The Entersekt Blog

Industry news, security threats, and technology advances in consumer authentication.

It’s like your credit card, only better
07-03-2019|Gerhard Oosthuizen

It’s like your credit card, only better

In the “old days” – the days of magnetic stripe cards – we proved that we were the owners of our cards with a handwritten signature at the point of sale (POS). Then came the chip cards, for which we switched to using a PIN number in card-present situations to authenticate ourselves as the card owner. This is not the case in the USA, however, where using PIN numbers for credit cards and POS purchases are rare, and cardholders continue to sign slips. Even this though, is becoming increasingly rare with US card issuers dropping the requirement for a signature without replacing it with a PIN.
The future of payments: A pool pump with a credit card?
10-01-2019|Alpa Somaiya

The future of payments: A pool pump with a credit card?

Press a button and your laundry detergent is ordered, delivered, and paid for. Your car knows when it needs repairs, books itself in, drives itself to the garage, and then pays for the service. Your fridge keeps track of what needs replacing, orders and pays for the goods. This sounded like a science fiction movie a decade ago, but thanks to the Internet of Things (IoT), it is all possible.
Ringing the changes with 3-D Secure
14-08-2018|Lelanie de Roubaix

Ringing the changes with 3-D Secure

In many ways, the evolution of the card networks’ 3-D Secure protocol is a reflection of how the world of e-commerce has changed. As with any process of change, growing pains are inevitable; in the case of 3-D Secure, they’ve been there right from the start. The imminent introduction of 3-D Secure 2.0 invites us to reflect, not only on the improvements it promises but the challenges that the industry has faced along the way.
Entersekt’s Connekt: the key to reducing cart abandonment
02-05-2018|Sherif Samy

Entersekt’s Connekt: the key to reducing cart abandonment

Cart abandonment is one of the biggest concerns for e-commerce merchants today. They are, after all, operating in a space where the customer holds the power to fill their shopping basket to the brim only to discard it at checkout if anything about the process doesn’t appeal them.
Mobile authentication: What happens when security and usability stop being mutually exclusive?
18-04-2018|Entersekt Editor

Mobile authentication: What happens when security and usability stop being mutually exclusive?

In digital banking, and more recently also in the mobile payments sphere, security and usability are commonly viewed as incompatible priorities. By implication, for security to be strong enough, it must also impose inconvenience on the user. At Entersekt, however, we prefer to ask: why do banks have to choose?
Three things you need to ask when choosing an authentication solution
28-03-2018|Jonathan Knoll

Three things you need to ask when choosing an authentication solution

I sometimes think that here, in the IT security sector, we’re having the wrong conversation about authentication. As we debate the respective merits of the various solutions, we’re in danger of forgetting the most important member of the value chain: the customer.
Mobile wallet technology boosts convenience for consumers and card issuers alike
08-03-2018|Gerhard Oosthuizen

Mobile wallet technology boosts convenience for consumers and card issuers alike

Today, mobile wallets are just one component of your institution’s overarching digital banking strategy. With the right solution in place, consumers can enjoy a superior payment experience whether shopping online, using a third-party wallet, or using a contactless payment method.
Authentication devices: are two better than one?
07-02-2018|Simon Rodway

Authentication devices: are two better than one?

At the end of 2017, two researchers at the University of Erlangen-Nuremberg in Germany discovered a weakness in the software that is used to protect 31 of the country’s mobile banking apps. As a result of this weakness, the researchers were able to successfully authenticate a transfer of money out of a banking account without the account holder’s permission.
The (lock and) key to strong security
08-01-2018|Simon Rodway

The (lock and) key to strong security

Let me begin with a short story, a true story. A good friend of mine’s house was recently broken into. He was asleep in bed when this event took place, and he heard nothing. In fact, when he got up in the morning, he didn’t even notice at first that the event had taken place, such was the subtlety of the break-in. The thief had managed to break a door lock, opening the door without making much sound at all. The technique was to snap off the front of the lock and use a screwdriver to open the door: very quiet and very quick.
Confirm your customer: how strong authentication leads to more transactions
15-11-2017|Dewald Nolte

Confirm your customer: how strong authentication leads to more transactions

Losses from card fraud approached $23 billion worldwide in 2016, according to the 2017 Nilson Report, and with the rising tide of data breaches and other cyberattacks, that sum is projected to reach $33 billion by 2021.

logo entersekt

Entersekt is an international software development company based just outside of Cape Town, South Africa.

We are leaders in authentication, app security, and payments enablement technology, offering a highly scalable solution set with a track record of success across multiple continents.