At A Glance
It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.Paragraph Block- is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


Heading 2
Heading 3
Heading 4
Heading 5
- This is a list
- Item 1
- Item 2
- Sub list
- Sub list 2
- Sub list 3
- More list
- More list 2
- More list 3
- More more
- More more
This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,
ExperianThis is the citation
| Table element | Table element | Table element |
| my table | my table | my table |
| Table element | Table element | Table element |

Media Text Block
of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum
My Small H5 Title


Increased incidence of “involuntary renters” According to the Mortgage Bankers Association, one out of every 200 homes will be foreclosed. The incidence of “involuntary renters” will increase as a high foreclosure rate continues, in turn, fueling the current trend of consumers who rely solely on mobile service instead of landlines. Implications for communications companies Does it necessarily follow that foreclosure equals bad risk? I don’t think so. For example, many consumers who have undergone foreclosure were subjected to a readjusted ARM that doubled or even tripled their mortgage payments. While taking a mortgage out of a consumer’s credit file can negatively impact the overall credit score, it can also potentially generate a more positive cash flow. The consumer’s new rent payments would be lower than the readjusted mortgage would have been, making the consumer a potentially good customer for communications services. Wireless companies, in particular, prefer to approve customers for regular installment plans (as opposed to prepaid plans). The goal, for nearly all communications companies, is to qualify customers for service without the need for a deposit. The key, when assessing credit risk, is to look at the total credit/payment history, not just the credit score alone. Best Practices for qualifying involuntary renters: Validate ID/authenticate. Checking the credit application information against several data sources will help avoid potential fraud. Look at the overall credit picture, especially the current debt-to-income ratio. Review third-party data for payment history. Along with the typical payment data, Experian now offers rental histories through RentBureau. This data has the ability to increase credit report accuracy for renters. Consider the basic lender mentality. Consumers who have exhibited good payment history on utilities, credit cards, and other debt in the past are likely to continue that behavior despite having lost their house to foreclosure. Considering the total credit picture allows you to rank-order customers and group them into populations that are lower risk, identifying, for example, those who can be serviced without an upfront deposit. In future posts, I’ll provide some guidance for rank-ordering customers as to their credit-worthiness.

In an attempt to out-innovate competitors, today’s communications companies seem busier than ever. The number of new products, services, devices and bundles continues to skyrocket, giving consumers more shiny new options than ever before. A double-edged sword More choices means greater opportunity to cross-sell, upsell or otherwise optimize customer value. But there is also increased risk, due to process or information gaps between internal acquisition, billing, account management and collections teams. There are also threats from the outside. Avoid being hit by “cyclers” These include hard-to-monitor, multiple-account households, and high-risk account “cyclers” who attempt to game the system by manipulating personal data; for example, providing different information when opening an account, buying a device or activating service. Undetected, such activity can severely impact corporate profitability. Fortunately, you can gain a clearer picture of both positive and negative activity by using assets and resources you already own. Extra benefits. No extra cost. The first step is working with IT to better mine internal data by linking disparate databases together (tips and best practices will be presented in future posts). This will give you a holistic view of all accounts. Experian recently did this with greater-than-expected success. In a similar effort, one utility we know identified more than $2.5 million in uncollected bad debt from current, active customers. What benefits can you expect? Besides gaining insight into driving the full value of multi-product customers, linking together internal data sources also enables you to: Illuminate resell/cross-sell opportunities and unfulfilled revenue potential Mitigate risk by identifying low value, high risk customers, and fraudulent behaviors Help in-house credit professionals “bridge the gap” with marketing and work in a more collaborative and integrated fashion Improve the customer experience across sales and support Best practices yield best results You already own the data you need. The secret to success is linking it together and putting it to work—without burdening already overworked teams. A structured set of best practices can make it happen. So what say you? What challenges does your communications company face with regard to customer data?

Experian’s Fraud and Identity Solutions team recently conducted a webinar entitled: “A risk-based approach to finding opportunity in today’s market: New approaches to fraud, compliance, and operational efficiency in an evolving economy.” I specifically discussed the current business drivers and fraud trends we, as a consumer and commercial authentication services provider, hear most often from our existing and potential clients. I was encouraged to have the following forces validated by our audience, and I thought they’d be worth sharing with you via this forum. In what I believe to be rank order with most influencing first: Customer experience is king. The addressable market for most of our clients is effectively an ever more limited pool of viable consumers. From the consumer’s perspective it’s a ‘buyer’s market’. ‘Good’ consumers know they are ‘good’ and those 750 scorers don’t tolerate poor customer service. Risk seeking credit policies may be making a comeback. Many of our clients are starting to heal from the past few years, and are ready to get back on the bike. However, this does open the door more widely for application fraud activity and risk. New products and associated solicitations and access channels translate to higher risk as fraud prevention and fraud detection processes may be less robust in the early launch stages and certainly less time-tested. Human & IT resources are still in short supply. As these new channels open and fraud risk increases, necessary fraud prevention and authentication oriented resources are still overly constrained and often significantly lagging in proportionality behind the recovery-minded marketing minds. Regulatory pressures continue to equate to higher operational costs, in the form of fraud referral rates, in process engineering and human intervention and activities, not to mention the opportunity costs associated with denial of service to those ‘good’ consumers I just mentioned. So, hosted services and solutions are where it’s at these days. Our clients want their vendors, including us at Experian, to save their IT resources, deliver quicker to market services, such as fraud models, knowledge based authentication, and other authentication tools, and provide collective capabilities that would otherwise be years away if left to the mercy of their internal development queues. All products and processes are under review, as you might imagine. Cost control is no longer a back-burner policy and focus. ROI is the key metric these days, and likely above any other. Our clients demand flexible tools that can be deployed in multiple process points and across multiple business units. Blanket policies (including fraud prevention and authentication) are no longer good enough. Our clients’ tailored products, access channels, and market segmentations require the same level of unique design in the products we deliver.
In this article…
typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


