{"id":386,"date":"2026-03-16T16:51:29","date_gmt":"2026-03-16T05:51:29","guid":{"rendered":"https:\/\/nexiant.ai\/resources\/blogs\/?p=386"},"modified":"2026-03-31T17:18:49","modified_gmt":"2026-03-31T06:18:49","slug":"card-not-present-fraud-prevention","status":"publish","type":"post","link":"https:\/\/nexiant.ai\/resources\/blogs\/card-not-present-fraud-prevention\/","title":{"rendered":"Card-Not-Present Fraud Prevention: Complete CNP Security Guide"},"content":{"rendered":"\n<style>\n  .nx-blog * { box-sizing: border-box; margin: 0; padding: 0; }\n  .nx-blog {\n    font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, sans-serif;\n    font-size: 16px;\n    line-height: 1.75;\n    color: #1a1a2e;\n    max-width: 820px;\n    margin: 0 auto;\n  }\n\n  \/* \u2500\u2500 Typography \u2500\u2500 *\/\n  .nx-blog h2 {\n    font-size: 1.55rem;\n    font-weight: 700;\n    color: #00184C;\n    margin: 2.5rem 0 0.75rem;\n    padding-bottom: 0.4rem;\n    border-bottom: 3px solid #073EA1;\n  }\n  .nx-blog h3 {\n    font-size: 1.15rem;\n    font-weight: 700;\n    color: #073EA1;\n    margin: 1.75rem 0 0.5rem;\n  }\n  .nx-blog h4 {\n    font-size: 0.98rem;\n    font-weight: 700;\n    color: #00184C;\n    margin: 1.25rem 0 0.35rem;\n  }\n  .nx-blog p { margin-bottom: 1rem; }\n  .nx-blog ul, .nx-blog ol { margin: 0.5rem 0 1rem 1.4rem; }\n  .nx-blog li { margin-bottom: 0.4rem; }\n  .nx-blog strong { color: #00184C; }\n\n  \/* \u2500\u2500 Hero Banner \u2500\u2500 *\/\n  .nx-hero {\n    background: linear-gradient(135deg, #00184C 0%, #073EA1 100%);\n    color: #fff;\n    border-radius: 12px;\n    padding: 1.75rem 2rem;\n    margin-bottom: 2rem;\n  }\n  .nx-hero .nx-tag {\n    display: inline-block;\n    background: rgba(255,255,255,0.15);\n    color: #AEC9FF;\n    font-size: 0.75rem;\n    font-weight: 600;\n    text-transform: uppercase;\n    letter-spacing: 0.08em;\n    padding: 4px 12px;\n    border-radius: 20px;\n    margin-bottom: 0.6rem;\n  }\n  .nx-hero .nx-meta { font-size: 0.95rem; color: #AEC9FF; margin: 0; }\n\n  \/* \u2500\u2500 Stat Bar \u2500\u2500 *\/\n  .nx-stat-bar {\n    display: grid;\n    grid-template-columns: repeat(auto-fit, minmax(180px, 1fr));\n    gap: 12px;\n    margin: 1.5rem 0 2rem;\n  }\n  .nx-stat {\n    background: #f0f4ff;\n    border: 1px solid #d0daf5;\n    border-radius: 10px;\n    padding: 1rem 1.25rem;\n    text-align: center;\n  }\n  .nx-stat .nx-stat-num {\n    font-size: 2rem;\n    font-weight: 800;\n    color: #073EA1;\n    line-height: 1;\n    margin-bottom: 0.3rem;\n  }\n  .nx-stat .nx-stat-label { font-size: 0.82rem; color: #555; line-height: 1.4; }\n\n  \/* \u2500\u2500 Callout Boxes \u2500\u2500 *\/\n  .nx-callout {\n    border-left: 4px solid #073EA1;\n    background: #f0f4ff;\n    border-radius: 0 8px 8px 0;\n    padding: 1rem 1.25rem;\n    margin: 1.5rem 0;\n  }\n  .nx-callout.nx-callout--warning {\n    border-left-color: #A30000;\n    background: #fff5f5;\n  }\n  .nx-callout .nx-callout-title {\n    font-size: 0.8rem;\n    font-weight: 700;\n    text-transform: uppercase;\n    letter-spacing: 0.07em;\n    color: #073EA1;\n    margin-bottom: 0.4rem;\n  }\n  .nx-callout.nx-callout--warning .nx-callout-title { color: #A30000; }\n  .nx-callout p { margin: 0; font-size: 0.95rem; color: #1a1a2e; }\n\n  \/* \u2500\u2500 Fraud Methods Grid \u2500\u2500 *\/\n  .nx-grid {\n    display: grid;\n    grid-template-columns: repeat(auto-fit, minmax(180px, 1fr));\n    gap: 12px;\n    margin: 1.25rem 0 