At A Glance
It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.Paragraph Block- is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.
New Text!


Heading 2
Heading 3
Heading 4
Heading 5
- This is a list
- Item 1
- Item 2
- Sub list
- Sub list 2
- Sub list 3
- More list
- More list 2
- More list 3
- More more
- More more
This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation
| Table element | Table element | Table element |
| my table | my table | my table |
| Table element | Table element | Table element |

Media Text Block
of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum
My Small H5 Title


This is the third post in our series about bundling. In the previous two posts, I discussed 1) the many benefits of bundling services and 2) how to determine who might be a good candidate for bundled services. When it comes to maximizing upside and mitigating risk, of primary concern is knowing your customer’s payment history and creditworthiness. But once you’ve identified good candidates for bundled services, just what is it you should offer? An offer they can’t refuse As with most marketing practices, there is no exact formula for creating a successful bundled package. Some considerations include: Making sure the package is worth more than the sum of its parts. If it costs the same to buy each of the services separately, your customers might very well go shopping elsewhere for each individual service. Creating a package that makes it easier to choose from various options. An overly complicated offer is more likely to drive customers away. On the other hand, an offer that simplifies your customer’s life is going to be more attractive. Ensuring that the customer feels at least one product in the bundle is a “need” item. For example, many consumers require a landline for an alarm system, which makes the landline a “need item” for them. Linking an essential service or product (“need item”) to a luxury product/service (“nice to have”) adds value to the package and makes it more attractive to certain consumers. Because the package includes a need item, these consumers would think twice before skipping a payment. Providing a few choices rather than a one-size-fits-all offer. Create several packages at different price points that include different options. To determine the most appropriate services to bundle, you need to drill down to find out what products are most appealing in a particular market. For instance, bundling might be more appealing in some higher income point populations as opposed to lower income areas. Understanding a customer’s cash flow situation and accommodating for a certain degree of bill shock can go a long way toward creating bundled offers that customers actually respond to in a positive way. Any questions? If you’re thinking about getting into the bundling game — or expanding on your current bundling strategy — you have a lot to consider beyond these three posts. If you have specific questions in the realm of bundling you would like to see addressed, please be sure to comment on this post.

Well, actually, it isn’t. The better question to ask is when to use knowledge based authentication (KBA). I know I have written before about using it as part of a risk based authentication approach to fraud account management, but I am often asked what I mean by that statement. So, I thought it might be a good idea to provide a few more details and give some examples. Basically, what I mean is this: risk segmentation based on binary verification is unwise. Binary verification can occur based on identity elements, or it can occur based on pass/fail performance from out of wallet questions, but the fact remains that the primary decisioning strategy is relying on a condition with two outcomes – verified or not verified, pass or fail – and that is unwise. When we recommend a risk based authentication approach, the view is more broadly based. We advocate using analytics and weighting many factors, including those identity elements and knowledge based authentication performance as part of an overall decision, rather than an as end-all decision. If you take this kind of approach, when might you want to use this kind of approach? The answer to that is just about any time a transaction contains a level of risk, understanding that each organization will have a unique definition and tolerance for “risk”. It could be an origination or account opening scenario, when you do not yet have a relationship with a consumer. It could be in an account management setting, when you have a relationship with the consumer and know their expected behavior (and therefore anything outside of expected behavior is risk). It could be in transactional settings where there is an exchange of money or information belonging to the consumer. All of these are appropriate uses for KBA as part of a risk based approach.
Issues that could have a major impact on how telecommunications, cable and energy companies conduct business will soon be decided, as all 50 state legislatures go into session. It’s not every year that this happens, since some state legislatures only meet biannually.Two Big Issues to Watch: Breach Notification & Employment Screenings1) Breach NotificationNow that 46 states have a breach notification law on the books, lawmakers are looking at whether those standards should be expanded. So far, at least 12 state legislatures are considering proposals.At the heart of all breach notification laws is a set of conditions, or “triggers,” that have to occur before a company is required to send out a breach notification to consumers. For most states, the requirement is based on some level of harm for consumers as a result of the breach. Some states have begun to look at those triggers and conclude that all types of breach, no matter the risk, should be report to consumers. Additionally, included in some pieces of legislation is a requirement to report all breaches, no matter the size, to the state attorney general. The concern of many in the private sector is that attorney general notification opens up new liabilities for companies, as many states will post a list of breaches on a government website, even if there is no harm to a consumer.States are also examining the types of information that should be provided to consumers as a result of a breach. For example, should consumers be notified of information such as the time, location and type of information exposed during a breached. The challenge is that all of this information would be made public, possibly creating additional risk.2) Employment ScreeningsWith a weakened economy, state legislators are looking for ways to help the unemployed find new work. As a result, lawmakers are looking into placing new restrictions on the ability of employers to conduct credit checks on prospective employees. The intention driving the discussion is to help consumers who might be negatively affected by poor credit history out of concern that the information will result in an individual’s ability to be hired.Currently, only four states have statutes that regulate an employer’s use credit history data. This year, at least fourteen states are considering their own restrictions.Why Check a Job Applicant’s Credit?Misconceptions about the content of credit reports used for employment purposes have encouraged the proposals. The result, however, of such legislation would be to remove a valuable tool from employers to evaluate and compare different candidates under consideration for a job.Since employers are held responsible for the actions of their employees, it’s only natural they take steps to protect themselves. Such measures are already regulated by the Fair Credit Reporting Act. Some legislatures may also soon expand those restrictions. The result of using credit is not fewer employees being hired, but hiring the best candidates for the job.What’s Next? Stay TunedAs most state legislatures are composed of part-time lawmakers, many will be in session only through April, but these trends will likely impact discussions at the national level. For instance, the Equal Employment Opportunity Commission has already held hearings to examine employers’ use of credit checks. And Congress is contemplating a national breach law.We’ll be monitoring future regulatory developments, so check back frequently or subscribe to keep up on these issues and others affecting your industry.
In this article…
typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


