At A Glance
It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.Paragraph Block- is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


Heading 2
Heading 3
Heading 4
Heading 5
- This is a list
- Item 1
- Item 2
- Sub list
- Sub list 2
- Sub list 3
- More list
- More list 2
- More list 3
- More more
- More more
This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation
| Table element | Table element | Table element |
| my table | my table | my table |
| Table element | Table element | Table element |

Media Text Block
of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum
My Small H5 Title


Well, actually, it isn’t. The better question to ask is when to use knowledge based authentication (KBA). I know I have written before about using it as part of a risk based authentication approach to fraud account management, but I am often asked what I mean by that statement. So, I thought it might be a good idea to provide a few more details and give some examples. Basically, what I mean is this: risk segmentation based on binary verification is unwise. Binary verification can occur based on identity elements, or it can occur based on pass/fail performance from out of wallet questions, but the fact remains that the primary decisioning strategy is relying on a condition with two outcomes – verified or not verified, pass or fail – and that is unwise. When we recommend a risk based authentication approach, the view is more broadly based. We advocate using analytics and weighting many factors, including those identity elements and knowledge based authentication performance as part of an overall decision, rather than an as end-all decision. If you take this kind of approach, when might you want to use this kind of approach? The answer to that is just about any time a transaction contains a level of risk, understanding that each organization will have a unique definition and tolerance for “risk”. It could be an origination or account opening scenario, when you do not yet have a relationship with a consumer. It could be in an account management setting, when you have a relationship with the consumer and know their expected behavior (and therefore anything outside of expected behavior is risk). It could be in transactional settings where there is an exchange of money or information belonging to the consumer. All of these are appropriate uses for KBA as part of a risk based approach.
Issues that could have a major impact on how telecommunications, cable and energy companies conduct business will soon be decided, as all 50 state legislatures go into session. It’s not every year that this happens, since some state legislatures only meet biannually.Two Big Issues to Watch: Breach Notification & Employment Screenings1) Breach NotificationNow that 46 states have a breach notification law on the books, lawmakers are looking at whether those standards should be expanded. So far, at least 12 state legislatures are considering proposals.At the heart of all breach notification laws is a set of conditions, or “triggers,” that have to occur before a company is required to send out a breach notification to consumers. For most states, the requirement is based on some level of harm for consumers as a result of the breach. Some states have begun to look at those triggers and conclude that all types of breach, no matter the risk, should be report to consumers. Additionally, included in some pieces of legislation is a requirement to report all breaches, no matter the size, to the state attorney general. The concern of many in the private sector is that attorney general notification opens up new liabilities for companies, as many states will post a list of breaches on a government website, even if there is no harm to a consumer.States are also examining the types of information that should be provided to consumers as a result of a breach. For example, should consumers be notified of information such as the time, location and type of information exposed during a breached. The challenge is that all of this information would be made public, possibly creating additional risk.2) Employment ScreeningsWith a weakened economy, state legislators are looking for ways to help the unemployed find new work. As a result, lawmakers are looking into placing new restrictions on the ability of employers to conduct credit checks on prospective employees. The intention driving the discussion is to help consumers who might be negatively affected by poor credit history out of concern that the information will result in an individual’s ability to be hired.Currently, only four states have statutes that regulate an employer’s use credit history data. This year, at least fourteen states are considering their own restrictions.Why Check a Job Applicant’s Credit?Misconceptions about the content of credit reports used for employment purposes have encouraged the proposals. The result, however, of such legislation would be to remove a valuable tool from employers to evaluate and compare different candidates under consideration for a job.Since employers are held responsible for the actions of their employees, it’s only natural they take steps to protect themselves. Such measures are already regulated by the Fair Credit Reporting Act. Some legislatures may also soon expand those restrictions. The result of using credit is not fewer employees being hired, but hiring the best candidates for the job.What’s Next? Stay TunedAs most state legislatures are composed of part-time lawmakers, many will be in session only through April, but these trends will likely impact discussions at the national level. For instance, the Equal Employment Opportunity Commission has already held hearings to examine employers’ use of credit checks. And Congress is contemplating a national breach law.We’ll be monitoring future regulatory developments, so check back frequently or subscribe to keep up on these issues and others affecting your industry.

In a previous post (“The Benefits of Bundling”), I discussed some of the advantages that can be derived from bundling services, including: • Enhanced customer loyalty • Simplified customer experience • Time and money savings • The ability to penetrate new markets • Easier and less risky upselling path for larger share of wallet Easier said than done While the benefits may be many, making bundling work for you is no simple task. Formulating a plan to maximize upside and mitigate risk starts with a deep understanding of your customer’s ability to pay a bundled services bill. I recommend the following: Leverage your current relationship (or your partner’s relationship) with the customer to understand past payment behavior. A long history of on-time payments is obviously a good sign, but it’s not the only attribute to consider. Look at the customer’s credit score to get an idea of creditworthiness. By setting certain thresholds, you can amass a list of customers that would likely respond positively to a bundled offer and also be able to pay for it. Incorporate broader data sets to improve business intelligence and obtain a more accurate assessment of each customer’s creditworthiness. Overlaying certain attributes on top of a base credit score can help you make more effective decisions about which customers to approach with a bundled offer. In fact, even a questionable credit group might receive a positive lift by applying the right attributers (see below). Alternatively you might be able to uncover the few members of an otherwise undesirable group that have the right attributes but that might otherwise have slipped under the radar. Ultimately your goal is to determine the point at which a customer is most profitable to you versus the point at which paying the bundled bill becomes a problem. But that’s not the end of the story. Just because a customer can pay for a bundled offer doesn’t mean he or she will. Once you’ve determined the right customers to approach, your next task is to determine how to create the most appropriate mix of services to bundle, a topic that will be covered in an upcoming post. In the meantime, if there are specific topics in the realm of bundling you would like to see addressed, please be sure to comment on this post.
In this article…
typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