1.75rem;\n  }\n  .nx-card {\n    background: #fff;\n    border: 1px solid #d0daf5;\n    border-radius: 10px;\n    padding: 1rem;\n  }\n  .nx-card.nx-card--red {\n    border-color: #f9c0c0;\n    background: #fff8f8;\n  }\n  .nx-card-icon {\n    width: 36px;\n    height: 36px;\n    border-radius: 8px;\n    background: #A30000;\n    display: flex;\n    align-items: center;\n    justify-content: center;\n    margin-bottom: 0.6rem;\n  }\n  .nx-card-icon.nx-icon--blue { background: #073EA1; }\n  .nx-card-icon svg { width: 18px; height: 18px; fill: #fff; }\n  .nx-card h4 { font-size: 0.88rem; font-weight: 700; color: #00184C; margin-bottom: 0.2rem; }\n  .nx-card p { font-size: 0.8rem; color: #555; margin: 0; line-height: 1.5; }\n\n  \/* \u2500\u2500 3DS2 Benefits \u2500\u2500 *\/\n  .nx-benefits {\n    display: grid;\n    grid-template-columns: repeat(auto-fit, minmax(220px, 1fr));\n    gap: 12px;\n    margin: 1.25rem 0 1.75rem;\n  }\n  .nx-benefit {\n    background: #fff;\n    border: 1px solid #d0daf5;\n    border-top: 3px solid #073EA1;\n    border-radius: 0 0 10px 10px;\n    padding: 1rem;\n  }\n  .nx-benefit h4 { font-size: 0.9rem; font-weight: 700; color: #00184C; margin-bottom: 0.3rem; }\n  .nx-benefit p { font-size: 0.82rem; color: #555; margin: 0; line-height: 1.5; }\n\n  \/* \u2500\u2500 Friction Table \u2500\u2500 *\/\n  .nx-table-wrap { overflow-x: auto; margin: 1.25rem 0 1.75rem; }\n  .nx-table { width: 100%; border-collapse: collapse; font-size: 0.9rem; }\n  .nx-table thead tr { background: #00184C; color: #fff; }\n  .nx-table th { text-align: left; padding: 10px 14px; font-weight: 600; }\n  .nx-table td { padding: 9px 14px; border-bottom: 1px solid #e0e7f5; color: #1a1a2e; vertical-align: top; }\n  .nx-table tbody tr:nth-child(even) { background: #f5f8ff; }\n  .nx-badge {\n    display: inline-block;\n    font-size: 0.73rem;\n    font-weight: 600;\n    padding: 2px 9px;\n    border-radius: 20px;\n  }\n  .nx-badge--low { background: #e6f4ea; color: #1a6630; }\n  .nx-badge--med { background: #fff3cd; color: #7a5200; }\n  .nx-badge--high { background: #fde8e8; color: #A30000; }\n\n  \/* \u2500\u2500 Tech Cards \u2500\u2500 *\/\n  .nx-tech-grid {\n    display: grid;\n    grid-template-columns: repeat(auto-fit, minmax(220px, 1fr));\n    gap: 12px;\n    margin: 1.25rem 0 1.75rem;\n  }\n  .nx-tech-card {\n    background: #fff;\n    border: 1px solid #d0daf5;\n    border-radius: 10px;\n    padding: 1rem 1.1rem;\n  }\n  .nx-tech-card h4 { font-size: 0.9rem; font-weight: 700; color: #073EA1; margin-bottom: 0.4rem; }\n  .nx-tech-card ul { margin: 0 0 0 1.1rem; }\n  .nx-tech-card li { font-size: 0.82rem; color: #444; margin-bottom: 0.25rem; line-height: 1.5; }\n\n  \/* \u2500\u2500 FAQ Accordion \u2500\u2500 *\/\n  .nx-faq { margin: 1.25rem 0 1.75rem; }\n  .nx-faq-item { border: 1px solid #d0daf5; border-radius: 8px; margin-bottom: 8px; overflow: hidden; }\n  .nx-faq-q {\n    width: 100%;\n    background: #fff;\n    border: none;\n    text-align: left;\n    padding: 1rem 1.25rem;\n    font-size: 0.95rem;\n    font-weight: 600;\n    color: #00184C;\n    cursor: pointer;\n    display: flex;\n    justify-content: space-between;\n    align-items: center;\n    gap: 1rem;\n  }\n  .nx-faq-q:hover { background: #f5f8ff; }\n  .nx-faq-q .nx-chevron {\n    flex-shrink: 0;\n    width: 20px;\n    height: 20px;\n    border-radius: 50%;\n    background: #EEF2FF;\n    display: flex;\n    align-items: center;\n    justify-content: center;\n    transition: