Fraud & Identity Management

Loading...

Identity fraud and the utility industry In the utility industry today, gaining enterprise-wide systemic control over credit risk assessment, identity verification and compliance oversight...

Published: April 24, 2015 by Guest Contributor

With more than one-third of customers interacting with a single business in five or more channels and more than 85 percent of consumers using...

Published: April 23, 2015 by Carrie Janot

Gift cards are the most requested gift item and have been for the last eight years. Merchants love gift cards because they take up...

Published: April 16, 2015 by Carrie Janot

Cont. Understanding Gift Card Fraud By: Angie Montoya In part one, we spoke about what an amazing deal gift cards (GCs) are, and why...

Published: March 26, 2015 by Angela Montoya

Apple Pay fraud solution Apple Pay is here and so are increased fraud exposures, confirmed losses, and customer experience challenges among card issuers. The...

Published: March 11, 2015 by Matt Tatham

Gift card fraud Gift cards have risen in popularity over the last few years— National Retail Federation anticipated more than $31B in gift card...

Published: March 5, 2015 by Angela Montoya

Reputational impact of fraud It’s all over the news. Hackers are compromising personal information and using that to access customer accounts. It’s critical that...

Published: February 27, 2015 by Matt Tatham

The experience of being a victim of data breaches has created a shift in consumer behavior and attitude over the past year. A recent...

Published: February 19, 2015 by Carrie Janot

While marketers typically spend vast amounts of money to increase customer acquisitions, fraud prevention can undercut those efforts. According to a recent 41st Parameter®...

Published: February 18, 2015 by Carrie Janot

The evolution of identity verification Knowing who you are doing business with isn’t just a sound business practice to protect your bottom line. In...

Published: February 17, 2015 by Matt Tatham

The news of the latest breach last week reported that tens of millions of customer and employee records were stolen by a sophisticated hacker...

Published: February 11, 2015 by Guest Contributor

Customer experience strategies for success Sometimes it’s easier to describe something as the opposite of something else.  Being “anti-” something can communicate something meaningful....

Published: January 27, 2015 by Kevin Poe

The availability and opportunities for customers to conduct business through mobile devices continues to multiply, challenging organizations to protect customers without impacting their experience....

Published: January 21, 2015 by Matt Tatham

Have a look ‘Inside Experian’ through this documentary on our global business explaining who we are, what we do and how we’re helping people...

Published: January 21, 2015 by Matt Tatham

“Building a better mousetrap merely results in smarter mice” – Charles Darwin Credit card issuers in general have a good handle on fraud. They...

Published: January 9, 2015 by Cherian Abraham

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image