Tag: fraud

Loading...

Let’s face it – not all knowledge based authentication (KBA) is created equal. I, too, have read horror stories of consumers forced to answer questions...

Published: February 7, 2011 by Monica Pearson

Many compliance regulations such the Red Flags Rule, USA Patriot Act, and ESIGN require specific identity elements to be verified and specific high risk...

Published: January 10, 2011 by Keir Breitenfeld

When we think about fraud prevention, naturally we think about mininizing fraud at application. We want to ensure that the identities used in the...

Published: January 10, 2011 by Matt Ehrlich

By: Staci Baker According to Wikipedia, mobile banking is defined as, “a term used for performing balance checks, account transactions, payments, credit applications, etc....

Published: December 23, 2010 by Guest Contributor

By: Ken Pruett The majority of the customers I meet with use some sort of Velocity Checks to assist with their Fraud and Compliance process. However,...

Published: December 14, 2010 by Guest Contributor

By: Andrew Gulledge Bridgekeeper: “What is the air-speed velocity of an unladen swallow?” King Arthur: “What do you mean?  An African or European swallow?” Here...

Published: December 13, 2010 by Guest Contributor

The U.S. Senate passed legislation recently that would exempt certain businesses from complying with the Red Flags Rule.  Sponsored by Senator John Thune (R-SD),...

Published: December 6, 2010 by Keir Breitenfeld

As the December 31st deadline approaches for FTC enforcement of the Red Flags Rule, we still seem quite a ways off from getting out...

Published: November 24, 2010 by Keir Breitenfeld

As E-Government customer demand and opportunity increases, so too will regulatory requirements and associated guidance become more standardized and uniformly adopted.  Regardless of credentialing...

Published: November 4, 2010 by Keir Breitenfeld

Experian recently contributed to a TSYS whitepaper focused on the various threats associated with first party fraud. I think the paper does a good job...

Published: November 3, 2010 by Keir Breitenfeld

By: Kenneth Pruett I really thought I was going to be on easy street after receiving two emails in less than a week. The...

Published: October 7, 2010 by Guest Contributor

In my last entry I mentioned how we’re working with more and more clients that are ramping up their fraud and compliance processes to...

Published: September 24, 2010 by Matt Ehrlich

Another consumer protection article in the news recently highlighted some fraud best practices for social networking sites. Click here to read the article. When...

Published: September 20, 2010 by Matt Ehrlich

Anyone keeping tabs on the legal scene would think data breaches are something new, given all of the legislation hitting the floor of Congress,...

Published: September 16, 2010 by Monica Pearson

Quite a scary new (although in some ways old) form of identity theft in the headlines recently. Here’s a link to the article, which talks...

Published: September 10, 2010 by Matt Ehrlich

Subscription title for insights blog

Description for the insights blog here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Categories title

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Subscription title 2

Description here
Subscribe Now

Text legacy

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source.

recent post

Learn More Image