
In this article…
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus at nisl nunc. Sed et nunc a erat vestibulum faucibus. Sed fermentum placerat mi aliquet vulputate. In hac habitasse platea dictumst. Maecenas ante dolor, venenatis vitae neque pulvinar, gravida gravida quam. Phasellus tempor rhoncus ante, ac viverra justo scelerisque at. Sed sollicitudin elit vitae est lobortis luctus. Mauris vel ex at metus cursus vestibulum lobortis cursus quam. Donec egestas cursus ex quis molestie. Mauris vel porttitor sapien. Curabitur tempor velit nulla, in tempor enim lacinia vitae. Sed cursus nunc nec auctor aliquam. Morbi fermentum, nisl nec pulvinar dapibus, lectus justo commodo lectus, eu interdum dolor metus et risus. Vivamus bibendum dolor tellus, ut efficitur nibh porttitor nec.
Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Maecenas facilisis pellentesque urna, et porta risus ornare id. Morbi augue sem, finibus quis turpis vitae, lobortis malesuada erat. Nullam vehicula rutrum urna et rutrum. Mauris convallis ac quam eget ornare. Nunc pellentesque risus dapibus nibh auctor tempor. Nulla neque tortor, feugiat in aliquet eget, tempus eget justo. Praesent vehicula aliquet tellus, ac bibendum tortor ullamcorper sit amet. Pellentesque tempus lacus eget aliquet euismod. Nam quis sapien metus. Nam eu interdum orci. Sed consequat, lectus quis interdum placerat, purus leo venenatis mi, ut ullamcorper dui lorem sit amet nunc. Donec semper suscipit quam eu blandit. Sed quis maximus metus. Nullam efficitur efficitur viverra. Curabitur egestas eu arcu in cursus.
H1
H2
H3
H4
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum dapibus ullamcorper ex, sed congue massa. Duis at fringilla nisi. Aenean eu nibh vitae quam auctor ultrices. Donec consequat mattis viverra. Morbi sed egestas ante. Vivamus ornare nulla sapien. Integer mollis semper egestas. Cras vehicula erat eu ligula commodo vestibulum. Fusce at pulvinar urna, ut iaculis eros. Pellentesque volutpat leo non dui aliquet, sagittis auctor tellus accumsan. Curabitur nibh mauris, placerat sed pulvinar in, ullamcorper non nunc. Praesent id imperdiet lorem.
H5
Curabitur id purus est. Fusce porttitor tortor ut ante volutpat egestas. Quisque imperdiet lobortis justo, ac vulputate eros imperdiet ut. Phasellus erat urna, pulvinar id turpis sit amet, aliquet dictum metus. Fusce et dapibus ipsum, at lacinia purus. Vestibulum euismod lectus quis ex porta, eget elementum elit fermentum. Sed semper convallis urna, at ultrices nibh euismod eu. Cras ultrices sem quis arcu fermentum viverra. Nullam hendrerit venenatis orci, id dictum leo elementum et. Sed mattis facilisis lectus ac laoreet. Nam a turpis mattis, egestas augue eu, faucibus ex. Integer pulvinar ut risus id auctor. Sed in mauris convallis, interdum mi non, sodales lorem. Praesent dignissim libero ligula, eu mattis nibh convallis a. Nunc pulvinar venenatis leo, ac rhoncus eros euismod sed. Quisque vulputate faucibus elit, vitae varius arcu congue et.
Ut convallis cursus dictum. In hac habitasse platea dictumst. Ut eleifend eget erat vitae tempor. Nam tempus pulvinar dui, ac auctor augue pharetra nec. Sed magna augue, interdum a gravida ac, lacinia quis erat. Pellentesque fermentum in enim at tempor. Proin suscipit, odio ut lobortis semper, est dolor maximus elit, ac fringilla lorem ex eu mauris.
- Phasellus vitae elit et dui fermentum ornare. Vestibulum non odio nec nulla accumsan feugiat nec eu nibh. Cras tincidunt sem sed lacinia mollis. Vivamus augue justo, placerat vel euismod vitae, feugiat at sapien. Maecenas sed blandit dolor. Maecenas vel mauris arcu. Morbi id ligula congue, feugiat nisl nec, vulputate purus. Nunc nec aliquet tortor. Maecenas interdum lectus a hendrerit tristique. Ut sit amet feugiat velit.
