{"id":1569,"date":"2015-03-12T21:26:45","date_gmt":"2015-03-12T21:26:45","guid":{"rendered":"https:\/\/www.textliving.biz\/?p=1569"},"modified":"2020-01-31T21:25:24","modified_gmt":"2020-01-31T21:25:24","slug":"secure-loyalty-program","status":"publish","type":"post","link":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/","title":{"rendered":"The Importance of Offering a Secure Loyalty Program"},"content":{"rendered":"
\r\n

The Importance of Offering a Secure Loyalty Program<\/h1>\r\n\t

I recently read an online article by Susan Torpor, about how cyber crooks are now turning their attention to those loyalty cards stuffed in wallets and dangling from keychains. Several large retailers have been forced to send a warning to their loyalty card members about security breaches in which the crooks are using up the customer\u2019s loyalty points, getting free merchandise and selling it online. It got me thinking about the trouble and money that some businesses go through in order to provide a secure loyalty program to their customers and to protect the data they acquire.<\/p>\r\n\t\t

It’s hard to believe that people would benefit from stealing loyalty program points, but you would be surprised what seems valuable to those crooks. In her article, Susan mentions how crooks rack up by acquiring gaming consoles by using stolen points and then selling them online.\u00a0Furthermore, many loyalty programs require passwords and personal data in order to join the loyalty program.\u00a0Once they hack into the account all that information is up for grabs and they certainly value that data.<\/p>\r\n\t\t

Most people have dozens of these loyalty cards hanging from their key rings or stuffed in a really fat wallet. Many people have grown tired of them, but if they frequent a place enough, they enjoy the benefits these programs provide. However, if most people are like me, they often visit a place and spend a couple of minutes looking through their wallet for the card only to not find it at all.\u00a0Well, it turns out that the cyber crooks are looking for them also.<\/p>\r\n\t\t

How do businesses deal with this new threat? Large corporations may have whole departments dedicated to security but they still have problems like Target and Toys R Us, as of late.\u00a0Loyalty programs are so important\u00a0however, the\u00a0businesses almost\u00a0are forced to provide this service to their customers. So how do businesses protect all this data collected and used alongside the loyalty cards?<\/p>\r\n\t\t

The answer is simple. Don’t collect it. \u00a0Don\u2019t\u00a0collect any personal data. Don\u2019t store personal data. Don\u2019t give swipe cards that can be lost or stolen. Instead, implement a digital rewards platform that only collects the mobile phone number and first name of the customer. \u00a0That is all the info a business needs in order to contact their customers, reward them for loyalty check-ins\u00a0and keep them coming back.<\/p>\r\n\t\t

TL Connects’ digital rewards program does just this. Businesses using this platform do not have to worry about their data getting compromised. Their customers don\u2019t have to worry about hackers stealing their hard-earned progress toward a reward. \u00a0The only way a thief can steal a customer\u2019s reward on this platform is to steal a phone and keep coming into the store to earn the reward, which of course is highly unlikely to happen. On this platform the only way a user gets the reward is to check-in with his\/her mobile phone number then show the reward text to the cashier or server. \u00a0There are no passwords to a personal account or personal information to steal. Even if their phone gets stolen or lost, the customer can still\u00a0shut it down and recover their phone number and not lose even one check-in towards their reward goal.<\/p>\r\n\t\t

Businesses using this platform do not have to worry about their database getting hacked. \u00a0All the data is kept and protected by TL Connects so the business reaps all the rewards of having the customer\u2019s data\u00a0without the worry of having to protect it. \u00a0With the mobile phone numbers collected, the business can send text messages to their subscribers alerting them to great deals and offers. They can also send automated text messages to customers who have not visited in a certain amount of time. With that feature, an absent customer gets an incentive to go back to the store\/restaurant within 7 days of getting the text to redeem the offer.<\/p>\t\r\n\t

In today\u2019s\u00a0cyber world, can your businesses afford to offer anything besides a true, secure loyalty program to your subscribers?<\/p>\r\n\r\n\r\n

