Credit Cornerstone

Loading...

For most businesses, the customer experience is at the heart of every strategy. Debt collection shouldn’t be different. Here’s why: 21% of visits to...

November 30, 2017 by Guest Contributor

Sophisticated criminals work hard to create convincing, verifiable personas they can use to commit fraud. Here are the 3 main ways fraudsters manufacture synthetic...

November 17, 2017 by Guest Contributor

With 81% of Americans having a social media profile, you may wonder if social media insights can be used to assess credit risk. When...

November 9, 2017 by Guest Contributor

Juniper Research recently recognized Experian as a Fraud Detection and Prevention Market Leader in its Online Payment Fraud Whitepaper. Juniper also shared important market...

November 3, 2017 by Guest Contributor

Despite rising concerns about identity theft, most Americans aren’t taking basic steps to make it harder for their information to be stolen, according to...

October 26, 2017 by Guest Contributor

Synthetic identity fraud is on the rise across financial services, ecommerce, public sector, health and utilities markets. The long-term impact of synthetic identity remains...

October 26, 2017 by Guest Contributor

Our national survey found that consumers struggle to find a credit card that meets their needs. They say there are too many options and...

October 12, 2017 by Guest Contributor

The collections space has been migrating from traditional mail and outbound calls to electronic payment portals, digital collections and virtual negotiators. Now that collectors...

October 5, 2017 by Guest Contributor

With 1 in 6 U.S. residents being Hispanic, now is a great time for financial institutions to reflect on their largest growth opportunity. Here...

September 28, 2017 by Guest Contributor

Evolution of first-party fraud to third Third-party and first-party schemes are now interchangeable, and traditional fraud detection practices are less effective in fighting these...

September 22, 2017 by Guest Contributor

We recently analyzed millions of online transactions from the first half of 2017 to identify fraud attack rates. Here are the top 3 riskiest...

September 18, 2017 by Guest Contributor

Cybersecurity cannot be successful if siloed. The entire organization must be part of the effort. Take these steps to ensure a more engaged relationship...

September 7, 2017 by Guest Contributor

There’s a consensus that too many C-suite executives are disengaged with their organization’s cybersecurity efforts. That indifference can seriously hamper an organization’s ability to...

August 31, 2017 by Guest Contributor

Leadership and Cybersecurity Multiple studies suggest many executives aren’t as engaged as they should be when ensuring their organizations are prepared to mitigate and...

August 24, 2017 by Guest Contributor

There’s no shortage of headlines alluding to a student loan crisis. But is there a crisis brewing or is this just a headline grab?...

August 17, 2017 by Guest Contributor

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image