transform 0.25s;\n  }\n  .nx-faq-q .nx-chevron svg { width: 10px; height: 10px; stroke: #073EA1; fill: none; }\n  .nx-faq-q[aria-expanded=\"true\"] .nx-chevron { transform: rotate(180deg); background: #073EA1; }\n  .nx-faq-q[aria-expanded=\"true\"] .nx-chevron svg { stroke: #fff; }\n  .nx-faq-a {\n    display: none;\n    padding: 0 1.25rem 1rem;\n    font-size: 0.92rem;\n    color: #333;\n    line-height: 1.7;\n    background: #fff;\n  }\n  .nx-faq-a.open { display: block; }\n\n  \/* \u2500\u2500 CTA \u2500\u2500 *\/\n  .nx-cta {\n    background: linear-gradient(135deg, #00184C 0%, #073EA1 100%);\n    border-radius: 12px;\n    padding: 2rem;\n    text-align: center;\n    margin-top: 2.5rem;\n  }\n  .nx-cta h3 { color: #fff; font-size: 1.3rem; font-weight: 700; margin-bottom: 0.5rem; }\n  .nx-cta p { color: #AEC9FF; font-size: 0.95rem; margin-bottom: 1.25rem; }\n  .nx-cta a {\n    display: inline-block;\n    background: #E11A1A;\n    color: #fff;\n    font-weight: 700;\n    font-size: 0.95rem;\n    padding: 0.7rem 1.8rem;\n    border-radius: 6px;\n    text-decoration: none;\n    transition: background 0.2s;\n  }\n  .nx-cta a:hover { background: #A30000; }\n\n  \/* \u2500\u2500 Divider \u2500\u2500 *\/\n  .nx-divider { border: none; border-top: 1px solid #e0e7f5; margin: 2rem 0; }\n\n  \/* \u2500\u2500 Disclaimer \u2500\u2500 *\/\n  .nx-disclaimer { font-size: 0.8rem; color: #888; font-style: italic; text-align: center; margin-top: 1.5rem; }\n<\/style>\n\n<div class=\"nx-blog\">\n\n  <!-- \u2500\u2500 Hero \u2500\u2500 -->\n  <div class=\"nx-hero\">\n    <span class=\"nx-tag\">Solution Guide &nbsp;\u00b7&nbsp; March 2026<\/span>\n    <p class=\"nx-meta\">How merchants, issuers, and payment providers can combat the growing threat of card-not-present fraud using modern authentication and layered security.<\/p>\n  <\/div>\n\n  <!-- \u2500\u2500 Introduction \u2500\u2500 -->\n  <p>Card-not-present (CNP) fraud has become the dominant form of payment fraud as consumers increasingly shop online. In 2026, CNP fraud accounts for the majority of card fraud losses globally, creating significant challenges for merchants, issuers, and payment service providers.<\/p>\n\n  <p>This guide examines the CNP fraud landscape, key prevention strategies, and how modern authentication technologies like 3D Secure 2 can help organisations protect themselves and their customers.<\/p>\n\n  <div class=\"nx-stat-bar\">\n    <div class=\"nx-stat\">\n      <div class=\"nx-stat-num\">70%+<\/div>\n      <div class=\"nx-stat-label\">of card fraud in many markets is now CNP<\/div>\n    <\/div>\n    <div class=\"nx-stat\">\n      <div class=\"nx-stat-num\">50\u201370%<\/div>\n      <div class=\"nx-stat-label\">CNP fraud reduction possible with 3DS2<\/div>\n    <\/div>\n    <div class=\"nx-stat\">\n      <div class=\"nx-stat-num\">Billions<\/div>\n      <div class=\"nx-stat-label\">in global CNP fraud losses (\u00a3) annually<\/div>\n    <\/div>\n  <\/div>\n\n  <!-- \u2500\u2500 Understanding CNP Fraud \u2500\u2500 -->\n  <h2 id=\"understanding-cnp-fraud\"><span class=\"ez-toc-section\" id=\"Understanding_CNP_Fraud\"><\/span>Understanding CNP Fraud<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n  <h3 id=\"what-is-cnp-fraud\">What is CNP Fraud?<\/h3>\n  <p>Card-not-present fraud occurs when payment credentials are used for transactions where the physical card is not presented\u2014for example, online purchases, phone orders, or mail orders. Without the ability to verify the card physically or check chip authentication, fraudsters can use stolen or skimmed card details to make unauthorised purchases.