Debt collectors face a multitude of challenges when it comes to contacting the right people at the right time and improving their processes for collections. We interviewed Matt Baltzer, Senior Product Management Director at Experian, to learn more about how his team is helping debt collectors engage their customers and optimize their collection strategies.
With the rise of digital interactions, identity fraud has become an unassuming threat that impacts individuals, businesses, and institutions worldwide. According to the Federal Trade Commission (FTC), 5.4 million consumer reports regarding fraud and consumer protection were filed in 2023. Identity fraud, which is characterized as when an individual's personal information is stolen and used without their consent for fraudulent purposes, has devastating consequences for consumers, including financial losses, damaged credit scores, legal issues, and emotional distress. Financial institutions face damaging consequences beyond financial losses, including reputational damage, operational disruption, and regulatory scrutiny. As technology advances, so do fraudsters' tactics, making it increasingly challenging to detect and prevent identity-related crimes. So, what are financial institutions to do? Industry-leading institutions apply a layered approach to solving fraud that starts with a fraud risk assessment. What is a fraud risk assessment? When opening a new account, banks typically conduct a fraud risk assessment to verify the identity of the individual or entity applying for the account and to assess the likelihood of fraudulent activity. Banks also assess the applicant's credit history, financial background, and transaction patterns to identify red flags or suspicious activity. Advanced fraud detection tools and technologies are employed to monitor account opening activities in real-time and detect signs of fraudulent behavior. This assessment is crucial for ensuring compliance with regulatory requirements, mitigating the risk of financial loss, and safeguarding against identity theft. Understanding the importance of fraud risk assessments A fraud risk assessment is crucial for banks during account opening as it helps verify the identity of applicants and mitigate the risk of fraudulent activity. By assessing the likelihood and potential impact of identity fraud, banks can implement measures to protect customers' assets and protect against losses in their portfolio. Additionally, conducting thorough risk assessments enables banks to comply with regulatory requirements, which mandate the verification of customer identities to prevent money laundering and terrorist financing. By adhering to these regulations and implementing effective fraud detection measures, banks can enhance trust and confidence among customers, regulators, and stakeholders, reinforcing the integrity and stability of the financial system. 10 tools to consider when building an effective fraud risk assessment Several key factors should be carefully considered in an identity fraud risk assessment to ensure thorough evaluation and effective mitigation of identity fraud risks. Financial institutions should consider emerging threats and trends such as synthetic identity fraud, account takeover attacks, and social engineering scams when conducting a risk assessment. By staying abreast of evolving tactics used by fraudsters, organizations can proactively adapt their fraud prevention strategies and controls. Here are 10 tools that can help catch red flags for fraud prevention: Identity verification: Identity verification is the first line of defense against identity theft, account takeover, and other fraudulent activities. By verifying the identities of individuals before granting access to services or accounts, organizations can ensure that only legitimate users are granted access. Effective identity verification methods, such as biometric authentication, document verification, and knowledge-based authentication, help mitigate the risk of unauthorized access and fraudulent transactions. Implementing robust identity verification measures protects organizations from financial losses and reputational damage and enhances trust and confidence among customers and stakeholders. Device intelligence: Device intelligence provides insights into the devices used in online transactions, enabling organizations to identify and mitigate fraudulent activities. Organizations can detect suspicious behavior indicative of fraudulent activity by analyzing device-related data such as IP addresses, geolocation, device fingerprints, and behavioral patterns. Device intelligence allows organizations to differentiate between legitimate users and fraudsters, enabling them to implement appropriate security measures, such as device authentication or transaction monitoring. Phone data: Phone and Mobile Network Operator (MNO) data offers valuable insights into the mobile devices and phone numbers used in transactions. By analyzing MNO data such as subscriber information, call records, and location data, organizations can verify the authenticity of users and detect suspicious activities. MNO data enables organizations to confirm the legitimacy of phone numbers, detect SIM swapping or account takeover attempts, and identify fraudulent transactions. Leveraging MNO data allows organizations to strengthen their fraud prevention measures, enhance customer authentication processes, and effectively mitigate the risk of fraudulent activities in an increasingly mobile-driven environment. Email attributes: Email addresses serve as a primary identifier and communication channel for users in digital transactions. Organizations can authenticate user identities, confirm account ownership, and detect suspicious activities such as phishing attempts or identity theft by verifying email addresses. Analyzing email addresses enables organizations to identify patterns of fraudulent behavior, block unauthorized access attempts, and enhance security measures. Furthermore, email address validation helps prevent fraudulent transactions, safeguard sensitive information, and protect against financial losses and reputational damage. Leveraging email addresses as part of fraud prevention strategies enhances trustworthiness in digital interactions. Address verification: Address verification provides essential information for authenticating user identities and detecting suspicious activities. By verifying addresses, organizations can confirm the legitimacy of user accounts, prevent identity theft, and detect fraudulent transactions. Address validation enables organizations to ensure that the provided address matches the user's identity and reduces the risk of fraudulent activities such as account takeover or shipping fraud. Behavioral analytics: Behavioral analytics enables organizations to detect anomalies and patterns indicative of fraudulent activity. By analyzing user behavior, such as transaction history, navigation patterns, and interaction frequency, organizations can identify deviations from normal behavior and flag suspicious activities for further investigation. Behavioral analytics allows organizations to create profiles of typical user behavior and detect deviations that may signal fraud, such as unusual login times or transaction amounts. Consortia: Consortia facilitate collaboration and information sharing among organizations to combat fraudulent activities collectively. By joining forces through consortia, organizations can leverage shared data, insights, and resources to more effectively identify emerging fraud trends, patterns, and threats. Consortia enables participating organizations to benefit from a broader and more comprehensive view of fraudulent activities, enhancing their ability to detect and prevent fraud. Risk engines: Risk engines enable real-time analysis of transaction data and user behavior to detect and mitigate fraudulent activities. By leveraging advanced algorithms and machine learning techniques, risk engines assess the risk associated with each transaction and user interaction, flagging suspicious activities for further investigation or intervention. Risk engines help organizations identify anomalies, patterns, and trends indicative of fraudulent behavior, allowing for timely detection and prevention of fraud. Additionally, risk engines can adapt and evolve over time to stay ahead of emerging threats, enhancing their effectiveness in mitigating fraud. Orchestration streamlines and coordinates the various components of a fraud detection and prevention strategy. By orchestrating different fraud prevention tools, technologies, and processes, organizations can optimize their efforts to combat fraud effectively. Orchestration allows for seamless integration and automation of workflows, enabling real-time data analysis and rapid response to emerging threats. Step-up authentication: Step-up authentication provides an additional layer of security to verify users' identities during high-risk transactions or suspicious activities. By requiring users to provide additional credentials or undergo further authentication steps, such as biometric verification or one-time passcodes, organizations can mitigate the risk of unauthorized access and fraudulent transactions. Step-up authentication allows organizations to dynamically adjust security measures based on the perceived risk level, ensuring that stronger authentication methods are employed when necessary. By layering these tools effectively businesses remove gaps that fraudsters would typically exploit. Learn more
