Loading...

Full Block Accessibility Test

Published: August 11, 2025 by joseph.rodriguez@experian.com

At A Glance

It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

Paragraph Block- is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

my alt text
This is an image caption
This is my alt text. Sample
This image is linked to google

Heading 2

Heading 3

Heading 4

Heading 5

  • This is a list
  • Item 1
  • Item 2
    • Sub list
    • Sub list 2
    • Sub list 3
      • More list
      • More list 2
      • More list 3
        • More more

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,

ExperianThis is the citation

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,

ExperianThis is the citation
Table elementTable elementTable element
my tablemy tablemy table
Table element Table elementTable element
Test alt

Media Text Block

of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum

My Small H5 Title

unmasking romance blogs

My first column title

Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for ‘lorem ipsum’ will uncover many web sites still in their infancy.

This is alt text

My second column title

Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for ‘lorem ipsum’ will uncover many web sites still in their infancy.

Test alt

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Heading 1

This is Icon List

Heading 2

This is more info

Heading 3

Last info

Heading 1

This is Icon List

Heading 2

This is more info

Heading 3

This last icon

Loading…
FFIEC, KBA and the rest of the alphabet soup

With the most recent guidance newly issued by the Federal Financial Institutions Examination Council (FFIEC) there is renewed conversation about knowledge based authentication. I think this is a good thing.  It brings back into the forefront some of the things we have discussed for a while, like the difference between secret questions and dynamic knowledge based authentication, or the importance of risk based authentication. What does the new FFIEC guidance say about KBA?  Acknowledging that many institutions use challenge questions, the FFIEC guidance highlights that the implementation of challenge questions can greatly impact efficacy of its usefulness. Chances are you already know this.  Of greater importance, though, is the fact that the FFIEC guidelines caution on the use of less sophisticated systems and information that can be easily guessed or obtained from an Internet search, given the amount of information available.    As mentioned above, the FFIEC guidelines call for questions that “do not rely on information that is often publicly available,” recommending instead a broad range of data assets on which to base questions.  This is an area knowledge based authentication users should review carefully.  At this point in time it is perfectly appropriate to ask, “Does my KBA provider rely on data that is publicly sourced”  If you aren’t sure, ask for and review data sources.  At a minimum, you want to look for the following in your KBA provider:     ·         Questions!  Diverse questions from broad data categories, including credit and noncredit assets ·         Consumer question performance as one of the elements within an overall risk-based decisioning policy ·         Robust performance monitoring.  Monitor against established key performance indicators and do it often ·         Create a process to rotate questions and adjust access parameters and velocity limits.  Keep fraudsters guessing! ·         Use the resources that are available to you.  Experian has compiled information that you might find helpful: www.experian.com/ffiec Finally, I think the release of the new FFIEC guidelines may have made some people wonder if this is the end of KBA.  I think the answer is a resounding “No.”  Not only do the FFIEC guidelines support the continued use of knowledge based authentication, recent research suggests that KBA is the authentication tool identified as most effective by consumers.  Where I would draw caution is when research doesn’t distinguish between “secret questions” and dynamic knowledge based authentication, which we all know is very different.   

