Loading...

Test

Published: March 1, 2025 by Jon Mostajo, test user

In this article…

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus at nisl nunc. Sed et nunc a erat vestibulum faucibus. Sed fermentum placerat mi aliquet vulputate. In hac habitasse platea dictumst. Maecenas ante dolor, venenatis vitae neque pulvinar, gravida gravida quam. Phasellus tempor rhoncus ante, ac viverra justo scelerisque at. Sed sollicitudin elit vitae est lobortis luctus. Mauris vel ex at metus cursus vestibulum lobortis cursus quam. Donec egestas cursus ex quis molestie. Mauris vel porttitor sapien. Curabitur tempor velit nulla, in tempor enim lacinia vitae. Sed cursus nunc nec auctor aliquam. Morbi fermentum, nisl nec pulvinar dapibus, lectus justo commodo lectus, eu interdum dolor metus et risus. Vivamus bibendum dolor tellus, ut efficitur nibh porttitor nec.

Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Maecenas facilisis pellentesque urna, et porta risus ornare id. Morbi augue sem, finibus quis turpis vitae, lobortis malesuada erat. Nullam vehicula rutrum urna et rutrum. Mauris convallis ac quam eget ornare. Nunc pellentesque risus dapibus nibh auctor tempor. Nulla neque tortor, feugiat in aliquet eget, tempus eget justo. Praesent vehicula aliquet tellus, ac bibendum tortor ullamcorper sit amet. Pellentesque tempus lacus eget aliquet euismod. Nam quis sapien metus. Nam eu interdum orci. Sed consequat, lectus quis interdum placerat, purus leo venenatis mi, ut ullamcorper dui lorem sit amet nunc. Donec semper suscipit quam eu blandit. Sed quis maximus metus. Nullam efficitur efficitur viverra. Curabitur egestas eu arcu in cursus.

H1

H2

H3

H4

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum dapibus ullamcorper ex, sed congue massa. Duis at fringilla nisi. Aenean eu nibh vitae quam auctor ultrices. Donec consequat mattis viverra. Morbi sed egestas ante. Vivamus ornare nulla sapien. Integer mollis semper egestas. Cras vehicula erat eu ligula commodo vestibulum. Fusce at pulvinar urna, ut iaculis eros. Pellentesque volutpat leo non dui aliquet, sagittis auctor tellus accumsan. Curabitur nibh mauris, placerat sed pulvinar in, ullamcorper non nunc. Praesent id imperdiet lorem.

H5

Curabitur id purus est. Fusce porttitor tortor ut ante volutpat egestas. Quisque imperdiet lobortis justo, ac vulputate eros imperdiet ut. Phasellus erat urna, pulvinar id turpis sit amet, aliquet dictum metus. Fusce et dapibus ipsum, at lacinia purus. Vestibulum euismod lectus quis ex porta, eget elementum elit fermentum. Sed semper convallis urna, at ultrices nibh euismod eu. Cras ultrices sem quis arcu fermentum viverra. Nullam hendrerit venenatis orci, id dictum leo elementum et. Sed mattis facilisis lectus ac laoreet. Nam a turpis mattis, egestas augue eu, faucibus ex. Integer pulvinar ut risus id auctor. Sed in mauris convallis, interdum mi non, sodales lorem. Praesent dignissim libero ligula, eu mattis nibh convallis a. Nunc pulvinar venenatis leo, ac rhoncus eros euismod sed. Quisque vulputate faucibus elit, vitae varius arcu congue et.

Ut maximus felis quis diam accumsan suscipit. Etiam tellus erat, ultrices vitae molestie ut, bibendum id ipsum. Aenean eu dolor posuere, tincidunt libero vel, mattis mauris. Aliquam erat volutpat. Sed sit amet placerat nulla. Mauris diam leo, iaculis eget turpis a, condimentum laoreet ligula. Nunc in odio imperdiet, tincidunt velit in, lacinia urna. Aenean ultricies urna tempor, condimentum sem eget, aliquet sapien.

Ut convallis cursus dictum. In hac habitasse platea dictumst. Ut eleifend eget erat vitae tempor. Nam tempus pulvinar dui, ac auctor augue pharetra nec. Sed magna augue, interdum a gravida ac, lacinia quis erat. Pellentesque fermentum in enim at tempor. Proin suscipit, odio ut lobortis semper, est dolor maximus elit, ac fringilla lorem ex eu mauris.