Four capabilities to consider for improved coverage and customer experience. Identity verification during account opening is the foundation for building trust between consumers and businesses. Consumers expect a seamless and convenient experience, and with the ease and optionality of online banking, are willing to look for alternatives that offer less friction. According to Experian research, 92% of consumers feel it's important for the businesses they deal with online to identify or recognize them on a repeated basis accurately, but only 16% have high confidence that this is happening. The disconnect between consumers’ expectations for online identity verification and the digital experiences they encounter is leading to reduced satisfaction and increased abandonment during new account opening processes. According to recent research by Experian, 38% of consumers surveyed considered ending a new account opening mid-way through the process due to poor experience. In addition, the same research found that nearly one-fifth of consumers had moved their business elsewhere because of this. Amidst the quest for convenience lies a pressing concern: ensuring the integrity of accounts being opened and protecting against fraud. Businesses continue to experience increasing fraud losses, Juniper Research forecasts that merchant losses from online payment fraud will exceed $362 billion globally between 2023 and 2028, with losses of $91 billion alone in 2028. Identity verification serves as the first line of defense in protecting both financial institutions and consumers. By verifying the identities of individuals before granting them access to services, businesses can mitigate the risk of identity theft, account takeover, and other forms of fraud. Four capabilities to consider when building out an identity verification strategy Personally Identifiable Information (PII) dataComparing consumer input data to a comprehensive data set helps effectively validate the consumer without disrupting customer experience. Details like name, address, date of birth, and social security number provide valuable identity information to verify identities quickly and accurately. Identity graphUsing an identity graph leveraging advanced analytics and data linking techniques helps prevent synthetic IDs from getting through. By mapping relationships between identity attributes, you can easily identify patterns and connections within the data and detect anomalies or inaccuracies in the information provided. Alternative data“Thin file” consumers are often rejected due to a lack of traditional data. Using alternative data like phone ownership and email data helps not only verify that the identity is real but also improves coverage, so you are not rejecting good customers. Document verificationHaving a document verification provider that seamlessly integrates into your identity verification workflow is essential for robust identity verification. Validating good users early in the account opening process helps keep fraudsters out so good users are not subject to stringent identity checks later on during onboarding. Next steps A strong identity verification process builds trust by demonstrating a commitment to protecting and safeguarding consumer data. A proper identity verification workflow would minimize the impact of friction for consumers and help organizations manage fraud and regulatory compliance by examining specific business needs on a case-by-case basis. Identifying the right mix of capabilities through analytics and feedback while utilizing the best data reduces the cost of manual verification and helps onboard good customers faster. Learn more Research conducted in March 2024 by Experian in North America
By Erik Hjermstad, VP of Product Management for Experian Automotive In today's digital landscape, where consumers increasingly turn to connected TV and addressable TV for entertainment, precision targeting has become more critical than ever for automotive advertisers. By delivering highly relevant ads to the most likely potential customers, advertisers can maximize campaign effectiveness, increase conversion rates, and ultimately drive a better return on investment (ROI). The following is a summary from a recent article I wrote for Ad Age. The Power of Precision Targeting Precision targeting allows advertisers to focus their efforts on the right people with the right message at the right time. This targeted approach helps minimize wasted ad spend and ensures that every dollar invested makes a meaningful impact. By understanding an audience's demographics, interests, and behaviors, automotive marketers can tailor their messaging to resonate with specific consumer segments and pointedly reach those ready to purchase. Leveraging Data Intelligence for Competitive Advantage To stay competitive, automotive marketers must stay on top of the latest data intelligence. Agencies and marketers have turned to data-driven strategies to set their campaigns apart and increase the likelihood of a consumer purchasing a vehicle. When choosing their consumer audiences, automotive marketers turn to companies like Experian Automotive for data like license, registration, and title. They utilize models based on actual vehicle sales and ownership to target the right audience and measure effectiveness more accurately. Measuring Success: Key Metrics and Omnichannel Measurement To ensure that advertising campaigns deliver results, automotive marketers must have a robust measurement strategy. This involves tracking key metrics such as: Sales: Did the buyer purchase a vehicle? Impressions: The number of times an ad is seen. Clicks: The number of times an ad is clicked on. Conversions: The number of people who take a desired action, such as purchasing. Cost per acquisition (CPA): The cost of acquiring a new customer. Return on ad spend (ROAS): The revenue generated by an ad campaign divided by the cost of the campaign. Experian Automotive offers advertisers a robust measurement solution that provides omnichannel measurement, connecting website visitation and ad exposures to automotive sales. Analysis includes make, model, and vehicle class reporting, competitive analysis, and 30-, 60-, and 90-day vehicle sales projections. The Importance of Omnichannel Measurement In today's interconnected world, automotive consumers interact with brands across multiple channels, including TV, digital, social media, and in-store. Advertisers must adopt an omnichannel measurement approach to truly understand their audience and measure the effectiveness of their campaigns. By tracking consumer behavior across all channels, advertisers can gain a more complete picture of the customer journey and identify opportunities for optimization. Omnichannel measurement integrates data from various sources, such as website analytics, social media metrics, and point-of-sale data. This allows advertisers to understand how consumers interact with their brand at different stages of the buying process and attribute conversions to specific channels and touchpoints. By leveraging omnichannel measurement, advertisers can make more informed decisions about their marketing investments and deliver a more cohesive and personalized customer experience. Measurement is critical to advertising success for several reasons: Optimization: By tracking key metrics, advertisers can identify what is working versus what is not and make necessary adjustments to improve campaign performance. Attribution: Measurement helps determine which marketing channels and tactics drive the most conversions. ROI analysis: By measuring the ROI of their campaigns, advertisers can justify their marketing investments and demonstrate the value they bring to the business. Navigating the Challenges of the Streaming Era While precision targeting and measurement are essential in the streaming era, advertisers face unique challenges. The fragmented nature of the streaming landscape, with its multiple platforms and devices, can make it challenging to track consumer behavior and measure campaign effectiveness. However, advancements in data technology and measurement tools provide advertisers with many new opportunities to overcome these challenges. By leveraging data intelligence, using deterministic data models to understand their audience, and tracking key metrics, advertisers can deliver highly relevant ads that drive results and maximize their ROI.
From consumers seeking versatility and additional cargo space to more models becoming available—a discernible trend the automotive industry has seen in recent years is the shift towards utility vehicles such as SUVs and crossover utility vehicles (CUVs). In fact, Experian’s Automotive Market Trends Report: Q4 2023 found that utility vehicles were a significant driver in new vehicle registrations, coming in at 57.3%, up from 56.2% through Q4 2022. Meanwhile, pickup trucks declined from 18.5% last year to 17.2% this quarter and sedans went from 17.1% to 16.5% in the same time frame. Optimizing vehicle maintenance post-manufacturer warranty Despite utility vehicles making up the majority of new vehicle registrations through Q4 2023, passenger vehicles (85.1%) and light trucks (82.7%) had the most vehicles that were outside of the general manufacturer warranty this quarter—mostly due to a high volume of registrations in previous years. By comparison, 67.1% of all utility vehicles were outside the general manufacturer warranty. Understanding the current status of these vehicles enables aftermarket professionals to tailor their service recommendations accordingly. Furthermore, it will be important to monitor this trend over the next few years as the vehicles that are currently under manufacturer warranty will likely need maintenance after it expires. !function(e,n,i,s){var d="InfogramEmbeds";var o=e.getElementsByTagName(n)[0];if(window[d]&&window[d].initialized)window[d].process&&window[d].process();else if(!e.getElementById(i)){var r=e.createElement(n);r.async=1,r.id=i,r.src=s,o.parentNode.insertBefore(r,o)}}(document,"script","infogram-async","https://e.infogram.com/js/dist/embed-loader-min.js"); Vehicle registrations and aftermarket sweet spot When looking at overall registration trends, new vehicles increased 12.5% from last year—reaching 15.3 million through Q4 2023 and used vehicles declined 1.5% year-over-year to 38.2 million this quarter. While monitoring vehicle registration trends helps aftermarket professionals properly assist consumers now and in the future, identifying and understanding the aftermarket “sweet spot” allows them to stay ahead of the curve and adapt to changes as the market continues to evolve. Vehicles in the sweet spot are generally between six- to 12-model-years-old and have aged out of general OEM manufacturer warranties for any repairs. Through Q4 2023, 35.5% of all vehicles in operation landed in the sweet spot, marking a 3.6% year-over-year increase. Though, the aftermarket sweet spot volume is expected to hit its peak in the next few months at nearly 116 million vehicles—considering the record high was 104 million through 2011 and the sweet spot volume reached 102.4 million through Q4 2023. As aftermarket professionals look for ways to reach the right audience, leveraging registration data and the types of vehicles entering the market enables them to adjust their marketing strategies accordingly and plan their services effectively. To learn more about vehicle market trends, view the full Automotive Market Trends Report: Q4 2023 presentation on demand.