*<\/span> Article referenced – Hackers target passwords and loyalty cards, by Susan Tompor<\/a><\/p>\r\n\r\n<\/div>","protected":false},"excerpt":{"rendered":"The Importance of Offering a Secure Loyalty Program I recently read an online article by Susan Torpor, about how cyber crooks are now turning their attention to those loyalty cards stuffed in wallets and dangling from keychains. Several large retailers have been forced to send a warning to their loyalty card members about security breaches […]

Read More…<\/a><\/p>","protected":false},"author":2,"featured_media":5499,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pgc_meta":"","content-type":"","footnotes":""},"categories":[15],"tags":[],"yoast_head":"\nThe importance of Offering a Secure Loyalty Program<\/title>\n<meta name=\"description\" content=\"As cyber crooks turn their focus onto loyalty programs, businesses have to ask themselves "Do I offer a Secure Loyalty Program to my subscribers?"\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The importance of Offering a Secure Loyalty Program\" \/>\n<meta property=\"og:description\" content=\"As cyber crooks turn their focus onto loyalty programs, businesses have to ask themselves "Do I offer a Secure Loyalty Program to my subscribers?"\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/\" \/>\n<meta property=\"og:site_name\" content=\"TL Connects Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-12T21:26:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-31T21:25:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2019\/07\/cyber-security-750x562@2x.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1124\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan McDonald\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan McDonald\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/\"},\"author\":{\"name\":\"Dan McDonald\",\"@id\":\"https:\/\/blog.tlconnects.com\/#\/schema\/person\/5486ab95ce169bc2623926efb185e84d\"},\"headline\":\"The Importance of Offering a Secure Loyalty Program\",\"datePublished\":\"2015-03-12T21:26:45+00:00\",\"dateModified\":\"2020-01-31T21:25:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/\"},\"wordCount\":710,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.tlconnects.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2019\/07\/cyber-security-750x562@2x.jpg\",\"articleSection\":[\"Customer Loyalty Programs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/\",\"url\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/\",\"name\":\"The importance of Offering a Secure Loyalty Program\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tlconnects.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2019\/07\/cyber-security-750x562@2x.jpg\",\"datePublished\":\"2015-03-12T21:26:45+00:00\",\"dateModified\":\"2020-01-31T21:25:24+00:00\",\"description\":\"As cyber crooks turn their focus onto loyalty programs, businesses have to ask themselves \\\"Do I offer a Secure Loyalty Program to my subscribers?\\\"\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#primaryimage\",\"url\":\"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2019\/07\/cyber-security-750x562@2x.jpg\",\"contentUrl\":\"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2019\/07\/cyber-security-750x562@2x.jpg\",\"width\":1500,\"height\":1124},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.tlconnects.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Importance of Offering a Secure Loyalty Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.tlconnects.com\/#website\",\"url\":\"https:\/\/blog.tlconnects.com\/\",\"name\":\"TL Connects Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/blog.tlconnects.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.tlconnects.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.tlconnects.com\/#organization\",\"name\":\"TL Connects Blog\",\"url\":\"https:\/\/blog.tlconnects.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tlconnects.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2020\/05\/cropped-Horizontal-TL-Logo-white.png\",\"contentUrl\":\"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2020\/05\/cropped-Horizontal-TL-Logo-white.png\",\"width\":200,\"height\":33,\"caption\":\"TL Connects Blog\"},\"image\":{\"@id\":\"https:\/\/blog.tlconnects.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.tlconnects.com\/#\/schema\/person\/5486ab95ce169bc2623926efb185e84d\",\"name\":\"Dan McDonald\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tlconnects.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/065d8be44b5987fcf3553806ca6fb377?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/065d8be44b5987fcf3553806ca6fb377?s=96&d=mm&r=g\",\"caption\":\"Dan McDonald\"},\"sameAs\":[\"http:\/\/blog.tlconnects.com\"],\"url\":\"https:\/\/blog.tlconnects.com\/author\/dmcdonald\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The importance of Offering a Secure Loyalty Program","description":"As cyber crooks turn their focus onto loyalty programs, businesses have to ask themselves \"Do I offer a Secure Loyalty Program to my subscribers?