In my last blog posting, I presented the foundational elements that enable risk-based authentication. These include data, detailed and granular results, analytics and decisioning. ...
By: Kristan Keelan Most financial institutions are well underway in complying with the FTC’s ID Theft Red Flags Rule by: 1. Identifying covered accounts 2. ...
By: Kristan Keelan What do you think of when you hear the word “fraud”? Someone stealing your personal identity? Perhaps the recent news story...
The term “risk-based authentication” means many things to many institutions. Some use the term to review to their processes; others, to their various service...
By: Kennis Wong As I said in my last post, when consumers and the media talk about fraud and fraud risk, they are usually referring to...
By: Kennis Wong When consumers and the media talk about fraud and fraud risk, nine out of ten times they are referring to third-party...
By: Ken Pruett I find it interesting that the media still focuses all of their attention on identity theft when it comes to credit-related...
By: Heather Grover In my previous blog, I covered top of mind issues that our clients are challenged with related to their risk based...
— by Heather Grover I’m often asked in various industry forums to give talks about, or opinions on, the latest fraud trends and fraud...
There were always questions around the likelihood that the August 1, 2009 deadline would stick. Well, the FTC has pushed out the Red Flag...
As I’ve suggested in previous postings, we’ve certainly expected more clarifying language from the Red Flags Rule drafting agencies. Well, here is some pretty...
We at Experian have been conducting a survey of visitors to our Red Flag guidelines microsite (www.experian.com/redflags). Some initial findings show that approximately 40 percent of...
One of the handful of mandatory elements in the Red Flag guidelines, which focus on FACTA Sections 114 and 315, is the implementation of...
What are your thoughts on the third extension to the Identity Theft Red Flags Rule deadline? Was your institution ready to meet Red Flag......
Does the rule list the Red Flags? The Identity Theft Red Flags Rule provides several examples of Red Flagsin four separate categories: 1. alerts...