This article was updated on March 11, 2024. As a lender, it’s important to understand a consumer’s credit behavior and whether it's improving or deteriorating over time. Sure, you can pull a credit score at any moment, but it's merely a snapshot. Knowing a consumer’s credit information at a single point in time only tells part of the story. Two consumers can have the same credit score, but one consumer’s score could be moving up while another’s score could be moving down. To understand the whole story, lenders need the ability to leverage trended data to assess a consumer’s credit behavior over time. What to know about trended data Trended data provides key balance and payment data for the previous 24 months. By analyzing historical payment information, lenders can determine if a consumer is consistently paying more than the minimum payment, has a demonstrated ability to pay, and shows no signs of payment stress. It can conversely identify if a consumer is making only minimum payments and has increasing payment stress. Experian’s Trended Data is comprised of five fields of historical payment information over a 24-month period. It includes: Balance Amount Original Loan / Limit Amount Scheduled Payment Amount Actual Payment Amount Last Payment Date Knowing how a consumer uses credit, or pays back debt over time, can help lenders offer the right products and terms to increase response rates, determine up-sell and cross-sell opportunities, and limit loss exposure. Using a consumer’s historical payment information also provides a more accurate assessment of future behavior, helping lenders effectively manage changes in risk, predict balance transfer activity, and prevent attrition. The challenge For lenders to extract the benefits of trended data, they need to analyze an enormous amount of data. Five fields of data across 24 months on every trade is huge and can be difficult for lenders with limited analytical resources to manage. For example, a single consumer with 10 trades on file would have upwards of 1,200 data points to analyze. Multiply that by a file of 100,000 consumers and you are now dealing with over 120,000,000 data points. Additionally, if lenders utilize the trended data in their underwriting processing and intend to use it to decline consumers, they need to create their own adverse action reason codes to communicate to the consumer. Not all lenders are equipped to take on this level of effort. Still, there are trended data solutions to assist lenders with managing and unlocking the power of trended data. How Experian can help Experian’s pre-calculated solutions allow even the smallest lenders to quickly and effectively action on the benefits of trended data, minus the hassles of analyzing it. Trended data, and the solutions built from it, allow lenders to effectively predict where a consumer is going based on where they’ve been. And really, that can make all the difference when it comes to smart lending decisions. Get started today
This article was updated on March 6, 2024. Advances in analytics and modeling are making credit risk decisioning more efficient and precise. And while businesses may face challenges in developing and deploying new credit risk models, machine learning (ML) — a type of artificial intelligence (AI) — is paving the way for shorter design cycles and greater performance lifts. LEARN MORE: Get personalized recommendations on optimizing your decisioning strategy Limitations of traditional lending models Traditional lending models have worked well for years, and many financial institutions continue to rely on legacy models and develop new challenger models the old-fashioned way. This approach has benefits, including the ability to rely on existing internal expertise and the explainability of the models. However, there are limitations as well. Slow reaction times: Building and deploying a traditional credit risk model can take many months. That might be okay during relatively stable economic conditions, but these models may start to underperform if there's a sudden shift in consumer behavior or a world event that impacts people's finances. Fewer data sources: Traditional scoring models may be able to analyze some types of FCRA-regulated data (also called alternative credit data*), such as utility or rent payments, that appear in credit reports. Custom credit risk scores and models could go a step further by incorporating data from additional sources, such as internal data, even if they're designed in a traditional way. But AI-driven models can analyze vast amounts of information and uncover data points that are more highly predictive of risk. Less effective performance: Experian has found that applying machine learning models can increase accuracy and effectiveness, allowing lenders to make better decisions. When applied to credit decisioning, lenders see a Gini uplift of 60 to 70 percent compared to a traditional credit risk model.1 Leveraging machine learning-driven models to segment your universe From initial segmentation to sending right-sized offers, detecting fraud and managing collection efforts, organizations are already using machine learning throughout the customer life cycle. In fact, 79% are prioritizing the adoption of advanced analytics with AI and ML capabilities, while 65% believe that AI and ML provide their organization with a competitive advantage.2 While machine learning approaches to modeling aren't new, advances in computer science and computing power are unlocking new possibilities.3 Machine learning models can now quickly incorporate your internal data, alternative data, credit bureau data, credit attributes and other scores to give you a more accurate view of a consumer's creditworthiness. By more precisely scoring applicants, you can shrink the population in the middle of your score range, the segment of medium-risk applicants that are difficult to evaluate. You can then lower your high-end cutoff and raise your low-end cutoff, which may allow you to more confidently swap in good accounts (the applicants you turned down with other models that would have been good) and swap out bad accounts (those you would have approved who turned bad). Machine learning models may also be able to use additional types of data to score applicants who don't qualify for a score from traditional models. These applicants aren't necessarily riskier — there simply hasn't been a good way to understand the risk they present. Once you can make an accurate assessment, you can increase your lending universe by including this segment of previously "unscorable" consumers, which can drive revenue growth without additional risk. At the same time, you're helping expand financial inclusion to segments of the population that may otherwise struggle to access credit. READ MORE: Is Financial Inclusion Fueling Business Growth for Lenders? Connecting the model to a decision Even a machine learning model doesn't make decisions.4 The model estimates the creditworthiness of an applicant so lenders can make better-informed decisions. AI-driven credit decisioning software can take your parameters (such cutoff points) and the model's outputs to automatically approve or deny more applicants. Models that can more accurately segment and score populations will result in fewer applications going to manual review, which can save you money and improve your customers' experiences. CASE STUDY: Atlas Credit, a small-dollar lender, nearly doubled its loan approval rates while decreasing risk losses by up to 20 percent using a machine learning-powered model and increased automation. Concerns around explainability One of the primary concerns lenders have about machine learning models come from so-called “black box" models.5 Although these models may offer large lifts, you can't verify how they work internally. As a result, lenders can't explain why decisions are made to regulators or consumers — effectively making them unusable. While it's a valid concern, there are machine learning models that don't use a black box approach. The machine learning model doesn't build itself and it's not really “learning" on its own — that's where the black box would come in. Instead, developers can use machine learning techniques to create more efficient models that are explainable, don't have a disparate impact on protected classes and can generate reason codes that help consumers understand the outcomes. LEARN MORE: Explainability: Machine learning and artificial intelligence in credit decisioning Building and using machine learning models Organizations may lack the expertise and IT infrastructure required to develop or deploy machine learning models. But similar to how digital transformations in other parts of the business are leading companies to use outside cloud-based solutions, there are options that don't require in-house data scientists and developers. Experian's expert-guided options can help you create, test and use machine learning models and AI-driven automated decisioning; Ascend Intelligence Services™ Acquire: Our model development service allows you to prebuild and test the performance of a new model before Experian data scientists complete the model. It's collaborative, and you can upload internal data through the web portal and make comments or suggestions. The service periodically retrains your model to increase its effectiveness. Ascend Intelligence Services™ Pulse: Monitor, validate and challenge your existing models to ensure you're not missing out on potential improvements. The service includes a model health index and alerts, performance summary, automatic validations and stress-testing results. It can also automatically build challenger models and share the estimated lift and financial benefit of deployment. PowerCurve® Originations Essentials: Cloud-based decision engine software that you can use to make automated decisions that are tailored to your goals and needs. A machine learning approach to credit risk and AI-driven decisioning can help improve outcomes for borrowers and increase financial inclusion while reducing your overall costs. With a trusted and experienced partner, you'll also be able to back up your decisions with customizable and regulatorily-compliant reports. Learn more about our credit decisioning solutions. Learn more When we refer to "Alternative Credit Data," this refers to the use of alternative data and its appropriate use in consumer credit lending decisions as regulated by the Fair Credit Reporting Act (FCRA). Hence, the term "Expanded FCRA Data" may also apply in this instance and both can be used interchangeably.1Experian (2024). Improving Your Credit Risk Machine Learning Model Deployment2Experian and Forrester Research (2023). Raising the AI Bar3Experian (2022). Driving Growth During Economic Uncertainty with AI/ML Strategies4Ibid5Experian (2020). Explainability ML and AI in Credit Decisioning