- Test
- Yes

Well, actually, it isn’t. The better question to ask is when to use knowledge based authentication (KBA). I know I have written before about using it as part of a risk based authentication approach to fraud account management, but I am often asked what I mean by that statement. So, I thought it might be a good idea to provide a few more details and give some examples. Basically, what I mean is this: risk segmentation based on binary verification is unwise. Binary verification can occur based on identity elements, or it can occur based on pass/fail performance from out of wallet questions, but the fact remains that the primary decisioning strategy is relying on a condition with two outcomes – verified or not verified, pass or fail – and that is unwise. When we recommend a risk based authentication approach, the view is more broadly based. We advocate using analytics and weighting many factors, including those identity elements and knowledge based authentication performance as part of an overall decision, rather than an as end-all decision. If you take this kind of approach, when might you want to use this kind of approach? The answer to that is just about any time a transaction contains a level of risk, understanding that each organization will have a unique definition and tolerance for “risk”. It could be an origination or account opening scenario, when you do not yet have a relationship with a consumer. It could be in an account management setting, when you have a relationship with the consumer and know their expected behavior (and therefore anything outside of expected behavior is risk). It could be in transactional settings where there is an exchange of money or information belonging to the consumer. All of these are appropriate uses for KBA as part of a risk based approach.
Issues that could have a major impact on how telecommunications, cable and energy companies conduct business will soon be decided, as all 50 state legislatures go into session. It’s not every year that this happens, since some state legislatures only meet biannually.Two Big Issues to Watch: Breach Notification & Employment Screenings1) Breach NotificationNow that 46 states have a breach notification law on the books, lawmakers are looking at whether those standards should be expanded. So far, at least 12 state legislatures are considering proposals.At the heart of all breach notification laws is a set of conditions, or “triggers,” that have to occur before a company is required to send out a breach notification to consumers. For most states, the requirement is based on some level of harm for consumers as a result of the breach. Some states have begun to look at those triggers and conclude that all types of breach, no matter the risk, should be report to consumers. Additionally, included in some pieces of legislation is a requirement to report all breaches, no matter the size, to the state attorney general. The concern of many in the private sector is that attorney general notification opens up new liabilities for companies, as many states will post a list of breaches on a government website, even if there is no harm to a consumer.States are also examining the types of information that should be provided to consumers as a result of a breach. For example, should consumers be notified of information such as the time, location and type of information exposed during a breached. The challenge is that all of this information would be made public, possibly creating additional risk.2) Employment ScreeningsWith a weakened economy, state legislators are looking for ways to help the unemployed find new work. As a result, lawmakers are looking into placing new restrictions on the ability of employers to conduct credit checks on prospective employees. The intention driving the discussion is to help consumers who might be negatively affected by poor credit history out of concern that the information will result in an individual’s ability to be hired.Currently, only four states have statutes that regulate an employer’s use credit history data. This year, at least fourteen states are considering their own restrictions.Why Check a Job Applicant’s Credit?Misconceptions about the content of credit reports used for employment purposes have encouraged the proposals. The result, however, of such legislation would be to remove a valuable tool from employers to evaluate and compare different candidates under consideration for a job.Since employers are held responsible for the actions of their employees, it’s only natural they take steps to protect themselves. Such measures are already regulated by the Fair Credit Reporting Act. Some legislatures may also soon expand those restrictions. The result of using credit is not fewer employees being hired, but hiring the best candidates for the job.What’s Next? Stay TunedAs most state legislatures are composed of part-time lawmakers, many will be in session only through April, but these trends will likely impact discussions at the national level. For instance, the Equal Employment Opportunity Commission has already held hearings to examine employers’ use of credit checks. And Congress is contemplating a national breach law.We’ll be monitoring future regulatory developments, so check back frequently or subscribe to keep up on these issues and others affecting your industry.

In a previous post (“The Benefits of Bundling”), I discussed some of the advantages that can be derived from bundling services, including: • Enhanced customer loyalty • Simplified customer experience • Time and money savings • The ability to penetrate new markets • Easier and less risky upselling path for larger share of wallet Easier said than done While the benefits may be many, making bundling work for you is no simple task. Formulating a plan to maximize upside and mitigate risk starts with a deep understanding of your customer’s ability to pay a bundled services bill. I recommend the following: Leverage your current relationship (or your partner’s relationship) with the customer to understand past payment behavior. A long history of on-time payments is obviously a good sign, but it’s not the only attribute to consider. Look at the customer’s credit score to get an idea of creditworthiness. By setting certain thresholds, you can amass a list of customers that would likely respond positively to a bundled offer and also be able to pay for it. Incorporate broader data sets to improve business intelligence and obtain a more accurate assessment of each customer’s creditworthiness. Overlaying certain attributes on top of a base credit score can help you make more effective decisions about which customers to approach with a bundled offer. In fact, even a questionable credit group might receive a positive lift by applying the right attributers (see below). Alternatively you might be able to uncover the few members of an otherwise undesirable group that have the right attributes but that might otherwise have slipped under the radar. Ultimately your goal is to determine the point at which a customer is most profitable to you versus the point at which paying the bundled bill becomes a problem. But that’s not the end of the story. Just because a customer can pay for a bundled offer doesn’t mean he or she will. Once you’ve determined the right customers to approach, your next task is to determine how to create the most appropriate mix of services to bundle, a topic that will be covered in an upcoming post. In the meantime, if there are specific topics in the realm of bundling you would like to see addressed, please be sure to comment on this post.