Oct 04,2011 by Guest Contributor

Monitoring risk factors – the distinction of risk analysis and data paralysis

By: Mike Horrocks Have you ever been struck by a turtle or even better burnt by water skies that were on fire?  If you are like me, these are not accidents that I think will ever happen to me and I'm not concerned that my family doctor didn't do a rotation in medical school to specialize in treating them. On October 1, 2013, however, doctors and hospitals across the U.S. will have ability to identify, log, bill, and track those accidents and thousands of other very specific medical events.  In fact the list will jump from a current 18,000 medical codes to 140,000 medical codes.  Some people hail this as a great step toward the management of all types of medical conditions, whereas others view it as a introduction of noise in a medical system already over burdened.  What does this have to do with credit risk management you ask? When I look at the amount of financial and non-financial data that the credit industry has available to understand the risk of our consumer or business clients, I wonder where we are in the range of “take two aspirins and call me in the morning” to “[the accident] occurred inside a chicken coop” (code: Y9272).   Are we only identifying a risky consumer after they have defaulted on a loan?  Or are we trying to find a pattern in the consumer's purchases at a coffee house that would correlate with some other data point to indicate risk when the moon is full? The answer is somewhere in between and it will be different for each institution.  Let’s start with what is known to be predictable when it comes to monitoring our portfolios – data and analytics, coupled with portfolio risk monitoring to minimize risk exposure – and then expand that over time.  Click here for a recent case study that demonstrates this quite successfully with one of our clients. Next steps could include adding in analytics and/or triggers to identify certain risks more specifically. When it comes to risk, incorporating attributes or a solid set of triggers, for example, that will identify risk early on and can drill down to some of the specific events, combined with technology that streamlines portfolio management processes – whether you have an existing system in place or in search of a migration – will give you better insight to the risk profile of your consumers. Think about where your organization lies on the spectrum.    If you are already monitoring your portfolio with some of these solutions, consider what the next logical step to improve the process is – is it more data, or advanced analytics using that data, a combination of both, or perhaps it's a better system in place to monitoring the risk more closely. Wherever you are, don’t let your institution have the financial equivalent need for these new medical codes W2202XA, W2202XD, and W2202XS (injuries resulting from walking into a lamppost once, twice, and sequentially).

Sep 19,2011 by

How Hackers Find Their Targets

Our guest blogger this week is Tom Bowers, Managing Director, Security Constructs LLC – a security architecture, data leakage prevention and global enterprise information consulting firm. The rash of large-scale data breaches in the news this year begs many questions, one of which is this: how do hackers select their victims? The answer: research. Hackers do their homework; in fact, an actual hack typically takes place only after many hours of first studying the target. Here’s an inside look at a hacker in action: Using search queries through such resources as Google and job sites, the hacker creates an initial map of the target’s vulnerabilities.  For example, job sites can offer a wealth of information such as hardware and software platform usage, including specific versions and its use within the enterprise. The hacker fills out the map with a complete intelligence database on your company, perhaps using public sources such as government databases, financial filings and court records. Attackers want to understand such details as how much you spend on security each year, other breaches you’ve suffered, and whether you’re using LDAP or federated authentication systems. The hacker tries to identify the person in charge of your security efforts.  As they research your Chief Security Officer or Chief Intelligence Security Officer (who they report to, conferences attended, talks given, media interviews, etc.) hackers can get a sense of whether this person is a political player or a security architect, and can infer the target’s philosophical stance on security and where they’re spending time and attention within the enterprise. Next, hackers look for business partners, strategic customers and suppliers used by the target.  Sometimes it may be easier to attack a smaller business partner than the target itself.  Once again, this information comes from basic search engine queries; attackers use job sites and corporate career sites to build a basic map of the target’s network. Once assembled, all of this information offers a list of potential and likely egress points within the target. While there is little you can do to prevent hackers from researching your company, you can reduce the threat this poses by conducting the same research yourself.  Though the process is a bit tedious to learn, it is free to use; you are simply conducting competitive intelligence upon your own enterprise.  By reviewing your own information, you can draw similar conclusions to the attackers, allowing you to strengthen those areas of your business that may be at risk. For example, if you want to understand which of your web portals may be exposed to hackers, use the following search term in Google: “site:yourcompanyname.com – www.yourcompanyname.com” This query specifies that you want to see everything on your site except WWW sites.  Web portals do not typically start with WWW and this query will show “eportal.yourcompanyname, ecomm.yourcompanyname.” Portals are a great place to start as they usually contain associated user names and passwords;   this means that a database is storing these credentials, which is a potential goldmine for attackers.  You can set up a Google Alert to constantly watch for new portals; simply type in your query, select how often you want updates, and Google will send you an alert every time a new portal shows up in its results. Knowledge is power.  The more you know about your own business, the better you can protect it from becoming prey to hacker-hawks circling in cyberspace. Download our free Data Breach Response Guide