This article was updated on March 4, 2024. If you steal an identity to commit fraud, your success is determined by how long it takes the victim to find out. That window gets shorter as businesses get better at knowing when and how to reach an identity owner when fraud is suspected. In response, frustrated fraudsters have been developing techniques to commit fraud that does not involve a real identity, giving them a longer run-time and a bigger payday. That's the idea behind  synthetic identity (SID) fraud — one of the fastest-growing types of fraud. Defining synthetic identity fraud Organizations tend to have different  definitions of synthetic identity fraud, as a synthetic identity will look different to the businesses it attacks. Some may see a new account that goes bad immediately, while others might see a longer tenured account fall delinquent and default. The qualifications of the synthetic identity also change over time, as the fraudster works to increase the identity’s appearance of legitimacy. In the end, there is no person to confirm that fraud has occurred, in the very best case, identifying a synthetic identity is inferred and verified. As a result, inconsistent reporting and categorization can make tracking and fighting SID fraud more difficult. To help create a more unified understanding and response to the issue, the Federal Reserve and 12 fraud experts worked together to develop a definition. In 2021, the  Boston Federal Reserve  published the result, “Synthetic identity fraud is the use of a combination of personally identifiable information to fabricate a person or entity to commit a dishonest act for personal or financial gain."1 To break down the definition, personally identifiable information (PII) can include: Primary PII:  Such as a name, date of birth (DOB), Social Security number (SSN) or another government-issued identifier. When combined, these are generally unique to a person or entity. Secondary PII:  Such as an address, email, phone number or device ID. These elements can help verify a person or entity's identity. Synthetic identities are created when fraudsters establish an identity from scratch using fake PII. Or they may combine real and fake PII (I.e., a stolen SSN with a fake name and DOB) to create a new identity. Additionally, fraudsters might steal and use someone's SSN to create an identity - children, the  elderly  and incarcerated people are popular targets because they don't commonly use credit.4 But any losses would still be tied to the SID rather than the victim. Exploring the Impact of SID fraud The most immediate and obvious impact of SID fraud is the fraud losses. Criminals may create a synthetic identity and spend months  building up its credit profile, opening accounts and increasing credit limits. The identities and behaviors are constructed to look like legitimate borrowers, with some having a record of on-time payments. But once the fraudster decides to monetize the identity, they can apply for loans and max out credit cards before ‘busting out’ and disappearing with the money. Aite-Novaric Group estimates that SID fraud losses totaled $1.8 billion in 2020 and will increase to $2.94 billion in 2024.2 However, organizations that do not identify SIDs may classify a default as a credit loss rather than a fraud loss. By some estimates, synthetic identity fraud could account for up to 20 percent of loan and credit card charge-offs, meaning the annual charge-off losses in the U.S. could be closer to $11 billion.3 Additionally, organizations lose time and resources on collection efforts if they do not identify the SID fraud. Those estimates are only for unsecured U.S. credit products. But fraudsters use synthetic identities to take out secured loans, including auto loans. As part of schemes used to steal relief funds during the pandemic, criminals used synthetic identities to open demand deposit accounts to receive funds. These accounts can be used to launder money from other sources and commit peer-to-peer payment fraud. Deposit account holders are also a primary source of cross-marketing for some financial institutions. Criminals can take advantage of vulnerable onboarding processes for deposit accounts where there’s low risk to the institution and receive offers for lending products. Building a successful SID prevention strategy Having an effective SID prevention strategy is more crucial than ever for organizations. Aside from fraud losses, consumers listed identity theft as their top concern when conducting activities online. And while 92% of businesses have an identity verification strategy in place, 63% of consumers are "somewhat confident" or "not very confident" in businesses' ability to accurately identify them online. Read: Experian's 2023 Identity and Fraud Report Many traditional fraud models and identity verification methods are not designed to detect fake people. And even a step up to a phone call for verification isn't enough when the fraudster will be the one answering the phone. Criminals also quickly respond when organizations update their fraud detection methods by looking for less-protected targets. Fraudsters have even signed their SIDs up for social media accounts and apps with low verification hurdles to help their SIDs pass identity checks.5 Understand synthetic identity risks across the lifecycle Synthetic Identities are dynamic. When lending criteria is tightened to synthetics from opening new accounts, they simply come back when they can qualify. If waiting brings a higher credit line, they’ll wait. It’s important to recognize that synthetic identity isn’t a new account or a portfolio management problem - it’s both. Use analytics that are tailored to synthetic identity Many of our customers in the financial services space have been trying to solve synthetic identity fraud with credit data. There’s a false sense of security when criteria is tightened and losses go down—but the losses that are being impacted tend to not be related to credit. A better approach to synthetic ID fraud leverages a larger pool of data to assess behaviors and data linkages that are not contained in traditional credit data. You can then escalate suspicious accounts to require additional reviews, such as screening through the Social Security Administration's Electronic Consent Based SSN Verification (eCBSV) system or more stringent document verification. Find a trusted partner Experian's interconnected data and analytics platforms offer lenders turnkey identity and synthetic identity fraud solutions. In addition, lenders can take advantage of the risk management system and continuous monitoring to look for signs of SIDs and fraudulent activity, which is important for flagging accounts after opening. These tools can also help lenders identify and prevent other common forms of fraud, including account takeovers, e-commerce fraud, child identity theft fraud and elderly fraud. Learn more about our synthetic identity fraud solutions. Learn more 1Federal Reserve Bank (2021). Defining Synthetic Identity Fraud 2Aite Novarica (2022). Synthetic Identity Fraud: Solution Providers Shining Light into the Darkness 3Experian (2022). Preventing synthetic identity fraud 4The Federal Reserve (2022). Synthetic Identity Fraud: What Is it and Why You Should Care? 5Experian (2022). Preventing synthetic identity fraud
This article was updated on February 12, 2024. The Buy Now, Pay Later (BNPL) space has grown massively over the last few years. But with rapid growth comes an increased risk of fraud, making "Buy Now, Pay Never" a crucial fraud threat to watch out for in 2024 and beyond. What is BNPL? BNPL, a type of short-term financing, has been around for decades in different forms. It's attractive to consumers because it offers the option to split up a specific purchase into installments rather than paying the full total upfront. The modern form of BNPL typically offers four installments, with the first payment at the time of purchase, as well as 0% APR and no hidden fees. According to an Experian survey, consumers cited managing spending (34%), convenience (31%), and avoiding interest payments (23%) as main reasons for choosing BNPL. Participating retailers generally offer BNPL at point-of-sale, making it easy for customers to opt-in and get instantly approved. The customer then makes a down payment and pays off the installments from their preferred account. BNPL is on the rise The fintech and online-payment-driven world is seeing a rise in the popularity of BNPL. According to Experian research, 3 in 4 consumers have used BNPL in 2023, with 11% using BNPL weekly to make purchases. The interest in BNPL also spans generations — 36% of Gen Z, 43% of Millennials, 32% of Gen X, and 12% of Baby Boomers have used this payment method. The risks of BNPL While BNPL is a convenient, easy way for consumers to plan for their purchases, experts warn that with lax checkout and identity verification processes it is a target for digital fraud. Experian predicts an uptick in three primary risks for BNPL providers and their customers: identity theft, first-party fraud, and synthetic identity fraud. WATCH: Fraud and Identity Challenges for Fintechs Victims of identity theft can be hit with charges from BNPL providers for products they have never purchased. First-party and synthetic identity risks will emerge as a shopper's buying power grows and the temptation to abandon repayment increases. Fraudsters may use their own or fabricated identities to make purchases with no intent to repay. This leaves the BNPL provider at the risk of unrecoverable monetary losses and can impact the business' risk tolerance, causing them to narrow their lending band and miss out on properly verified consumers. An additional risk lies with fraudsters who may leverage account takeover to gain access to a legitimate user's account and payment information to make unauthorized purchases. READ: Payment Fraud Detection and Prevention: What You Need to Know Mitigating BNPL risks Luckily, there are predictive credit, identity verification, and fraud prevention tools available to help businesses minimize the risks associated with BNPL. Paired with the right data, these tools can give businesses a comprehensive view of consumer payments, including the number of outstanding BNPL loans, total BNPL loan amounts, and BNPL payment status, as well as helping to detect and apply the relevant treatment to different types of fraud. By accurately identifying customers and assessing risk in real-time, businesses can make confident lending and fraud prevention decisions. To learn more about how Experian is enabling the protection of consumer credit scores, better risk assessments, and more inclusive lending, visit us or request a call. And keep an eye out for additional in-depth explorations of our Future of Fraud Forecast. Learn more Future of Fraud Forecast
