How Loop Secures its Connected Finance Platform with Basis Theory
In the world of connected finance for Logistics, accuracy and security are paramount and Loop understands this all too well. Faced with challenges of invoice inaccur...
Insights and updates from the Basis Theory team
In the world of connected finance for Logistics, accuracy and security are paramount and Loop understands this all too well. Faced with challenges of invoice inaccur...
Electronic Benefits Transfer, or EBT, is a system that was created to allow recipients of federal support in the United States to make food purchases electronically....
Providing secure payment transactions is a shared responsibility, because so many entities are involved in an intricate chain of activities to complete a deal. Each ...
A payment aggregator is a service provider that shares their merchant account with their customers, allowing them to start accepting payments quickly and easily. Ins...
It’s easy to imagine the scariest risks of all: having your system taken over and sold back to you by ransomware, say, or a criminal ring intentionally buying all yo...
Whether you're a merchant looking to cut down on payment service fees, a startup aiming to provide solutions to an underserved region, or an online business battling...
What are Payment Analytics? Payment analytics are actionable trends organizations can identify and use to tune and accelerate their business growth. In today’s numbe...
For businesses that work with small transactions, the costs of taking credit cards can be expensive especially because of the fixed fees involved. Meanwhile, common ...
A secure payment system is one that protects customer and merchant data both in motion (during an active transaction) and at rest (when stored). There are a variety ...
Smart Routing: A Pathway to Sustainable Success Payment processing historically has taken a fairly linear path: merchants, in a hurry to get to market, have signed u...
What is Payment Automation? When we think about payment automation, the temptation is to think only about inbound payment - revenue, in other words. And, indeed, mak...
In today’s evolving payment landscape, consumers have more payment options than ever before. As a merchant, it’s important to accept the forms of payment your custom...
Merchants have access to a wealth of data points to gauge the health and success of their business. From customer acquisition cost to profit margin, the array of ava...
Unlike a vendor at a physical market stall, who can exchange goods for physical cash, merchants transacting business online must deal with an array of third parties ...
Matic Insurance is a technology-driven insurance marketplace that connects consumers with multiple carriers to provide them with personalized home and auto insurance...
The terms “payment gateway” and “payment processor” are, at times, used interchangeably in payment vernacular. And while the two are interrelated, each serves a uniq...
Merchants who build any kind of payment system must manage payments securely for a range of reasons.
Merchants often find themselves in the position of wanting, or needing to migrate to a new payment processor. This is normally either to take advantage of lower fees...
PCI-DSS is a detailed and complex security standard that any entity involved in credit card payments must adhere to. Broadly speaking, its purpose is to ensure that ...
When a payment is ready to be processed, most merchants cannot simply send it to the card network - instead they must work with a Payment Service Provider (PSP). The...
PCI-DSS (Payment Card Industry Data Security Standard) is an information security standard that must be adhered to by any organization whose involvement in the proce...
Modern consumers often prefer to transact business digitally, but there are still times when they would rather speak to a live person. For many vendors this raises t...
A high-risk merchant is one considered by card networks and their designates (payment gateways, Payment Service Providers (PSPs) and so forth) to be less safe than t...
A card network token is a string of random numbers that is used to retrieve the real Primary Account Number (PAN) from a token value, where it is securely stored to ...
We frequently mention that security is in our DNA, and we mean it.
Why test credit and debit card transactions? When you build a payment transaction system, it’s important to ensure that it is working properly.
The team at Modern Life has created a tech-enabled insurance brokerage that gives advisers tools and expert advice to serve their clients. The CTO, Jack Arenas, want...
Payment network tokenization is a process of replacing sensitive payment information, such as a credit card number, with a unique identifier or token that can be use...
In short, a third-party tokenization service provider provides services for creating, storing, and managing tokens to improve data security.
At its core, payments optimization focuses on streamlining the way businesses accept, process and manage payments to improve customer experience and cut costs. It st...
Today’s digital landscape can be hazardous for online vendors seeking to provide simple, yet fully secure, payments. Perhaps the trickiest element of securing online...
Payment service providers (PSPs) play a critical role in ensuring smooth and secure payment processing for a variety of merchants but they can pose a significant ris...
Encryption and tokenization are complementary strategic tools used by systems that need to protect sensitive information, especially in the realm of secure payments ...
Patrick Zhang, the tech lead at Passes, found himself scrambling at two in the morning to integrate a new payment service provider (PSP) after the one they were usin...
Cascading payments can be part of an intelligent payment routing strategy. In this post, we break down the details and discuss how they can influence your success ra...
Credit card tokenization is an advanced data security technique designed to protect sensitive cardholder data from being accessed through potential security breaches...
Learn about sensitive authentication data (SAD), like CVV and CVC, how it works, and why you likely can’t store it.
In this guide, we’ll review how card-on-file transactions work, examples of where they can be used, and benefits and drawbacks.
Basis Theory’s Take Long story short: PCI compliance is exceptionally difficult to maintain if you want to use email to share any kind of PII. And doing so will requ...
Did you know that the first 4-8 numbers on a payment card, known as the BIN (Bank Identification Number), actually have a specific meaning and purpose? In order to p...