Sep 06,2011 by Michael Bruemmer

Test

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus at nisl nunc. Sed et nunc a erat vestibulum faucibus. Sed fermentum placerat mi aliquet vulputate. In hac habitasse platea dictumst. Maecenas ante dolor, venenatis vitae neque pulvinar, gravida gravida quam. Phasellus tempor rhoncus ante, ac viverra justo scelerisque at. Sed sollicitudin elit vitae est lobortis luctus. Mauris vel ex at metus cursus vestibulum lobortis cursus quam. Donec egestas cursus ex quis molestie. Mauris vel porttitor sapien. Curabitur tempor velit nulla, in tempor enim lacinia vitae. Sed cursus nunc nec auctor aliquam. Morbi fermentum, nisl nec pulvinar dapibus, lectus justo commodo lectus, eu interdum dolor metus et risus. Vivamus bibendum dolor tellus, ut efficitur nibh porttitor nec. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Maecenas facilisis pellentesque urna, et porta risus ornare id. Morbi augue sem, finibus quis turpis vitae, lobortis malesuada erat. Nullam vehicula rutrum urna et rutrum. Mauris convallis ac quam eget ornare. Nunc pellentesque risus dapibus nibh auctor tempor. Nulla neque tortor, feugiat in aliquet eget, tempus eget justo. Praesent vehicula aliquet tellus, ac bibendum tortor ullamcorper sit amet. Pellentesque tempus lacus eget aliquet euismod. Nam quis sapien metus. Nam eu interdum orci. Sed consequat, lectus quis interdum placerat, purus leo venenatis mi, ut ullamcorper dui lorem sit amet nunc. Donec semper suscipit quam eu blandit. Sed quis maximus metus. Nullam efficitur efficitur viverra. Curabitur egestas eu arcu in cursus. H1 asdf asdf H2 H3 H4 Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum dapibus ullamcorper ex, sed congue massa. Duis at fringilla nisi. Aenean eu nibh vitae quam auctor ultrices. Donec consequat mattis viverra. Morbi sed egestas ante. Vivamus ornare nulla sapien. Integer mollis semper egestas. Cras vehicula erat eu ligula commodo vestibulum. Fusce at pulvinar urna, ut iaculis eros. Pellentesque volutpat leo non dui aliquet, sagittis auctor tellus accumsan. Curabitur nibh mauris, placerat sed pulvinar in, ullamcorper non nunc. Praesent id imperdiet lorem. H5 Curabitur id purus est. Fusce porttitor tortor ut ante volutpat egestas. Quisque imperdiet lobortis justo, ac vulputate eros imperdiet ut. Phasellus erat urna, pulvinar id turpis sit amet, aliquet dictum metus. Fusce et dapibus ipsum, at lacinia purus. Vestibulum euismod lectus quis ex porta, eget elementum elit fermentum. Sed semper convallis urna, at ultrices nibh euismod eu. Cras ultrices sem quis arcu fermentum viverra. Nullam hendrerit venenatis orci, id dictum leo elementum et. Sed mattis facilisis lectus ac laoreet. Nam a turpis mattis, egestas augue eu, faucibus ex. Integer pulvinar ut risus id auctor. Sed in mauris convallis, interdum mi non, sodales lorem. Praesent dignissim libero ligula, eu mattis nibh convallis a. Nunc pulvinar venenatis leo, ac rhoncus eros euismod sed. Quisque vulputate faucibus elit, vitae varius arcu congue et. Ut maximus felis quis diam accumsan suscipit. Etiam tellus erat, ultrices vitae molestie ut, bibendum id ipsum. Aenean eu dolor posuere, tincidunt libero vel, mattis mauris. Aliquam erat volutpat. Sed sit amet placerat nulla. Mauris diam leo, iaculis eget turpis a, condimentum laoreet ligula. Nunc in odio imperdiet, tincidunt velit in, lacinia urna. Aenean ultricies urna tempor, condimentum sem eget, aliquet sapien. Ut convallis cursus dictum. In hac habitasse platea dictumst. Ut eleifend eget erat vitae tempor. Nam tempus pulvinar dui, ac auctor augue pharetra nec. Sed magna augue, interdum a gravida ac, lacinia quis erat. Pellentesque fermentum in enim at tempor. Proin suscipit, odio ut lobortis semper, est dolor maximus elit, ac fringilla lorem ex eu mauris. Phasellus vitae elit et dui fermentum ornare. Vestibulum non odio nec nulla accumsan feugiat nec eu nibh. Cras tincidunt sem sed lacinia mollis. Vivamus augue justo, placerat vel euismod vitae, feugiat at sapien. Maecenas sed blandit dolor. Maecenas vel mauris arcu. Morbi id ligula congue, feugiat nisl nec, vulputate purus. Nunc nec aliquet tortor. Maecenas interdum lectus a hendrerit tristique. Ut sit amet feugiat velit. Test Yes asedtsdfd asdf asdf adsf Related Posts