This article was updated on February 5, 2024. Identity management can refer to how a company creates, verifies, stores, and uses its customers' digital identities. Traditionally, many large organizations relied on a highly segmented and siloed approach. For example, marketing, risk, and support departments might each have a limited view of a customer, and the tools and systems that support their specific purpose. Organizations are now shifting to a more holistic approach to enterprise identity management. By working together, departments help contribute to building a more complete, single view of a customer. Some companies have renewed or increased their focus on the transformation during the pandemic, and the transition to an enterprise-wide identity management strategy can have long-lasting benefits. But it isn't always easy. Challenges of an enterprise-wide identity management strategy Gathering the initial momentum needed to break out of a siloed approach can be particularly challenging for large organizations when each business unit has an ingrained identity system that meets the unit's needs. Smaller organizations might have an easier time gathering consensus, but budget or technological limitations may be serious constraints. Even after a decision is made and the budget gets set aside, organizations need to think through how they'll create and manage a new enterprise-wide identity management system. It's not a one-and-done upgrade. For the strategy to succeed, you'll need to have processes in place to onboard, verify, secure, and activate the new digital identities. READ: What is Effective Multifactor Identity Authentication? Why use an enterprise-wide approach? Motivations and specifics can vary depending on an organization's size and structure, but some companies find a more holistic approach to customer identity management helps them: Improve customer experiences Save money by removing redundancies Boost sales with better-targeted marketing Better understand customers' needs Provide faster and more relevant support Make more informed decisions Detect and prevent fraud These benefits can play out across the entire customer lifecycle, and identity management systems are able to achieve this by pulling in data from various sources to build robust consumer identities and systems. Your internal, first-party data will be the most valuable and insightful, but you can append multidimensional data from third-party sources, such as consumer credit databases, demographic data or device data. And second-party data from partner brands or organizations. READ: Experian 2023 Identity and Fraud Report Consider the regulatory and security challenges An enterprise identity data management approach can also mean re-evaluating the applicable regulations and security challenges. The passage of the E.U.'s General Data Protection Regulation and California Consumer Privacy Act marked an important shift in how companies need to handle consumers' personal information — but that was only the start. Some U.S. states have also passed or are currently considering data privacy laws. Industry-specific regulations can apply as well, particularly in the healthcare and financial services industries. It's not as if a siloed approach lets an organization avoid regulation, but keeping current and upcoming laws in mind can be important during a large digital transformation. Additionally, consider how going beyond the minimum requirements could be beneficial. In a 2023 Experian white paper, we found that 61 percent of consumers want complete control over how companies use their personal data.1 Security also needs to be top of mind for any organization that collects and stores consumers' personal information. An enterprise-wide identity management system may make managing increasing amounts of data easier, which could help decrease fraud risks. And your customers may be willing to help — 67 percent are open to sharing data if it will increase security and help prevent fraud.2 Keeping customers' desires front and center Experian partnered with Aite-Novarica to study enterprise-wide identity management. All but one of the 12 executives interviewed said client experience is a primary or predominant driver in the transformation of their identity management programs.3 Once implemented, a holistic view of customers can increase the experience in many ways: Meaningful engagement: You can deliver relevant and timely offers if you understand when, where and why consumers are interested in your products and services. Similarly, you'll know who isn't a good fit and won't bother them (or waste money) by showing them ads. Verification: Using a single, persistent identity could make the initial and ongoing identity verification an easier process that doesn't disrupt consumers' lives or lead to frustration. Ongoing recognition: Nearly 70 percent of all consumers want businesses to recognize them across multiple visits.3 But you'll need to study your customers to determine how much friction is acceptable. Some people prefer security over convenience and are willing to trade a little time to use extra verification methods. Customer service: Having more insight into a customer's entire history and interactions with your organization can help you quickly respond when an issue arises, or even anticipate and solve potential problems. Security: Nearly two-thirds (64 percent) of consumers say they're very or somewhat concerned with online security.4 Companies that can quickly and accurately identify consumers can also help keep them safe from fraud and identity theft. While these may be some consumers' top concerns today, continue listening to your customers to better understand their wants and needs. WATCH: Webinar: Identity Evolved — Building consumer trust and engagement Implementing an enterprise-wide identity management strategy Identity management can become a daunting task, particularly as new data sources begin to flow. As a result, many organizations turn to outside partners who can help manage part, or all, of the process. For example, an identity management solution may offer identity resolution and help create and host an identity graph (the database that stores the unique digital identities). A more robust offering may also help with other parts of identity management, including ongoing data hygiene and helping you turn your unique customer insights into actionable marketing campaigns. Experience managing vast amounts of data is also important, as is access to additional offline and online data sources. In 2023, Experian found that 85 percent of companies said poor quality customer contact data negatively impacted their operation's processes and efficiency.5 An enterprise-wide system that allows business units to update a single customer profile with the latest contact information might help. But working with a data provider that appends the latest info from outside databases could be a better way to ensure you have customers' latest contact info. When researching potential partners, also consider how their offerings and approach align with your goals. If, like others, improving the customer experience is a priority, make sure the solution provider also has a customer-first approach. In turn, this means security is a top priority — it's what customers want and it's important for protecting you and your reputation. Learn more about Experian's identity management solutions and how you can benefit from working with a company that understands identities are personal. Learn more 1Experian (2023). White paper: Making identities personal 2Ibid. 3Aite-Novarica and Experian (2022). Enterprise Identity Management: Evolving Aspirations and Improved Collaboration Are Transforming the Discipline 4Experian (2023). Identity and Fraud Report 5Experian (2023). White paper: Making identities personal