<\/p>\n\n  <div class=\"nx-callout nx-callout--warning\">\n    <div class=\"nx-callout-title\">\u26a0 Growing threat<\/div>\n    <p>The shift to digital payments accelerated by COVID-19 has significantly expanded the attack surface for CNP fraud, and attack volumes have continued to rise in the years since.<\/p>\n  <\/div>\n\n  <h3 id=\"common-cnp-fraud-methods\">Common CNP Fraud Methods<\/h3>\n  <p>Fraudsters use a range of techniques to obtain and exploit payment credentials:<\/p>\n\n  <div class=\"nx-grid\">\n    <div class=\"nx-card nx-card--red\">\n      <div class=\"nx-card-icon\">\n        <svg viewBox=\"0 0 20 20\"><path d=\"M10 2a8 8 0 100 16A8 8 0 0010 2zm1 11H9V9h2v4zm0-6H9V5h2v2z\"\/><\/svg>\n      <\/div>\n      <h4>Credential Stuffing<\/h4>\n      <p>Automated attacks using stolen username\/password combinations from data breaches to access multiple accounts<\/p>\n    <\/div>\n    <div class=\"nx-card nx-card--red\">\n      <div class=\"nx-card-icon\">\n        <svg viewBox=\"0 0 20 20\"><path d=\"M2.93 17.07A10 10 0 1117.07 2.93 10 10 0 012.93 17.07zM10 4a6 6 0 100 12A6 6 0 0010 4zm1 9H9v-2h2v2zm0-4H9V7h2v2z\"\/><\/svg>\n      <\/div>\n      <h4>Phishing &amp; Social Engineering<\/h4>\n      <p>Deceptive emails, websites, or phone calls that trick consumers into revealing card details<\/p>\n    <\/div>\n    <div class=\"nx-card nx-card--red\">\n      <div class=\"nx-card-icon\">\n        <svg viewBox=\"0 0 20 20\"><path d=\"M17 8h-1V5a4 4 0 00-8 0v3H7a2 2 0 00-2 2v7a2 2 0 002 2h10a2 2 0 002-2v-7a2 2 0 00-2-2zM10 3a2 2 0 012 2v3H8V5a2 2 0 012-2zm7 14H7v-7h10v7z\"\/><\/svg>\n      <\/div>\n      <h4>Card Details Theft<\/h4>\n      <p>Stolen card numbers, expiry dates, and CVVs obtained through data breaches, skimming, or malware<\/p>\n    <\/div>\n    <div class=\"nx-card nx-card--red\">\n      <div class=\"nx-card-icon\">\n        <svg viewBox=\"0 0 20 20\"><path d=\"M10 1a9 9 0 100 18A9 9 0 0010 1zm0 2a7 7 0 110 14A7 7 0 0110 3zm-1 3v5l4 2.5-.75 1.23L8 12V6h1z\"\/><\/svg>\n      <\/div>\n      <h4>Account Takeover<\/h4>\n      <p>Fraudsters gain control of legitimate user accounts to purchase with stored payment credentials<\/p>\n    <\/div>\n  <\/div>\n\n  <!-- \u2500\u2500 Prevention Strategies \u2500\u2500 -->\n  <h2 id=\"prevention-strategies\"><span class=\"ez-toc-section\" id=\"Prevention_Strategies\"><\/span>Prevention Strategies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n  <h3 id=\"3ds2-authentication\">3D Secure 2 Authentication<\/h3>\n  <p>3DS2 is the most effective tool for preventing CNP fraud, providing strong cardholder authentication while minimising disruption to the customer journey. Its key advantages over earlier approaches are significant:<\/p>\n\n  <div class=\"nx-benefits\">\n    <div class=\"nx-benefit\">\n      <h4>Identity Verification<\/h4>\n      <p>3DS2 enables issuers to verify that the person making the transaction is the legitimate cardholder, reducing unauthorised use of stolen credentials.<\/p>\n    <\/div>\n    <div class=\"nx-benefit\">\n      <h4>Liability Shift<\/h4>\n      <p>When a transaction is successfully authenticated through 3DS2, liability for fraud-related chargebacks shifts from the merchant to the issuer.