Mar 01,2025 by Jon Mostajo, test user

Used Car Special Report: Millennials Maintain Lead in the Used Vehicle Market

With the National Automobile Dealers Association (NADA) Show set to kickoff later this week, it seemed fitting to explore how the shifting dynamics of the used vehicle market might impact dealers and buyers over the coming year. Shedding light on some of the registration and finance trends, as well as purchasing behaviors, can help dealers and manufacturers stay ahead of the curve. And just like that, the Special Report: Automotive Consumer Trends Report was born. As I was sifting through the data, one of the trends that stood out to me was the neck-and-neck race between Millennials and Gen X for supremacy in the used vehicle market. Five years ago, in 2019, Millennials were responsible for 33.3% of used retail registrations, followed by Gen X (29.5%) and Baby Boomers (26.8%). Since then, Baby Boomers have gradually fallen off, and Gen X continues to close the already minuscule gap. Through October 2024, Millennials accounted for 31.6%, while Gen X accounted for 30.4%. But trends can turn on a dime if the last year offers any indication. Over the last rolling 12 months (October 2023-October 2024), Gen X (31.4%) accounted for the majority of used vehicle registrations compared to Millennials (30.9%). Of course, the data is still close, and what 2025 holds is anyone’s guess, but understanding even the smallest changes in market share and consumer purchasing behaviors can help dealers and manufacturers adapt and navigate the road ahead. Although there are similarities between Millennials and Gen X, there are drastic differences, including motivations and preferences. Dealers and manufacturers should engage them on a generational level. What are they buying? Some of the data might not come as a surprise but it’s a good reminder that consumers are in different phases of life, meaning priorities change. Over the last rolling 12 months, Millennials over-indexed on used vans, accounting for more than one-third of registrations. Meanwhile, Gen X over-indexed on used trucks, making up nearly one-third of registrations, and Gen Z over-indexed on cars (accounting for 17.1% of used car registrations compared to 14.6% of overall used vehicle registrations). This isn’t surprising. Many Millennials have young families and may need extra space and functionality, while Gen Xers might prefer the versatility of the pickup truck—the ability to use it for work and personal use. On the other hand, Gen Zers are still early in their careers and gravitate towards the affordability and efficiency of smaller cars. Interestingly, although used electric vehicles only make up a small portion of used retail registrations (less than 1%), Millennials made up nearly 40% over the last rolling 12 months, followed by Gen X (32.2%) and Baby Boomers (15.8%). The market at a bird’s eye view Pulling back a bit on the used vehicle landscape, over the last rolling 12 months, CUVs/SUVs (38.9%) and cars (36.6%) accounted for the majority of used retail registrations. And nearly nine-in-ten used registrations were non-luxury vehicles. What’s more, ICE vehicles made up 88.5% of used retail registrations over the same period, while alternative-fuel vehicles (not including BEVs) made up 10.7% and electric vehicles made up 0.8%. At the finance level, we’re seeing the market shift ever so slightly. Since the beginning of the pandemic, one of the constant narratives in the industry has been the rising cost of owning a vehicle, both new and used. And while the average loan amount for a used non-luxury vehicle has gone up over the past five years, we’re seeing a gradual decline since 2022. In 2019, the average loan amount was $22,636 and spiked $29,983 in 2022. In 2024, the average loan amount reached $28,895. Much of the decline in average loan amounts can be attributed to the resurgence of new vehicle inventory, which has resulted in lower used values. With new leasing climbing over the past several quarters, we may see more late-model used inventory hit the market in the next few years, which will most certainly impact used financing. The used market moving forward Relying on historical data and trends can help dealers and manufacturers prepare and navigate the road ahead. Used vehicles will always fit the need for shoppers looking for their next vehicle; understanding some market trends will help ensure dealers and manufacturers can be at the forefront of helping those shoppers. For more information on the Special Report: Automotive Consumer Trends Report, visit Experian booth #627 at the NADA Show in New Orleans, January 23-26.