This article was updated on January 26, 2024. Marketers are facing new challenges as third-party cookies crumble, and people use more devices throughout the day. Someone might comparison shop on their laptop in the morning, do more research on a tablet in the afternoon and finally decide to make a purchase on their phone before falling asleep at night. Being able to track these movements and insert yourself where appropriate can be difficult, but it's not impossible. One solution that's becoming increasingly attractive is creating a unified identity for each customer — and matching every piece of data and touchpoint to the single profile. For this to work, you need identity resolution. What is identity resolution? Identity resolution is the ongoing process of linking various identifying elements to create and expand a unique identity. The multi-step process can include: Securely onboarding data into a system Hashing or tokenizing personal information to improve security and privacy Setting aside information that can't be matched to an identity yet Matching or linking identifiers to a known unique identity Verifying that the identities and identifiers are accurate An identity graph (ID graph) is an essential part of identity resolution. It's the proprietary database that can pull in and store data from different sources and link them to a unique identifier — also known as a persistent identification number. Depending on the system and purpose, identity resolution may focus on creating a single identity for a person, household, or business. The information can come from internal sources, including a customer relationship management (CRM) tool, email marketing platforms, event management platforms, social media accounts, point-of-sales systems, and other digital and offline touchpoints. Additionally, third-party data sources, such as credit or demographic data, can contribute to building a more complete identity. And second-party data — information that's shared between brands or companies — can also be helpful. As new digital and offline information is created or found, it's linked to the existing persistent identification number in the ID graph. The process can happen in different ways. The resolution system could accurately match an engagement to a person with deterministic data, such as a hashed email address, assuming they logged in. If the person didn't log in, a probabilistic model may be able to accurately attribute the session to the person's identity based on indicators that it's likely the same person, such as a device ID or behavioral data. A hybrid approach combines deterministic and probabilistic approaches, which could be important for scaling. The goal and end result is often called a holistic, single-unified, or 360-degree view of a customer. READ MORE: Making identities personal Why does identity resolution matter? Identity resolution lets you know with whom you're connecting, which can be important throughout a customer's lifecycle. From marketing to collections, you want to be able to engage the right person on the right channel with the right offer. And that's only possible when you can accurately identify people. Consistent and accurate identity resolution is difficult, though. Experian's 2023 Identity and Fraud Report found that 92% of businesses have a strategy in place for identifying consumers online. But 63% of consumers are either "somewhat confident" or "not very confident" that businesses can accurately recognize them online. What are the benefits of identity resolution? It's a worthy goal to push toward, because you can use identity resolution solutions to: Consolidate your view of customers Companies may have multiple profiles of the same customer — one from an email list, another from their loyalty program and a third from an outdated system. Your customers are also interacting with you in different ways, perhaps logging into an account from their laptop in the morning while visiting your site from a phone at night. Identity resolution lets you connect all these elements to create a single profile. Build targeted and measurable marketing campaigns Once you have a single and consistent view of your customers, you can more accurately segment and target your marketing campaigns. Personalizing messages can increase engagement and effectiveness. And, equally important, knowing to who you don't want to send messages can help you avoid wasting marketing spending. Some identity resolution services can also help you track anonymous visitors and customize your marketing with look-alike models, which can identify people who are likely part of your target audience. You'll also be able to more accurately measure the effectiveness of a campaign. With a single customer view, it's easier to know if and how a targeted social media ad, television spot and emailed coupon worked together to create a sale. Increase customer experiences across brands When implemented throughout an organization, you can also use the single view of a customer to create a consistent experience across brands and business units. Each can benefit from a more holistic understanding of the customer and can contribute to building out customers' profiles. Seamlessly confirm identities Identity resolution can also create a more frictionless experience for customers who want to create or log into your site, and it can help with detecting fraud and high-risk consumers. But keep data security top of mind. Consumers rank privacy (79%) and security (78%) much higher than login convenience (38%) when considering their online experience. What does an identity resolution solution look like? The need for and type of identity resolution can vary depending on a business' challenges and goals. For instance, large retailers often have a lot of first-party data — so much that it may be overwhelming. For them, an identity resolution solution that can organize internal data while enhancing it with external data points could be a priority. In contrast, a business with infrequent touchpoints might not have as much first-party data and could benefit from a solution that offers as much external information as possible. Some organizations are building their own internal identity resolution services to address these challenges, but many are looking to outside partners for identity resolution. When comparing partners, consider: Flexibility and scalability: Understand which data the solution can onboard and how quickly it can onboard data. Consider whether you'll want to be able to use real-time APIs or batch processing, and the limitations on how much data the provider can process at a time. Additionally, consider whether the ID graph will use persistent IDs that can change as you scale. Matching and analysis: Ask about the solution's approach and success with matching online and offline data and the options to integrate or append second and third-party data. If you want to be able to securely and privately share anonymized identities internally or with partners, make sure that's an option as well. Integration: Research whether the provider can easily integrate your existing services and vendors. Privacy: 73% of consumers say it's a business's responsibility to protect them online. Ask about the provider's experience and approach to storing and anonymizing data. Some solutions also have built-in activation tools. These let you build and launch omni-channel campaigns. They also analyze and report on how well your campaigns are performing. Get started today To learn more about the importance of digital identity and Experian's identity solutions, visit us today. Learn more
This article was updated on January 23, 2024. Sometimes you have to break from tradition and look to modern solutions to address modern problems. As consumers increasingly expect fast-paced digital experiences, lenders are tapping into advances in computing power to enhance their operations. According to a 2022 Experian study, 66% of businesses believe advanced analytics, including machine learning and artificial intelligence, are going to rapidly change the way they do business.1 While some may feel wary about trusting automated systems, remember that you're in control of the strategy. Automation comes in after to help take over monotonous and complex or error-prone tasks. As a result, you can free up resources for work that isn't as well-suited for automation, such as analyzing results and revising strategies. The benefits of automation within loan origination From initial screenings to determining a final decision or credit limit, automation can offer benefits throughout the loan origination process. And lenders of all sizes are exploring opportunities for automation to help them: Manage an overwhelming number of applications: Lenders may be struggling to respond to an increased demand for credit, particularly if they're also dealing with staffing shortages and rely on manual inputs and reviews. Automation can remove some of the burden from employees and lead to faster decisions. Increase consistency and accuracy: Transposing information from applications and making calculations by hand can result in errors or inconsistent results. Modern automated systems can help ensure information is accurate, uniform and up to date. Create scalable processes: Automated processes are easier to scale than a strategy that relies on consistent manual reviews and frequent back-and-forth with customers. Improve customers' experiences: Fast, accurate and fair decisions make for happy customers. However, 58% don't feel that businesses completely meet their expectations for their online experience.2 What's more, 91% of online applications are abandoned before completion.3 More loans, a consistent scalable process and happy customers can all drive revenue growth. When integrated throughout the underwriting journey, automation can also help you increase conversion rates and expand your lending universe without taking on more risk. What does an optimized and automated loan origination process look like? Modern loan origination software offers flexibility, security, speed and robust integrations. These can be cloud-based systems that vendors create and manage on your behalf, or lenders that have the resources and capabilities may be able to bring (or build) them in house. Strategy first Automating parts of your origination process can save you time and money, but you have to start with a specific strategy. For example, you might consider your model's outputs and decide on denial and approval cut-off points — you can then automate those approvals and denials. You can also test, revise, and optimize strategies based on your desired results. Digital applications Let consumers apply when and how they want, even if it means pausing part-way through and continuing on a different device later. Remove potentially time-consuming steps by letting consumers upload and sign documents digitally, and use