  • Phasellus vitae elit et dui fermentum ornare. Vestibulum non odio nec nulla accumsan feugiat nec eu nibh. Cras tincidunt sem sed lacinia mollis. Vivamus augue justo, placerat vel euismod vitae, feugiat at sapien. Maecenas sed blandit dolor. Maecenas vel mauris arcu. Morbi id ligula congue, feugiat nisl nec, vulputate purus. Nunc nec aliquet tortor. Maecenas interdum lectus a hendrerit tristique. Ut sit amet feugiat velit.
  • Test
  • Yes
Unmasking Romance Scams

As Valentine’s Day approaches, hearts will melt, but some will inevitably be broken by romance scams. This season of love creates an opportune moment for scammers to prey on individuals feeling lonely or seeking connection. Financial institutions should take this time to warn customers about the heightened risks and encourage vigilance against fraud. In a tale as heart-wrenching as it is cautionary, a French woman named Anne was conned out of nearly $855,000 in a romance scam that lasted over a year. Believing she was communicating with Hollywood star Brad Pitt; Anne was manipulated by scammers who leveraged AI technology to impersonate the actor convincingly. Personalized messages, fabricated photos, and elaborate lies about financial needs made the scam seem credible. Anne’s story, though extreme, highlights the alarming prevalence and sophistication of romance scams in today’s digital age. According to the Federal Trade Commission (FTC), nearly 70,000 Americans reported romance scams in 2022, with losses totaling $1.3 billion—an average of $4,400 per victim. These scams, which play on victims’ emotions, are becoming increasingly common and devastating, targeting individuals of all ages and backgrounds. Financial institutions have a crucial role in protecting their customers from these schemes. The lifecycle of a romance scam Romance scams follow a consistent pattern: Feigned connection: Scammers create fake profiles on social media or dating platforms using attractive photos and minimal personal details. Building trust: Through lavish compliments, romantic conversations, and fabricated sob stories, scammers forge emotional bonds with their targets. Initial financial request: Once trust is established, the scammer asks for small financial favors, often citing emergencies. Escalation: Requests grow larger, with claims of dire situations such as medical emergencies or legal troubles. Disappearance: After draining the victim’s funds, the scammer vanishes, leaving emotional and financial devastation in their wake. Lloyds Banking Group reports that men made up 52% of romance scam victims in 2023, though women lost more on average (£9,083 vs. £5,145). Individuals aged 55-64 were the most susceptible, while those aged 65-74 faced the largest losses, averaging £13,123 per person. Techniques scammers use Romance scammers are experts in manipulation. Common tactics include: Fabricated sob stories: Claims of illness, injury, or imprisonment. Investment opportunities: Offers to “teach” victims about investing. Military or overseas scenarios: Excuses for avoiding in-person meetings. Gift and delivery scams: Requests for money to cover fake customs fees. How financial institutions can help Banks and financial institutions are on the frontlines of combating romance scams. By leveraging technology and adopting proactive measures, they can intercept fraud before it causes irreparable harm. 1. Customer education and awareness Conduct awareness campaigns to educate clients about common scam tactics. Provide tips on recognizing fake profiles and unsolicited requests. Share real-life stories, like Anne’s, to highlight the risks. 2. Advanced data capture solutions Implement systems that gather and analyze real-time customer data, such as IP addresses, browsing history, and device usage patterns. Use behavioral analytics to detect anomalies in customer actions, such as hesitation or rushed transactions, which may indicate stress or coercion. 3. AI and machine learning Utilize AI-driven tools to analyze vast datasets and identify suspicious patterns. Deploy daily adaptive models to keep up with emerging fraud trends. 4. Real-time fraud interception Establish rules and alerts to flag unusual transactions. Intervene with personalized messages before transfers occur, asking “Do you know and trust this person?” Block transactions if fraud is suspected, ensuring customers’ funds are secure. Collaborating for greater impact Financial institutions cannot combat romance scams alone. Partnerships with social media platforms, AI companies, and law enforcement are essential. Social media companies must shut down fake profiles proactively, while regulatory frameworks should enable banks to share information about at-risk customers. Conclusion Romance scams exploit the most vulnerable aspects of human nature: the desire for love and connection. Stories like Anne’s underscore the emotional and financial toll these scams take on victims. However, with robust technological solutions and proactive measures, financial institutions can play a pivotal role in protecting their customers. By staying ahead of fraud trends and educating clients, banks can ensure that the pursuit of love remains a source of joy, not heartbreak. Learn more