\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/","og_locale":"en_US","og_type":"article","og_title":"The importance of Offering a Secure Loyalty Program","og_description":"As cyber crooks turn their focus onto loyalty programs, businesses have to ask themselves \"Do I offer a Secure Loyalty Program to my subscribers?\"","og_url":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/","og_site_name":"TL Connects Blog","article_published_time":"2015-03-12T21:26:45+00:00","article_modified_time":"2020-01-31T21:25:24+00:00","og_image":[{"width":1500,"height":1124,"url":"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2019\/07\/cyber-security-750x562@2x.jpg","type":"image\/jpeg"}],"author":"Dan McDonald","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan McDonald","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#article","isPartOf":{"@id":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/"},"author":{"name":"Dan McDonald","@id":"https:\/\/blog.tlconnects.com\/#\/schema\/person\/5486ab95ce169bc2623926efb185e84d"},"headline":"The Importance of Offering a Secure Loyalty Program","datePublished":"2015-03-12T21:26:45+00:00","dateModified":"2020-01-31T21:25:24+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/"},"wordCount":710,"commentCount":0,"publisher":{"@id":"https:\/\/blog.tlconnects.com\/#organization"},"image":{"@id":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2019\/07\/cyber-security-750x562@2x.jpg","articleSection":["Customer Loyalty Programs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/","url":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/","name":"The importance of Offering a Secure Loyalty Program","isPartOf":{"@id":"https:\/\/blog.tlconnects.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#primaryimage"},"image":{"@id":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2019\/07\/cyber-security-750x562@2x.jpg","datePublished":"2015-03-12T21:26:45+00:00","dateModified":"2020-01-31T21:25:24+00:00","description":"As cyber crooks turn their focus onto loyalty programs, businesses have to ask themselves \"Do I offer a Secure Loyalty Program to my subscribers?\"","breadcrumb":{"@id":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.tlconnects.com\/secure-loyalty-program\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#primaryimage","url":"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2019\/07\/cyber-security-750x562@2x.jpg","contentUrl":"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2019\/07\/cyber-security-750x562@2x.jpg","width":1500,"height":1124},{"@type":"BreadcrumbList","@id":"https:\/\/blog.tlconnects.com\/secure-loyalty-program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.tlconnects.com\/"},{"@type":"ListItem","position":2,"name":"The Importance of Offering a Secure Loyalty Program"}]},{"@type":"WebSite","@id":"https:\/\/blog.tlconnects.com\/#website","url":"https:\/\/blog.tlconnects.com\/","name":"TL Connects Blog","description":"","publisher":{"@id":"https:\/\/blog.tlconnects.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.tlconnects.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.tlconnects.com\/#organization","name":"TL Connects Blog","url":"https:\/\/blog.tlconnects.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tlconnects.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2020\/05\/cropped-Horizontal-TL-Logo-white.png","contentUrl":"https:\/\/blog.tlconnects.com\/wp-content\/uploads\/2020\/05\/cropped-Horizontal-TL-Logo-white.png","width":200,"height":33,"caption":"TL Connects Blog"},"image":{"@id":"https:\/\/blog.tlconnects.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.tlconnects.com\/#\/schema\/person\/5486ab95ce169bc2623926efb185e84d","name":"Dan McDonald","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tlconnects.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/065d8be44b5987fcf3553806ca6fb377?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/065d8be44b5987fcf3553806ca6fb377?s=96&d=mm&r=g","caption":"Dan McDonald"},"sameAs":["http:\/\/blog.tlconnects.com"],"url":"https:\/\/blog.tlconnects.com\/author\/dmcdonald\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.tlconnects.com\/wp-json\/wp\/v2\/posts\/1569"}],"collection":[{"href":"https:\/\/blog.tlconnects.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.tlconnects.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.tlconnects.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.tlconnects.com\/wp-json\/wp\/v2\/comments?post=1569"}],"version-history":[{"count":0,"href":"https:\/\/blog.tlconnects.com\/wp-json\/wp\/v2\/posts\/1569\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.tlconnects.com\/wp-json\/wp\/v2\/media\/5499"}],"wp:attachment":[{"href":"https:\/\/blog.tlconnects.com\/wp-json\/wp\/v2\/media?parent=1569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.tlconnects.com\/wp-json\/wp\/v2\/categories?post=1569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.tlconnects.com\/wp-json\/wp\/v2\/tags?post=1569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}