<\/p>\n    <\/div>\n    <div class=\"nx-benefit\">\n      <h4>Richer Data Sharing<\/h4>\n      <p>3DS2 enables merchants to share extensive transaction data with issuers, improving risk assessment accuracy and enabling more informed authentication decisions.<\/p>\n    <\/div>\n  <\/div>\n\n  <h3 id=\"risk-based-authentication\">Risk-Based Authentication<\/h3>\n  <p>Risk-based authentication evaluates each transaction against multiple signals to determine the appropriate level of scrutiny. Low-risk transactions proceed frictionlessly, while higher-risk transactions trigger additional verification.<\/p>\n\n  <div class=\"nx-table-wrap\">\n    <table class=\"nx-table\">\n      <thead>\n        <tr>\n          <th>Risk Level<\/th>\n          <th>Signals<\/th>\n          <th>Action<\/th>\n        <\/tr>\n      <\/thead>\n      <tbody>\n        <tr>\n          <td><span class=\"nx-badge nx-badge--low\">Low<\/span><\/td>\n          <td>Known device, typical value, familiar location, strong behavioural match<\/td>\n          <td>Frictionless \u2014 transaction proceeds seamlessly<\/td>\n        <\/tr>\n        <tr>\n          <td><span class=\"nx-badge nx-badge--med\">Medium<\/span><\/td>\n          <td>New device, slightly elevated value, minor velocity flag<\/td>\n          <td>Step-up authentication via 3DS2 challenge<\/td>\n        <\/tr>\n        <tr>\n          <td><span class=\"nx-badge nx-badge--high\">High<\/span><\/td>\n          <td>Unknown device, unusual location, high value, velocity breach<\/td>\n          <td>Manual review or decline<\/td>\n        <\/tr>\n      <\/tbody>\n    <\/table>\n  <\/div>\n\n  <h3 id=\"additional-controls\">Additional Controls<\/h3>\n\n  <div class=\"nx-callout\">\n    <div class=\"nx-callout-title\">\ud83d\udca1 Layered security<\/div>\n    <p>No single control is sufficient on its own. The most effective CNP fraud prevention combines multiple complementary measures applied at different stages of the transaction journey.<\/p>\n  <\/div>\n\n  <ul>\n    <li><strong>Address Verification (AVS):<\/strong> Compares the billing address provided at checkout with the address held by the card issuer. Mismatches can be an early fraud signal.<\/li>\n    <li><strong>CVV Verification:<\/strong> Confirms the customer has physical possession of the card. Limited in isolation as CVV data is frequently stolen alongside card numbers.<\/li>\n    <li><strong>Tokenisation:<\/strong> Replaces sensitive card data with non-sensitive tokens that are useless to fraudsters, reducing the risk and impact of data breaches.<\/li>\n  <\/ul>\n\n  <!-- \u2500\u2500 Balancing Security and Experience \u2500\u2500 -->\n  <h2 id=\"balancing-security-and-experience\"><span class=\"ez-toc-section\" id=\"Balancing_Security_and_Experience\"><\/span>Balancing Security and Experience<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n  <h3 id=\"the-friction-challenge\">The Friction Challenge<\/h3>\n  <p>Excessive security measures can degrade the customer experience, leading to cart abandonment and lost revenue. The challenge is applying appropriate friction without creating unnecessary barriers for legitimate customers.<\/p>\n\n  <div class=\"nx-callout nx-callout--warning\">\n    <div class=\"nx-callout-title\">\u26a0 False declines matter too<\/div>\n    <p>Declining legitimate transactions is a real cost. Monitoring false decline rates and engaging with issuers on their fraud rules is just as important as preventing fraudulent ones.