AI-driven automated systems to review the documents for accuracy.4 Integration with various data sources You need good data—and lots of it—to get the most out of an automated system. Some platforms can automatically connect and use internal data alongside third-party data sources, such as alternative data, credit bureau data and credit attributes. Identity, income and fraud checks Automated platforms can work with verification tools to quickly confirm the applicant's employment and income, confirm their identity and perform fraud checks. The process can take minutes rather than days or weeks, letting you quickly move applicants through to the next stage of the process. Decisions based on optimized models Automated decision engines use your strategy and the available data to quickly return a decision. Machine learning models can score consumers who aren't scorable by traditional credit models, expanding your potential customer base while furthering financial inclusion goals. They can also more accurately score applicants and narrow the band (and potentially the number of applications) that requires manual reviews.5 Automation in action: Atlas Credit, a small-dollar lender, wanted to modernize its lending with customized and automated systems. Experian helped them build a custom machine learning credit risk model and optimized their decision strategy and cutoffs. The results exceeded Atlas Credit's goals, and the company nearly doubled their loan approval rates while decreasing risk losses by 15 to 20 percent. Explainable results Automated, fast decisions based on machine learning and AI analytics might raise some compliance flags—but we've moved beyond black box models. You need to be aware of and follow all the applicable regulations, and you can use AI and machine learning in precise ways to increase your efficiency while having fully explainable and compliant results. Experian's automated offerings build on a history of success Experian has decades of experience helping lenders make accurate and timely credit decisions, and our flexible loan origination system can help you automate originations while managing risk. It starts with good data. While we're known for our consumer credit database that has information on over 245 million consumers, Experian can also give lenders access to alternative data, including alternative financial services, rental payment data and consumer-permission data. And we know how to incorporate your internal data to create strategies that will further your specific goals. From marketing to collections, our integrated offerings can help you use the data to automate and optimize decisions across the entire customer life cycle. And whether you want to take the reins or tap our data scientists for their expertise, there are options to fit your needs. Learn more about our suite of loan origination software solutions and PowerCurve® Originations Essentials, our automated decision engine. Learn more 1Experian (2022). Explainability: ML and AI in credit decisioning2Experian (2022). North America findings from the 2022 Decisioning Survey 3Experian (2023). eBook: The Ultimate Guide to Competitive Growth 4Ibid.5Experian (2022). Driving Growth During Economic Uncertainty with AI/ML Strategies
As vehicle inventory continues to restore post-pandemic, data through the third quarter of 2023 showed new vehicle registrations are on the rise again—a positive sign that the market is leveling out. According to Experian’s Automotive Market Trends Report: Q3 2023, new vehicle registrations increased 12.7% year-over-year, reaching 11.5 million. On the used side, registrations declined to 29.3 million through Q3 2023, a 2% decrease from 29.9 million last year. Digging a bit deeper, CUVs/SUVs were the most registered new vehicle segment at 56.9%, up from 56.2% compared to last year. Pickup trucks declined from 18.6% to 17.4% year-over-year and sedans went from 17.1% to 16.8% in the same time frame. While knowing what types of vehicles consumers are interested in is beneficial for automotive professionals, breaking down the most sought-after models will paint a fuller picture as they assist shoppers in finding a vehicle that fits their needs. For instance, despite new pickup truck registrations declining year-over-year, the Ford F-150 made up the highest share of new vehicle registrations through Q3 2023—reaching 3%. The Tesla Model Y and Toyota RAV4 were not far behind, both coming in at 2.5% this quarter. They were followed by the Chevrolet Silverado 1500 and Honda CR-V tying at 2.3%. ICE vehicles continue to grow Taking a deeper dive into the fuel type share, ICE vehicles continue to grow year-over-year, even with electric vehicles (EVs) making headway into the market. Experian Automotive’s Vehicles in Operation (VIO) data as of Q3 2023 shows ICE vehicle registrations grew to 265.7 million, up from 264.5 million last year, while hybrid vehicles increased to 8.0 million, from 6.9 million in the same time frame. Meanwhile, EVs went from 2.0 million last year to 3.0 million this year and diesel saw a slight uptick from 9.6 million to 9.9 million in the same period. Leveraging different data points and staying up to date on vehicle registration trends can better prepare professionals as the market remains ever-changing and consumer preference continues to shift. To learn more about vehicle market trends, view the full Automotive Market Trends Report: Q3 2023 presentation on demand.
This article was updated on April 23, 2024. Keeping your organization and consumers safe can be challenging as cybercriminals test new attack vectors and data breaches continually expose credentials. Instead of relying solely on usernames and passwords for user identity verification, adding extra security measures like multi-factor authentication can strengthen your defense. What is multi-factor authentication? Multi-factor authentication, or MFA, is a method of authenticating people using more than one type of identifier. Generally, you can put these identifiers into three categories based on the type of information: Something a person knows: Usernames, passwords, and personal information are common examples of identifiers from this category. Something a person has: These could include a phone, computer, card, badge, security key, or another type of physical device that someone possesses. Something a person is: Also called the inherence factor, these are intrinsic behaviors or qualities, such as a person's voice pattern, retina, or fingerprint. The key to MFA is it requires someone to use identifiers from different categories. For example, when you withdraw money from an ATM, you're using something you have (your ATM card or phone), and something you know (your PIN) or are (biometric data) to authenticate yourself. Common types of authenticators Organizations that want to implement multi-factor authentication can use different combinations of identifiers and authenticators. Some authenticator options include: One-time passwords: One-time passwords (OTPs) can be generated and sent to someone's mobile phone via text to confirm the person has the phone or via email. There are also security tokens and apps that can generate OTPs for authentication. (Something you know.) Knowledge-based authentication: Knowledge-based authentication (KBA) identity verification leverages the ability to verify account information or a payment card, “something you have,” by confirming some sequence of numbers from the account. (Something you know.) Security tokens: Devices that users plug into their phone or computer, or hold near the device, to authenticate themselves. (Something you have.) Biometric scans: These can include fingerprint and face scans from a mobile device, computer, or security token. (Something you are.) Why MFA is important It can be challenging to keep your users and employees from using weak passwords. And even if you enforce strict password requirements, you can't be sure they're not using the same password somewhere else or accidentally falling for a phishing attack. In short, if you want to protect users' data and your business from various types of attacks, such as account takeover fraud, synthetic identity fraud, and credential stuffing, you’ll need to require more than a username and password to authenticate users. That’s where MFA comes in. Because it uses a combination of elements to verify a consumer’s identity, if one of the required components in a transaction is missing or supplied incorrectly, the transaction won’t proceed. As a result, you can ensure you’re interacting with legitimate consumers and protect your organization from risk. LEARN MORE: Explore our fraud prevention solutions. How to provide a frictionless MFA experience While crucial to your organization, in-person and online identity verification shouldn’t create so much friction that legitimate consumers are driven away. Experian's 2023 U.S. Identity and Fraud Report found that 96 percent of consumers view OTPs as convenient identity verification solutions when opening a new account. An increasing number of consumers also view physical and behavioral biometrics as some of the most trustworthy recognition methods — 81 and 76 percent, respectively. To create a low friction MFA experience that consumers trust, you could let users choose from different MFA authentication options to secure their accounts. You can also create step-up rules that limit MFA requests to riskier situations — such as when a user logs in from a new device or places an unusually large order. To make the MFA experience even more seamless for consumers, consider adding automated identity verification (AIV) to your processes. Because AIV operates on advanced analytics and artificial intelligence, consumers can verify their identities within seconds without physical documentation, allowing for a quick, hassle-free verification experience. How Experian powers multi-factor authentication Experian offers various identity verification and risk-based authentication solutions that organizations can leverage to streamline and secure their operations, including: Experian’s CrossCore® Doc Capture confidently verifies identities using a fully supported end-to-end document verification service where consumers upload an image of a driver’s license, passport, or similar directly from their smartphone. Experian’s CrossCore Doc Capture adds another layer of security to document capture with a biometric component that enables the individual to upload a “selfie” that’s compared to the document image. Experian's OTP service uses additional verification checks and identity scoring to help prevent fraudsters from using a SIM swapping attack to get past an MFA check. Before sending the OTP, we verify that the number is linked to the consumer's name. We also review additional attributes, such as whether the number was recently ported and the account's tenure. Experian's Knowledge IQSM offers KBA with over 70 credit- and noncredit-based questions to help you engage in additional authentication for consumers when sufficiently robust data can be used to prompt a response that proves the person has something specific in their possession. You can even configure it to ask questions based on your internal data and phrase questions to match your brand's language. Learn more about how our multi-factor authentication solutions can help your organization verify consumer identities and mitigate fraud. Learn about our MFA solutions