Feb 05,2025 by Alex Lvoff

How Identity Protection for Your Employees Can Reduce Your Data Breach Risk

As data breaches become an ever-growing threat to businesses, the role of employees in maintaining cybersecurity has never been more critical. Did you know that 82% of data breaches involve the human element1 , such as phishing, stolen credentials, or social engineering tactics? These statistics reveal a direct connection between employee identity theft and business vulnerabilities. In this blog, we’ll explore why protecting your employees’ identities is essential to reducing data breach risk, how employee-focused identity protection programs, and specifically employee identity protection, improve both cybersecurity and employee engagement, and how businesses can implement comprehensive solutions to safeguard sensitive data and enhance overall workforce well-being. The Rising Challenge: Data Breaches and Employee Identity Theft The past few years have seen an exponential rise in data breaches. According to the Identity Theft Resource Center, there were 1,571 data compromises in the first half of 2024, impacting more than 1.1 billion individuals – a 490% increase year over year2. A staggering proportion of these breaches originated from compromised employee credentials or phishing attacks. Explore Experian's Employee Benefits Solutions The Link Between Employee Identity Theft and Cybersecurity Risks Phishing and Social EngineeringPhishing attacks remain one of the top strategies used by cybercriminals. These attacks often target employees by exploiting personal information stolen through identity theft. For example, a cybercriminal who gains access to an employee's compromised email or social accounts can use this information to craft realistic phishing messages, tricking them into divulging sensitive company credentials. Compromised Credentials as Entry PointsCompromised employee credentials were responsible for 16% of breaches and were the costliest attack vector, averaging $4.5 million per breach3. When an employee’s identity is stolen, it can give hackers a direct line to your company’s network, jeopardizing sensitive data and infrastructure. The Cost of DowntimeBeyond the financial impact, data breaches disrupt operations, erode customer trust, and harm your brand. For businesses, the average downtime from a breach can last several weeks – time that could otherwise be spent growing revenue and serving clients. Why Businesses Need to Prioritize Employee Identity Protection Protecting employee identities isn’t just a personal benefit – it’s a strategic business decision. Here are three reasons why identity protection for employees is essential to your cybersecurity strategy: 1. Mitigate Human Risk in Cybersecurity Employee mistakes, often resulting from phishing scams or misuse of credentials, are a leading cause of breaches. By equipping employees with identity protection services, businesses can significantly reduce the likelihood of stolen information being exploited by fraudsters and cybercriminals. 2. Boost Employee Engagement and Financial Wellness Providing identity protection as part of an employee benefits package signals that you value your workforce’s security and well-being. Beyond cybersecurity, offering such protections can enhance employee loyalty, reduce stress, and improve productivity. Employers who pair identity protection with financial wellness tools can empower employees to monitor their credit, secure their finances, and protect against fraud, all of which contribute to a more engaged workforce. 3. Enhance Your Brand Reputation A company’s cybersecurity practices are increasingly scrutinized by customers, stakeholders, and regulators. When you demonstrate that you prioritize not just protecting your business, but also safeguarding your employees’ identities, you position your brand as a leader in security and trustworthiness. Practical Strategies to Protect Employee Identities and Reduce Data Breach Risk How can businesses take actionable steps to mitigate risks and protect their employees? Here are some best practices: Offer Comprehensive Identity Protection Solutions A robust identity protection program should include: Real-time monitoring for identity theft Alerts for suspicious activity on personal accounts Data and device protection to protect personal information and devices from identity theft, hacking and other online threats Fraud resolution services for affected employees Credit monitoring and financial wellness tools Leading providers like Experian offer customizable employee benefits packages that provide proactive identity protection, empowering employees to detect and resolve potential risks before they escalate. Invest in Employee Education and Training Cybersecurity is only as strong as your least-informed employee. Provide regular training sessions and provide resources to help employees recognize phishing scams, understand the importance of password hygiene, and learn how to avoid oversharing personal data online. Implement Multi-Factor Authentication (MFA) MFA adds an extra layer of security, requiring employees to verify their identity using multiple credentials before accessing sensitive systems. This can drastically reduce the risk of compromised credentials being misused. Partner with a Trusted Identity Protection Provider Experian’s suite of employee benefits solutions combines identity protection with financial wellness tools, helping your employees stay secure while also boosting their financial confidence. Only Experian can offer these integrated solutions with unparalleled expertise in both identity protection and credit monitoring. Conclusion: Identity Protection is the Cornerstone of Cybersecurity The rising tide of data breaches means that businesses can no longer afford to overlook the role of employee identity in cybersecurity. By prioritizing identity protection for employees, organizations can reduce the risk of costly breaches and also create a safer, more engaged, and financially secure workforce. Ready to protect your employees and your business? Take the next step toward safeguarding your company’s future. Learn more about Experian’s employee benefits solutions to see how identity protection and financial wellness tools can transform your workplace security and employee engagement. Learn more 1 2024 Experian Data Breach Response Guide 2 Identity Theft Resource Center. H1 2024 Data Breach Analysis 3 2023 IBM Cost of a Data Breach Report

