— by, Andrew Gulledge The intelligent use of question weighting in KBA should be a no-brainer for anyone using out of wallet questions. Here’s...
By: Margarita Lim You may be surprised to learn that identity theft isn’t just a crime committed by an individual or individuals. There are...
By: Margarita Lim Consumer data has increasingly become commoditized over the years. There’s a lot of it and it’s arguably more easily obtainable. Social...
By: Kenneth Pruett I really thought I was going to be on easy street after receiving two emails in less than a week. The...
In my last entry I mentioned how we’re working with more and more clients that are ramping up their fraud and compliance processes to...
Another consumer protection article in the news recently highlighted some fraud best practices for social networking sites. Click here to read the article. When...
Anyone keeping tabs on the legal scene would think data breaches are something new, given all of the legislation hitting the floor of Congress,...
Quite a scary new (although in some ways old) form of identity theft in the headlines recently. Here’s a link to the article, which talks...
Working with clients in the financial sector means keeping an eye toward compliance and regulations like the Gramm-Leach-Bliley Act (GLB), the Fair Credit Reporting...
Quite a scary new (although in some ways old) form of identity theft in the headlines recently. Here’s a link to the article, which talks...
Ah…the summer vacation. I’ve just returned from mine and it got me wondering, “Do fraudsters take a vacation?” You know they must. Probably somewhere...
By: Kennis Wong In the last post, I emphasized the importance of fraud detection even after an account has been approved. If information...
By: Kennis Wong Most lenders authenticate applicants before they extend credit. With identity theft so prevalent today, not ensuring you are dealing with the real...
By: Kristan Frend It seems as though desperate times call for desperate measures- with revenues down and business loans tougher than ever to get, “shelf”...
The overarching ‘business driver’ in adopting a risk-based authentication strategy, particularly one that is founded in analytics and proven scores, is the predictive ‘lift’...