Managing digital identities is a necessity, responsibility and privilege. When done right, digital identity management solutions can help consumers feel recognized and safe. In turn, companies can build strong and personalized relationships with their customers while complying with regulatory requirements and combating hydra-like fraud attacks. What is digital identity? The concept and definition of a digital identity have expanded as everyday interactions increasingly happen in digital realms. Today, a digital identity is more than an online account. Identities can be created and depend on all the digital information associated with a unique entity, which may be a person, business or device. A person's digital identity often includes online and offline attributes that fall into one of three categories: Something a user knows, such as a username, password or PIN. Something a user has, such as a mobile phone or security token. Something that's part of the user, such as a fingerprint, iris, voice pattern, behavior or preferences. People are increasingly open to sharing this type of personal information if it serves a purpose. Our Global Identity and Fraud Report found that 57 percent of consumers are willing to share data if it ensures greater security or prevents fraud, and 63 percent of consumers think sharing data is beneficial (up from 51 percent in 2021).1 People can also use these identifiers to verify their identity at a later point. But digital identity verification tools should rely on more than user-provided verification alone. A person may have hundreds or thousands of digital interactions every day, and these can leave digital footprints that you can use to create or expand digital identities. These types of identifiers — such as search queries, geotags, behaviors and device information — can also help you authenticate a user and offer a more customized and seamless experience. However, when focusing on consumers' digital identities, it's important to remember that their identity is more than the sum of data points. A person's digital identity is unique and personal, and it should be managed accordingly. The business side's challenges A discussion of what makes up an identity can quickly turn philosophical. For instance, you can't authenticate identical twins based on a face scan or DNA test, so what is it that makes them unique? In some ways, the example gets to the heart of businesses' challenges today. To create a safe and enjoyable online identity verification experience, you need to be able to distinguish between a real person and an imitator, even when the two look nearly identical. Access to more information can make this easier, but you then need to ensure that you can keep this information secure. It can be a tricky balance, but if you get it right, your efforts will be rewarded. People want to be recognized as they move across channels and devices, and organizations want to be able to quickly and accurately identify users with a friction-right experience that also helps prevent fraud. However, while 84 percent of businesses say recognizing customers is "very" or "extremely" important, only about 33 percent of consumers are confident that they'll be repeatedly recognized online.1 There's a clear gap — and an opportunity to better meet customers' desires. Organizations across industries know they need a customer recognition strategy and 82% already have one in place.2 Some businesses address this challenge with identity platforms that are standardized and interoperable. Standardization allows the platform to gather and store the growing influx of data that it can use as part of a digital identity strategy. Interoperability allows the platform to match different types of data, including physical data, with a person to verify their digital identity and avoid the creation of duplicate identities. In short, the platforms can make sense of increasingly large amounts of internal and external data and easily incorporate new data sources as they become available. Regulatory compliance and digital identity Navigating the regulatory landscape is a significant challenge for organizations dealing with digital identities. Compliance is not only necessary for legal reasons but also critical to maintaining customer trust and safeguarding institutional reputation. Organizations must stay informed about the regulatory frameworks that affect digital identity, such as the General Data Protection Regulation (GDPR) in the European Union, the California Consumer Privacy Act (CCPA), and other pertinent laws in jurisdictions they operate. These regulations dictate how personal data can be collected, stored, used and shared. Staying ahead of regulatory changes: Regulatory landscapes are dynamic, particularly concerning digital data. Organizations should engage with policymakers and participate in industry forums to stay ahead of changes. By proactively managing compliance, organizations can avoid costly penalties, operational disruptions and reputational damage. The consumer's perspective Some organizations are adopting a consumer-centric approach to digital identity that puts consumers' needs and desires first. These can broadly be broken into four categories: Security: While people want a seamless and personalized experience, security and privacy are listed as top concerns year after year.1 That might not be surprising given that data breaches continually make headlines and there are growing concerns over identity theft. Privacy: Security is related to privacy, but privacy means more than keeping consumers' information safe from hackers. Our April 2022 Global Insight Report found that 90 percent of consumers want some or complete control over how their personal data is used. 3 Recognition: People want to be continually recognized once they share and verify their identity, even if they move between devices or channels. And nearly 70 percent of consumers say it's important for businesses to recognize them across multiple visits.1 Inclusion: Consumers may have varying levels of access to technology, comfort with technology and access to physical identifiers. Creating digital identity solutions for these potential barriers can also increase financial inclusion. While these are all areas of focus, organizations also need to find the right fit for each person and interaction. For instance, consumers may expect and even appreciate a robust verification process when they're opening a new financial account. But they could quickly be turned off by a similar process if they're making a small purchase or trying to play a new online game. What to look for in a digital identity partner Digital identity solutions and services have grown increasingly sophisticated to meet today's challenges. Identity hubs and data orchestration engines can connect with multiple services to help create, resolve, verify and authenticate identities. By moving away from a siloed approach, businesses can offer customers a better experience while minimizing their risk throughout the customer journey. When comparing potential partners, look for a company that: Has a customer-first approach: If your business is customer-first, then you need a partner who has a similar view. Uses multidimensional data: The partner should be able to offer and use offline and digital data sources to resolve, verify and authenticate digital identities. Its capabilities may become increasingly important as new data sources emerge. Isn't afraid to innovate: Look into how the partner is testing and using the latest advancements, such as artificial intelligence, in its digital identity solutions. Protects your brand: Understand how the partner helps detect and prevent fraud while creating a seamless experience for your customers and protecting their data. The right partner can increase your bottom line, help you build trust and improve your brand's reputation. Learn more about Experian Identity, an integrated approach to digital identity that builds on Experian's decades of experience managing and securing identifying information. Learn more 1“2022 Global Identity and Fraud Report: Building digital consumer trust amidst rising fraud activity and concerns," Experian, June 2022 2“2021 Global Identity and Fraud Report: Protecting and enabling customer engagements in the new digital era," Experian, April 2021. https://www.experian.com/content/dam/marketing/na/global-da/pdfs/GIDFR_2022.pdf https://www.experian.co.th/wp-content/uploads/2021/04/Experian-Global-Identity-Fraud-Report-2021.pdf 3"Global Insights Report: April 2022," Experian, April 2022. https://www.experian.com/blogs/global-insights/wp-content/uploads/2022/04/WaveReportApril2022.pdf *This article includes content created by an AI language model and is intended to provide general information.