<\/p>\n  <\/div>\n\n  <h3 id=\"best-practices\">Best Practices<\/h3>\n  <p>When additional verification is required, always explain why it is needed, provide clear instructions, minimise the steps required, and offer multiple verification methods where possible. Customers who understand why they are being asked for more information are far less likely to abandon their transaction.<\/p>\n\n  <!-- \u2500\u2500 Technology Solutions \u2500\u2500 -->\n  <h2 id=\"technology-solutions\"><span class=\"ez-toc-section\" id=\"Technology_Solutions\"><\/span>Technology Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n  <p>Modern CNP fraud prevention relies on a combination of technologies working in concert:<\/p>\n\n  <div class=\"nx-tech-grid\">\n    <div class=\"nx-tech-card\">\n      <h4>Machine Learning<\/h4>\n      <ul>\n        <li>Real-time transaction scoring<\/li>\n        <li>Pattern recognition across large volumes<\/li>\n        <li>Adaptive learning from new fraud patterns<\/li>\n        <li>Reduced false positives vs rule-based systems<\/li>\n      <\/ul>\n    <\/div>\n    <div class=\"nx-tech-card\">\n      <h4>Behavioural Analytics<\/h4>\n      <ul>\n        <li>Typing patterns and navigation behaviour<\/li>\n        <li>Mouse movements and touch interactions<\/li>\n        <li>Session duration and browsing patterns<\/li>\n        <li>Device and browser characteristics<\/li>\n      <\/ul>\n    <\/div>\n    <div class=\"nx-tech-card\">\n      <h4>Device Fingerprinting<\/h4>\n      <ul>\n        <li>Device ID and hardware characteristics<\/li>\n        <li>Browser settings and plugins<\/li>\n        <li>IP address and geolocation<\/li>\n        <li>Historical device usage patterns<\/li>\n      <\/ul>\n    <\/div>\n  <\/div>\n\n  <hr class=\"nx-divider\">\n\n  <!-- \u2500\u2500 FAQ \u2500\u2500 -->\n  <h2 id=\"frequently-asked-questions\"><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n  <div class=\"nx-faq\">\n    <div class=\"nx-faq-item\">\n      <button class=\"nx-faq-q\" aria-expanded=\"false\">\n        How much can 3DS2 reduce CNP fraud?\n        <span class=\"nx-chevron\"><svg viewBox=\"0 0 10 6\" stroke-width=\"1.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M1 1l4 4 4-4\"\/><\/svg><\/span>\n      <\/button>\n      <div class=\"nx-faq-a\">\n        Studies indicate reductions of 50\u201370% for merchants implementing strong authentication. The exact reduction depends on implementation quality, issuer adoption rates, and fraud pressures. Importantly, 3DS2 also shifts liability for authenticated transactions to issuers, providing an additional financial protection even where fraud does occur.\n      <\/div>\n    <\/div>\n    <div class=\"nx-faq-item\">\n      <button class=\"nx-faq-q\" aria-expanded=\"false\">\n        Does 3DS2 affect conversion rates?\n        <span class=\"nx-chevron\"><svg viewBox=\"0 0 10 6\" stroke-width=\"1.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M1 1l4 4 4-4\"\/><\/svg><\/span>\n      <\/button>\n      <div class=\"nx-faq-a\">\n        Unlike 3DS1, which frequently caused cart abandonment due to page redirects, 3DS2 is designed to minimise friction. Most legitimate transactions authenticate frictionlessly without customer input. Overall, 3DS2 tends to improve conversion rates compared to no authentication, while dramatically reducing fraud.\n      <\/div>\n    <\/div>\n    <div class=\"nx-faq-item\">\n      <button class=\"nx-faq-q\" aria-expanded=\"false\">\n        What is the difference between AVS and 3DS2?\n        <span class=\"nx-chevron\"><svg viewBox=\"0 0 10 6\" stroke-width=\"1.