retail partners.

Businesses that are looking to improve the effectiveness of their rewards programs can use Cartera’s card-linked platform to gain additional insight into the spending patterns of their top customers. By connecting loyalty programs to their customer’s credit and debit cards, marketers can offer better rewards — including cash back and airline miles. Retailers also have the option to reward consumers for shopping at “complementary merchants.” A few of Cartera’s best-known clients include Best Buy and Charter Communication.

 4. Catalina: Actively pinpoint the shopping behaviors of specific buyers.

Using Catalina’s BuyerVision tool,  marketers are able to target their digital advertising –  including display, video and mobile – based on past purchasing behaviors. Catalina analyzes the in – store purchasing behavior of consumers and matches that data to online behaviors using cookies. For example, a grocery store could send recipe ideas to consumers who have purchased a specific combination of items in the past week. The company says it has access to transactions at more than 30,000 stores, allowing its clients to define their target audiences send mobile ads to more than 70 million households.

 5. Edo Interactive: Target consumers based on competitive spending patterns.

Brands, agencies, and even small businesses can use edo Interactive’s card-linked marketing platform to send targeted offers to consumers based on their competitive spending patterns. The company has partnered with more than 200 banks, giving clients access to information about 200 million consumers. As a result, marketers connect their advertising to in-store purchases and send consumers relevant offers that they’re likely to redeem. Taking it a step further, edo’s Geocommerce feature combines purchase data with location information. Edo operates on a pay-for-performance model, which means marketers only pay when the customers they’ve targeted make purchases at their businesses.

Posted in Best Practices for Merchants, Credit card Processing, Electronic Payments Tagged with: , , , , , , , , , , , , , , , , , ,

February 13th, 2014 by Elma Jane

Core Elements of PCI’s Data Security Standard

This organization provides an international platform for the ongoing development, enhancement, storage, dissemination and implementation of security standards for account data protection. It is impossible to be involved in the credit card processing industry and not be aware of the PCI Security Standards Council.

As such it is important to be aware of the core elements of the PCI’s Data Security Standard (DSS).

The following are the current fundamental principles and requirements:

Build and Maintain a Secure Network

Requirement a. Install and maintain a firewall configuration to protect cardholder data
Requirement b. Do not use vendor-supplied defaults for system passwords and other security parameters

Implement Strong Access Control Measures

Requirement c. Restrict access to cardholder data by business need-to-know
Requirement d. Assign a unique ID to each person with computer access
Requirement e. Restrict physical access to cardholder data

Maintain a Vulnerability Management Program

Requirement f. Use and regularly update anti-virus software
Requirement g. Develop and maintain secure systems and applications

Maintain an Information Security Policy

Requirement h. Maintain a policy that addresses information security

Protect Cardholder Data

Requirement i. Protect stored cardholder data
Requirement j. Encrypt transmission of cardholder data across open, public networks

Regularly Monitor and Test Networks

Requirement k. Track and monitor all access to network resources and cardholder data
Requirement l. Regularly test security systems and processes

 

Posted in Best Practices for Merchants, Credit card Processing, Credit Card Security, Payment Card Industry PCI Security Tagged with: , , , , , , , , , ,

February 13th, 2014 by Elma Jane

Becoming an e-commerce entrepreneur is an increasingly attainable dream for many aspiring business owners, as new online sales platforms and Web design tools continue to emerge. While just about anyone can launch an online business, it takes a dedicated salesperson to actually succeed, and that means staying on top of current marketplace trends.

If you’re ready to take your e-commerce business to the next level in 2014, watch these five current trends in online sales:

Access through smartphones, tablets and other mobile devices. Major gains seen  in e-commerce usage of mobile devices such as smartphones and tablets, especially during the holiday season. Trend to accelerate as mobile adoption continues to increase and more mobile technologies become available. Small businesses should have a mobile version of their website, with mobile-optimized checkout to help facilitate a better mobile experience. Small retailers should also look at their site across multiple mobile devices and pay attention to new technologies, such as smartwatches.

Goodbye, traditional SEO. Google is constantly updating its algorithm in an effort to serve the best, most relevant content to its users. This means that traditional (SEO) search engine optimization tactics are falling by the wayside, and an increased push toward quality, unique content — along with social media signals — will be of huge importance in 2014. To help stay ahead of the SEO curve, small retailers should focus less on Traditional SEO Tenets like keyword usage and density, and instead aim efforts toward creating content that is tailored and useful for their target audience. Example, create more lifestyle-oriented content in the form of blog posts, videos and other types of media that encourage sharing by readers.

Increased dependence on data. Smaller online businesses continue to expand their presence across channels, the need to turn to performance data from both a channel-specific and holistic standpoint becomes even more important. Google Analytics is a good tool for this, because business owners can measure their site traffic from multiple devices and referral sites.
Small shops squeezed by larger merchants. Mega-retailers like Amazon continue to steal market share from other big-box retailers (both online and offline), smaller online businesses will need to become more nimble in how they compete, from a price, customer-service and marketing standpoint. This involves identifying true points of difference from larger merchants, showcasing these points in marketing and branding, and delivering personalized experiences.

