advertisement
advertisement

This is page 2 of:

Target.com Blocked, SSL Certs Blamed

July 21st, 2010

First, customers have a portal where they can control their account. Logging into that portal would display various alert messages, he said. (Although true, a retailer would likely have no reason to log in unless it had already remembered about the renewal need.)

Second, Callan said, E-mail notices are sent 90 days before expiration and then again at 30 days before expiration, and those E-mails become “increasingly frequent as we approach expiration date.”

Third, Verisign assigns major accounts “designated salespeople who are supposed to watch these accounts” for these types of expirations. At $400 per year per server per renewal for the typical account, Callan said, the sales force has an incentive to prevent an expiration problem.

Under the “interesting but not too helpful trivia” category, Callan added that the alerts are actually a function of the site visitor’s machine, comparing its date/time stamp with when the certificate broadcasts it is to expire. In other words, a visitor running into such a discouraging message could make it go away by turning his calendar back to an earlier month and trying again. Alternatively, consumers could see tons of these messages by simply setting their calendars to the year 2020.

Even though Verizon didn’t comment for this story, it’s likely that most certificate vendors follow similar procedures. E-mail messages, though, are easy to ignore, especially when they are sent frequently. Imagine an E-Commerce staffer who is overseeing dozens of sites. There needs to be a more rigorous way to avoid these expirations, perhaps incorporating phone calls and in-person visits for major accounts.

Ultimately, though, if someone on the E-Commerce team doesn’t spend the 10 minutes to renew–and do so in the very short window when it needs to happen–the site is going to get blocked. Well, “blocked” may be an overstatement, because customers clearly could ignore the warning and proceed. But it’s certainly going to discourage quite a lot of prospects.


advertisement

2 Comments | Read Target.com Blocked, SSL Certs Blamed

  1. Cricket17 Says:

    Which is why you want a PKI/Cert management group that “owns” all certs, and not leave it in the hands of various developers and business units. This helps keep an institutional memory and implement a central work flow to kick-off the internal renewal process.

  2. Brian Walker Says:

    One simple best-practice for this type of thing is for eCommerce organizations to create general mail-boxes where these types of alerts and messages can go to, with multiple resources assigned to receive and monitor them. For example: alert@retailer.com. Then there needs to be some processes in place to ensure that access to those mailboxes are transitioned along with a catalog of the certificates, subscriptions, and contracts the business is working with, including what they are for. Having joint NOC and business management monitoring of these mailboxes can help avoid the problem of a person leaving or changing roles and the ball being dropped. The certificate vendors can also mature their processes to stop requiring an individual at the client to “own” the responsibility and be the contact for the certificate, which also contributes to the problem. And finally, there is likely occasions where people get these alerts and either think they are spam or don’t really understand them, thereby not addressing them when they should. Education can help alleviate that, but many eCommerce organizations have grown and evolved a lot over the last few years with little time spent on maturing these aspects given other priorities.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.