Jan 28,2025 by Stefani Wendel

Loading…
Is Credit Scoring to Blame?

Whenever an industry encounters problems, the natural tendency is to play the blame game.  In the banking industry, credit risk managers are looking for who or what to blame for the tide of charge offs and delinquencies in their under-performing loan portfolios and in their commercial loan origination operations.  Credit scoring has definitely taken it on the chin as an easy target during 2008. Is credit scoring the problem? Absolutely not! As with anything, the more complacent we become…and the more we “turn off our brains” and stop thinking…the more risk we assume.  The more we solely rely upon the credit score alone, the more we subject ourselves to the risks inherent in “score and go” lending. We are all well aware that credit scoring measures propensity to repay and not capacity to repay.  Over the past several years, the propensity to repay has been boosted by ever-increasing real estate values and by the refinance boom.  For example, some consumers have been able to survive on a 50 percent debt–to- income due to constant use of credit cards …by paying off those cards with a home mortgage refinance.  That set of behaviors would have shown a propensity to repay…but  was it ever acceptable to have 50 percent of your income go to debt payments?! Statistically it may have worked for a few years, but once real estate values stopped escalating, the problem with lack of capacity to repay reared its ugly head. When it comes to risk management, let’s get back to reality and sound principles.

Nov 11,2008 by

Risk-Based Return on TARP

By: Tom Hannagan In my last post, I addressed the need for banks to advance their management of risk to include the relationship between capital and risk in their internal decisions and actions. While it is difficult for me to make this topic very exciting, it can’t be ignored. It very nearly resulted in bankrupting the global financial system. Beyond profitability, bank executives must measure and monitor their risk-based capital because: 1) equity capital represents the ownership interest in a bank; 2) equity capital is by far the most expensive source of funding; and 3) the risk associated with capital sufficiency and continued solvency is important. As Colonel Jessup might confirm, “Yes, we’re talking about mortal danger”. Many are scrambling to apply for the TARP (Troubled Asset Relief Program) capital infusion – and most are getting approved for these windfall funds. (Today’s investment advice from the experts: don’t buy common shares in any bank that applied and was turned down.) Let’s take a look at the impact of these funds. If we were, for example, a $10 billion total asset bank, with say $800 million in equity capital prior to TARP and had roughly $700 million in risk-weighted assets, we might get approved for $200 million in TARP-related preferred shares at a cost of 5 percent (after tax) for the next five years. If, our make believe $10 billion bank was earning an average pre-2008 economic-and-credit-crisis return on assets of 1 percent, or $100 million per annum, what are the implications of the added $200 million in capital on future earnings? That $100 million in “pre-crisis” earnings represented a return on equity of 12.5 percent on our original capital of $800 million. (Stay with me, now…)   Since we need to pay the Feds (our new shareholders) $10 million in preferred dividends per annum in after-tax money, we need to earn an added $16 million in pre-tax operating income just to break even on the deal. That would mean, in our otherwise static model, that earnings need to move from $100 million to $110 million. More importantly, pre-tax income needs to move from say $150 million to $166 million, assuming about a 33 percent effective tax rate. We’ve got the fresh $200 million to work with, assuming we don’t need part of it to cover credit charge-offs or other asset write-downs. To earn $16 million from that $200 million investment, we would need an 8  percent pre-tax operating income (that’s after expenses, folks). I’m open to suggestions at this point…And you thought banking was easy. You do that the old fashion way — with leverage. You use the $200 million to get someone (depositors, the Federal Home Loan Bank, a Federal Reserve Bank, or anyone else) to give you more money to invest (at a critically important tax-deductible cost) along with your fresh $200 million in preferred equity. Remember, our bank is already operating with leverage, supporting $7 billion in risk-weighted assets, and $10 billion in total assets, with the pre-existing $800 million in capital. Unfortunately, leverage involves at least liquidity risk, and probably market risk — on top of whatever direct (credit, market, operational) risks are associated with whatever end investment you choose (…and the Feds hope you choose loans). Obviously, the fastest way to get the added leverage, along with a quick addition to earnings assets, is to go buy another bank (and absorb them more successfully than the two of you ran separately). Thus, a new round of consolidation has begun. Regardless of the method used to grow into the TARP money, any bank that doesn’t take into account the risks associated with these decisions/actions is merely kidding itself. TARP funding will not make any real headway in improving risk-adjusted earnings going forward. There is (and always has been) a direct relationship between actual risk and risk-adjusted return.  It is now more important than ever for bank management to monitor and measure their organization’s activities (loan pricing and profitability, investing, deposit taking, investment management, credit risk modeling, buying other banks…and anything else they do) based on the relative risk of those activities and based on the equity capital realistically required to support those risks. This means using return on equity measurement internally as well as at the entity level. I look forward to your comments.