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M1 1l4 4 4-4\"\/><\/svg><\/span>\n      <\/button>\n      <div class=\"nx-faq-a\">\n        AVS (Address Verification Service) checks whether the billing address provided matches the issuer&#8217;s records\u2014a basic data check. 3DS2 provides full authentication, verifying the cardholder&#8217;s identity through the issuer. AVS is a useful supplementary control but cannot replace the protection offered by strong authentication.\n      <\/div>\n    <\/div>\n    <div class=\"nx-faq-item\">\n      <button class=\"nx-faq-q\" aria-expanded=\"false\">\n        How can we reduce false declines?\n        <span class=\"nx-chevron\"><svg viewBox=\"0 0 10 6\" stroke-width=\"1.5\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M1 1l4 4 4-4\"\/><\/svg><\/span>\n      <\/button>\n      <div class=\"nx-faq-a\">\n        False declines occur when legitimate transactions are rejected. Key strategies include implementing 3DS2 for liability protection, using risk-based authentication to apply friction only where needed, actively monitoring false decline rates, and engaging with issuers on their fraud rules to ensure your legitimate customers are not caught by overly broad filters.\n      <\/div>\n    <\/div>\n  <\/div>\n\n  <!-- \u2500\u2500 CTA \u2500\u2500 -->\n  <div class=\"nx-cta\">\n    <h3>Ready to strengthen your CNP fraud prevention?<\/h3>\n    <p>Find out how Nexiant can support your payment fraud prevention with 3D Secure 2 and advanced authentication solutions.<\/p>\n    <a href=\"\/contact-us\">Get in touch with our team<\/a>\n  <\/div>\n\n  <p class=\"nx-disclaimer\">This article is for informational purposes only and does not constitute legal or compliance advice. Organisations should consult with qualified legal professionals for guidance specific to their circumstances.<\/p>\n\n<\/div>\n\n<script>\n  document.querySelectorAll('.nx-faq-q').forEach(function(btn) {\n    btn.addEventListener('click', function() {\n      var expanded = this.getAttribute('aria-expanded') === 'true';\n      var answer = this.nextElementSibling;\n      this.setAttribute('aria-expanded', !expanded);\n      answer.classList.toggle('open', !expanded);\n    });\n  });\n<\/script>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How merchants, issuers, and payment providers can combat the growing threat of card-not-present fraud using modern authentication and layered security.<\/p>\n","protected":false},"author":2,"featured_media":390,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[40,1],"tags":[],"class_list":["post-386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-3d-secure","category-fraudprevention"],"blocksy_meta":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/posts\/386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/comments?post=386"}],"version-history":[{"count":9,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/posts\/386\/revisions"}],"predecessor-version":[{"id":396,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/posts\/386\/revisions\/396"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/media\/390"}],"wp:attachment":[{"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/media?parent=386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/categories?post=386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nexiant.ai\/resources\/blogs\/wp-json\/wp\/v2\/tags?post=386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}