 The importance of multichannel selling. Customer shopping behaviors become more fragmented, so must the presence of small online businesses owners. Simply having an e-commerce site is no longer enough. Small and medium-size businesses (SMBs) should begin looking for efficient ways to expand their presence, including integrations with various shopping feeds and other outlets that can reach more consumers.

Posted in Best Practices for Merchants, Credit card Processing, e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Mobile Payments, Mobile Point of Sale, Point of Sale, Small Business Improvement, Smartphone Tagged with: , , , , , , , , , , , , , , , , , ,

February 10th, 2014 by Elma Jane

Is traditional POS on its way out? Not so fast. It is likely to be an enhancement rather than a replacement to traditional POS.

Trending topic when it comes to POS is all about the mobile kind because Mobile Point of Sale (POS) systems have rocked the retail world. When one searches the term POS, nearly every article that comes up is all about mobile. Many seem to believe it will change the retail industry.

There is definitely a need and a place for both.

Retailers everywhere have incorporated the Internet into their business model by creating multi-channel sales strategies, such as e-commerce, digital marketing, social media marketing, online product information, specifications, reviews and online customer service.

In addition to their online presence, these same retailers have started to bring the Internet in-house by integrating such services as customer centric promotions at point of sale, introducing loyalty programs and member registration, facilitating digital signage, offering e-receipts via email, and self check out centers; all at the traditional POS kiosk. In fact, 95% of all sales transactions are conducted via traditional POS terminals.

 Why bother with mobile POS anyway?

While it’s true that traditional POS system won’t be going anywhere soon and with good reason, mobile POS systems have allowed retailers to make great strides when it comes to efficiency and customer service, as well as customer satisfaction.

Companies have made big changes in the way they handle customer transactions in-store, thus affording faster checkout, waiting line reduction, consultative selling and more.

List of mobile POS benefits goes on:

Email Receipts – Better for the environment, more convenient for customers and faster to process, a digital purchase receipts sent via email tells the customer that you care about the earth and about them.

Expanded Reach – With mobile POS, your sales are no longer confined within the four walls of your brick and mortar store. Sidewalk sales, seasonal mall kiosks, and special sponsorship events are just a few examples of all the places you can take your retail sales to, with a POS in hand.

Inventory and Price Search – When customers can be assisted with finding an item color, size or availability on the spot, rather than having to wait in line to do so, it makes them happier. The same can be said for pricing. POS in the hands of store reps can go a long way toward customer satisfaction.

Inventory Return Stations – There is always a certain volume of returns, but that volume increases for retailers particularly after the holidays. The implementation of mobile POS allows for retailers to set up additional return stations in order to avoid long lines and customer frustrations.

Mobile POS goes Mobile – Your investment in your company POS system doesn’t need to be one size fits all, regardless of store traffic volume in one location or another. Retailers may opt to have a blow out sale in one location, thus require additional checkout power for that location for a specific period of time. With mobile POS, devises and licensing can be utilized throughout different store locations on an as needed basis.

Optional Seasonal Subscription – The great thing about mobile POS is that you needn’t pay for a POS system year round if you’re not using it year around. Seasonal spikes in retail sales warrant the additional cost of extra POS licensing and hardware, but the rest of the year your budget shouldn’t need to encompass more than what is needed. Mobile lets you better manage your overall POS investment.

Storewide Promotion Opportunities – Mobile POS has allowed retailers to drive sales in various sections of the store by holding demonstrations or promotions in different departments to tout products or services. Customers can be marketed and sold to, on the spot.

The growing industry of mobile payments doesn’t stop at in-store mobile POS. Digital wallets like Google Wallet and Apple Passbook, mobile-to-mobile cell phone transfers, Near Field Communication (NFC) payments, mobile device credit card swipe and other emerging technologies are quickly changing our cash and credit card world.

 What about traditional POS?

Mobile payment systems are indeed terrific. So, when should you consider going with traditional POS? The reality is,  in addition to the aforementioned benefits of traditional checkout kiosk functions, there times when mobile POS simply will not suffice.

Mobile POS is great when a customer wants to choose and pay for one item while on the sales room floor, but what about when the customer has a multitude of items? Ringing up and bagging groceries, removing anti-theft mechanisms, neatly folding and bagging clothing items and managing the sales of numerous agents, stations or departments are just a few examples of situations that often require the traditional POS checkout station.

By combining traditional POS strategies with mobile POS flexibility, retailers can leverage the command of a complex, and multi-dimensional, marketing and retail sales management system.

Posted in Credit card Processing, e-commerce & m-commerce, Electronic Payments, Internet Payment Gateway, Mobile Payments, Mobile Point of Sale, Near Field Communication, Point of Sale, Smartphone Tagged with: , , , , , , , , , , , , , , , , , , , , , , ,