Nov 11,2008 by

Risk-Based Capital Measurement

By: Tom Hannagan Much of the blame for the credit disaster of 2007 and 2008 has been laid at the risk management desks of the largest banks. A silver lining in the historic financial disaster of today may be the new level of interest in management of risk — particularly, of the relationship between capital and risk. Financial institutions of all sizes must measure and monitor their risk-based capital for three critical reasons. Ownership interest First, equity capital represents the ownership interest in a bank. Although a relatively small portion of the balance sheet, equity capital is the part that actually belongs to a bank’s owners. Everything else on the liability side is owed to depositors or lenders. All of the bank’s activities and assets are levered against the funds contributed by the equity investors. This leverage is roughly 10-to-1 for most commercial banks in the United States. For the five major investment banks, this risk-based leverage reached 30-to-1. Their capital base, even with new infusions, could not cover their losses.  It is necessary and just good business sense to regularly let the owners know what’s going on as it relates to their piece of the pie—their invested funds. Owners want to know the bank is doing things well with their at-risk funds. Banks have a duty to tell them. Funding expenses Second, equity capital is by far the most expensive source of all funding. Transaction deposit funds are usually paid an effective rate of interest that is lower than short-to-intermediate-term market rates. Time depositors are competitively paid as little as possible based on the term and size of their commitment of funds. Most banks are able to borrow overnight funds at short-term market rates and longer-term funds at relatively economical AA or A ratings. Equity holders, however, have historically received (and typically expect) substantially more in the way of return on investment. Their total returns, including dividends, buybacks and enhanced market value, are usually double to triple the cost of other intermediate-to-long-term sources of funds. From a cost perspective, equity capital is the dearest funding the bank will ever obtain. Risk factor This brings us to the third reason for measuring and monitoring capital: the risk factor. A very large portion of banking regulation focuses on capital sufficiency because it directly affects a bank’s (and the banking industry’s) continued solvency. Equity capital is the last element of cushion that protects the bank from insolvency. Although it is relatively expensive, sufficient equity capital is absolutely required to start a bank and necessary to keep the bank in good stead with regulators, customers and others. Equity holders are usually conscious of the fact that they are last in line in the event of liquidation. There is no Federal Deposit Insurance Corporation (FDIC) for them, no specific assets earmarked to back their funding and no seniority associated with their invested money. We all know what “last in line” means for most shareholders if a failure occurs — 100 percent loss.   There is a clear and direct relationship between equity risk and cost—and between equity risk and expected return.  It is now more important for bank executives to monitor and measure their organization’s activities based on the relative risk of those activities and based on the equity capital required to support those risks. This means using return on equity (ROE) a lot more and return on assets (ROA) a lot less. Because of the critical need and high cost of risk-based equity and the various risks associated with the business of banking, decisions about the effective deployment of capital always have been the primary responsibility of bank leaders. Now, the rest of the world is focusing more on how well, or poorly, management of risk has been done. I’ll comment on using ROE more in later posts.    

Nov 07,2008 by