How Subscription Merchants Can Improve Dunning Management
According to the industry group PYMNTS, failed payments cost subscription merchants as much as 9% - 11% of their revenue. While some of that revenue loss represents ...
Games of Skill Merchants: Payments Best Practices
Companies that fall under the MCC category of “digital games” include the merchants that sell and distribute digital games or game-related products. More specificall...
What is TRID? Learn More About the Token Requestor ID
A token requestor ID (TRID) is a unique identifier that allows merchants to request network tokens from token providers and is a prerequisite for enabling network to...
2023 in Review
As 2022 came to a close, we knew we wanted to spend time on 4 key components of our product: Global expansion, developer integration experience, enhancing tokenizati...
Negative Option Subscriptions: Payments Best Practices
Negative option merchants are merchants that offer an enticing option for customers, like a free trial, that requires a credit card to sign up. The customer, in turn...
How Stripe and Other Full-Service PSPs Really Make Money
Like so many full-service payment providers, Stripe offers an apparently very simple proposition: run all your payment transactions through their system and pay a si...
What is Triangulation Fraud? How Merchants Can Prevent It
Triangulation fraud is a complicated fraud scheme that occurs, predominantly in ecommerce, between three parties: an unsuspecting customer, a fraudulent seller, and ...
Considerations when Selecting an iFrame Payment Solution
Merchants that want to integrate payments directly into their website or application have several options for doing so, but will often eventually look to iframe (inl...
Vaulted or Vaultless Tokens? Which is Best for Payments?
Tokens: What is a Token Vault? A token is a non-exploitable identifier that references sensitive data. Tokens can take any shape, are safe to expose, and are easy to...
Addressing and Reducing Delinquent Payments
Payments become delinquent when they are not made according to a pre-agreed schedule. Almost by definition, then, they are almost always associated with recurring pa...
The Real Costs of Vaulting Payments
What is Payments Vaulting? Merchants are said to be ‘vaulting payments’ when they contract with a partner, which stores sensitive cardholder data securely and provid...
The Costs of Payment Service Provider (PSP) Lock-In
What is Vendor Lock-in? Vendor lock-in describes a situation where a customer becomes entirely dependent on a specific vendor for products or services, and switching...
Meeting PCI Requirements for Encryption
The Payments Card Industry Data Security Standard (PCI DSS) outlines hundreds of requirements for storing, processing, and transmitting cardholder data. Any business...
How Universal Payment Vaults Prevent Payment Failures
What is a Universal Payment Vault? A payment vault is a storage facility where merchants securely manage customer payment details, and transmit them to payment partn...
Payment Fields Best Practices: Capture Lost Revenue
Estimates suggest that somewhere between 36% and 50% of all transactions worldwide are now completed digitally. While this may not come as a surprise to many, what m...
How to Build Your Ideal Payment Stack
Merchants strive to have a seamlessly integrated payment flow for customers. From the outside looking in, many may assume that this is achievable through a light and...
Understanding Frictionless Payments
Frictionless payments offer the least amount of effort to get a transaction closed. There is no universally accepted definition of a frictionless payment, it is more...
How 3DS Affects Merchants and Consumers in the Americas
Why Does 3D-Secure Matter? 3D Secure (3DS) provides an additional layer of security for online transactions, adding an identity confirmation partner to the standard ...
November 2023 Changelog
This November, Basis Theory introduced several enhancements geared toward expanding our Payment Stack capabilities. With a focus on providing adaptable payment solut...
How to Switch PSPs without Re-accepting Credit Cards
Merchants, especially online, have no choice but to contract with at least one payment service provider (PSP) to ensure they can execute transactions with credit car...
How to Reduce Involuntary Churn
In any subscription business, there is inevitably churn - subscribers who end their contract and move on. There is, however, a difference between those who choose to...
High-Risk Payment Processing: High-Performance Merchants
In the first four posts of this five-part series, we covered the rules of payment processing for high risk merchants, what causes processors to shut down merchants, ...
High-Risk Payment Processing: Choosing Multiple PSPs
Sophisticated high-risk merchants understand that de-risking their payments operations can truly be a game changer for their business. They see that not only is it i...
High-Risk Payment Processing: Staying Operational with One PSP
As a high-risk merchant, you know that hedging your risks can make it easier for your business to remain operational. One important way to achieve this when using a ...
5 Steps You can Take to Improve Payments Performance
Why it’s Crucial to Constantly Improve Payments Performance For any business, revenue growth is key to continued development and opportunity. And revenue growth can ...