Jan 21,2025 by Kirsten Von Busch

Special Report: Inside the Used Vehicle Finance Market

The automotive industry is constantly changing. Shifting consumer demands and preferences, as well as dynamic economic factors, make the need for data-driven insights more important than ever. As we head into the National Automobile Dealers Association (NADA) Show this week, we wanted to explore some of the trends in the used vehicle market in our Special Report: State of the Automotive Finance Market Report. Packed with valuable insights and the latest trends, we’ll take a deep dive into the multi-faceted used vehicle market and better understand how consumers are financing used vehicles. 9+ model years grow Although late-model vehicles tend to represent much of the used vehicle finance market, we were surprised by the gradual growth of 9+ model year (MY) vehicles. In 2019, 9+MY vehicles accounted for 26.6% of the used vehicle sales. Since then, we’ve seen year-over-year growth, culminating with 9+MY vehicles making up a little more than 30% of used vehicle sales in 2024. Perhaps more interesting though, is who is financing these vehicles. Five years ago, prime and super prime borrowers represented 42.5% of 9+MY vehicles, however, in 2024, those consumers accounted for nearly 54% of 9+MY originations. Among the more popular 9+MY segments, CUVs and SUVs comprised 36.9% of sales in 2024, up from 35.2% in 2023, while cars went from 44.3% to 42.9% year-over-year and pickup trucks decreased from 15.9% to 15.6%. 2024 highlights by used vehicle age group To get a better sense of the overall used market, the segments were broken down into three age groups—9+MY, 4-8MY, and current +3MY—and to no surprise, the finance attributes vary widely. While we’ve seen the return of new vehicle inventory drive used vehicle values lower, it could be a sign that consumers are continuing to seek out affordable options that fit their lifestyle. In fact, the average loan amount for a 9+MY vehicle was $19,376 in 2024, compared to $24,198 for a vehicle between 4-8 years old and $32,381 for +3MY vehicle. Plus, more than 55% of 9+MY vehicles have monthly payments under $400. That’s not an insignificant number for people shopping with the monthly payment in mind. In 2024, the average monthly payment for a used vehicle that falls under current+3MY was $608. Meanwhile, 4-8MY vehicles came in at an average monthly payment of $498, and 9+MY vehicles had a $431 monthly payment. Taking a deeper dive into average loan amounts based on specific vehicle types—as of 2024, current +3MY cars came in at $28,721, followed by CUVs/SUVs ($31,589) and pickup trucks ($40,618). As for 4-8MY vehicles, cars came in with a loan amount of $22,013, CUVs/SUVs were at $23,133, and pickup trucks at $31,114. Used 9+MY cars had a loan amount of $19,506, CUVs/SUVs came in at $17,350, and pickup trucks at $22,369. With interest rates remaining top of mind for most consumers as we’ve seen them increase in recent years, understanding the growth from 2019-2024 can give a holistic picture of how the market has shifted over time. For instance, the average interest rate for a used current+3MY vehicle was 8.0% in 2019 and grew to 10.2% in 2024, the average rate for a 4-8MY vehicle went from 10.3% to 12.9%, and the average rate for a 9+MY vehicle increased from 11.4% to 13.8% in the same time frame. Looking ahead to the used vehicle market It’s important for automotive professionals to understand and leverage the data of the used market as it can provide valuable insights into trending consumer behavior and pricing patterns. While we don’t exactly know where the market will stand in a few years—adapting strategies based on historical data and anticipating shifts can help professionals better prepare for both challenges and opportunities in the future. As used vehicles remain a staple piece of the automotive industry, making informed decisions and optimizing inventory management will ensure agility as the market continues to shift. For more information, visit us at the Experian booth (#627) during the NADA Show in New Orleans from January 23-26.

Jan 21,2025 by Melinda Zabritski

In this article…

typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.