High Risk Payment Processing: How Are Merchants Shut down?
Operating as a high-risk merchant, one of the most feared experiences is getting shut down. Even the looming threat of this happening is enough to keep many merchant...
High-Risk Payment Processing: The Rules of the Game
This is blog post one of a five-part series on the ins and outs of high-risk merchants and high-risk payment processing.
Processing Costs: Differences in Debit and Credit Cards
How Credit and Debit Cards Compare The fundamental difference between a credit and debit card is whose money is being used in the transaction: with a credit card, th...
October 2023 Changelog
October was dedicated to enhancing the developer experience at Basis Theory.
AI Solutions to Simplify Payments and Compliance: A Webinar Recap
The Basis Theory team joined a webinar hosted by the Merchant Risk Council (MRC) on November 1 titled “AI Solutions to Simplify Payment Management and Compliance”.
A Glossary of Payment Terms
The world of payment processing can be bewildering and esoteric, with its vast range of participants, processes, and industry jargon. This (admittedly incomplete!) g...
The Payment Settlement Process
What many people miss about the payment process is that there are actually a series of steps - it’s not a one-stop shop! Merchants generally will run some amount of ...
PCI DSS Requirement 12: Maintain an Information Security Policy
As outlined in sub-requirements of the other 11 requirements, documenting expectations of the security posture of an organization is fundamental to the success of th...
PCI DSS Requirement 11: Test System & Network Security Regularly
System vulnerabilities can serve as an open door for attackers to walk right into secure systems and cause significant harm. The best prevention method is to consist...
Why are Gift Card Authorization Rates So Low?
Gift card authorization rates are estimated to be 5-10% lower than standard credit card authorization rates. While this can be frustrating for merchants and customer...
PCI DSS Requirement 10: Track and Monitor Network Access
Logging mechanisms and tracked user activities are critical to preventing, detecting, or minimizing the impact of a data compromise. Implementing logs on all system ...
Basis Theory: Your Centralized Hub for PAR
As a merchant, you are likely aware of the struggle to recognize identical cards across the increasing amount of payment methods consumers use today. With numerous l...
PCI DSS Requirement 9: Restrict Physical Access to Cardholder Data
While many organizations may prioritize the digital security measures needed to protect cardholder data, physical securities shouldn’t be forgotten. All physical acc...
What are Card Issuing Platforms?
A card issuing platform enables businesses within and beyond the financial industry to easily provide branded debit and credit cards to their customers. Despite the ...
PCI DSS Requirement 8: Identify & Authenticate User Access to System Components
PCI DSS Requirement 8 provides detailed guidance on the two fundamental principles for identifying and authenticating users: establishing the identity of a person th...
What is an Issuer Processor?
An issuer processor manages key payment transaction activities for issuing entities: issuing cards, authorizing and settling transactions, and acting as a system of ...
PCI DSS Requirement 7: Restrict Cardholder Data Access
Assigning permissions carefully is one means of protecting sensitive account data by providing the minimum level of access necessary to perform an employee’s job.
Method Financial Finds Support and Growth with Basis Theory
Method Financial is a startup on a mission: to streamline the way fintech developers integrate key functionalities like real-time financial data, repayment, balance ...
Hard vs. Soft Card Declines: What They Are & How to Reduce Them
As magical as the payment process can seem when everything is going according to plan - your buyer simply types in their details, money is transferred, and you’re in...
BIN Data: Enhance Fraud Detection and Improve Customer Experience
We are thrilled to announce an enhancement to our tokenization platform: BIN Details! The BIN, or Bank Identification Number, allows access to details, a powerful to...
The Importance of a Risk Assessment for Merchants
A risk assessment is a dedicated process evaluating the likelihood of a damaging event happening. In the medical environment, it is a statistical calculation of the ...
PCI DSS Requirement 6: Develop and Maintain Secure Systems
PCI DSS Requirement 6 highlights the importance of installing security patches in order to protect systems from being accessed by anyone with malicious intentions. F...
One-time-use (Privacy) Cards and Their Benefits
A one-time-use card, also known as a privacy card, is a virtual credit or debit card number that can be used once for a single purchase. Once this purchase is comple...
PCI DSS Requirement 5: Protect All Systems and Networks from Malicious Software
Malicious software, also commonly known as malware, is any software or firmware specifically designed to cause damage to, or penetrate the security systems of, a com...