Apply DA Tag

Loading...

If you’re a manager at a business that lends to consumers or otherwise extends credit, you certainly are aware that 10-15% of your current customers and prospective future customers are among the approximately 27 million consumers who are now – or will soon be -- fitting another bill into their monthly budgets. Early in the COVID-19 pandemic, the government issued a pause on federal student loan payments and interest. Now that the payment pause has expired, millions of Americans face a new bill averaging more than $200. Will they pay you first? If this is your concern, you aren’t alone: Experian recently held a webinar that discussed how the end of the student loan pause might affect businesses. When we surveyed the webinar attendees,  nearly 3 out of 4 responses included Risk Management as a main concerns now. Another top concern is about credit scores. Lenders and investors use credit scores – bureau scores such FICO® or VantageScore® credit score or custom credit scores proprietary to their institution – to predict credit default risk. The risk managers at those companies want to know to what extent they can continue to rely on those scores as Federal student loan payments come due and consumers experience payment shock. I’ve analyzed a large and statistically meaningful sample (10% of the US consumer population in Experian’s Ascend Sandbox) to shed some light on that question. As background information, the average consumer with student loans had lower scores before the pandemic than the average of the general population. One of my Experian colleagues has explored some of the reasons at https://www.experian.com/blogs/ask-experian/research/average-student-loan-payments). Here are some of the things we can learn from comparing the credit data of the two groups of people. I looked at a period from 2019 and from 2023 to see how things have changed: Average credit scores increased during the pandemic, continuing a long-term trend during which more Americans have been willing and able to meet all their obligations. During the COVID Public Health Emergency, consumers with student loans brought up their scores by an average of 25 points; that was 7 points more than consumers without student loans. Another way to look at it: in 2019, consumers with student loans had credit scores 23 points lower than consumers without. By 2023, that difference had shrunk to 16 points. Experian research shows that there will be little immediate impact on credit scores when the new bills come due. Time will tell whether these increased credit scores accurately reflect a reduction in the risk that consumers will default on other bills such as auto loans or bankcards soon, even as some people fit student loan bills into their budgets. It is well-known that many people saved money during the public health emergency. Since then, the personal savings rate has fallen from a pandemic high of 32% to levels between 3% and 5% this year – lower than at any point since the 2009 recession. In an October 2023 Experian survey, only 36% of borrowers said they either set aside funds or they planned using other financial strategies specifically for the resumption of their student loan payments. Additional findings from that study can be found here. Furthermore, there are changes in the way your customers have used their credit cards over the last four years:   Consumers’ credit card balances have increased over the last four years. Consumers with student loans have balances that are on average $282 (4%) more now than in 2019. That is a significantly smaller increase than for consumers without student loans, whose total credit card debt increased by an average of $1,932 (26%). Although their balances increased, the ratio of consumers’ total revolving debt balances to their credit limits (utilization) changed by less than 1% for both consumers with student loans and consumers without. In 2019, the utilization ratio was 9.8 percentage points lower for consumers with student loans than consumers without. Four years later, the difference is nearly the same (9.6 points). We can conclude that many student loan borrowers have been very responsible with credit during the Public Health Emergency. They may have been more mindful of their credit situation, and some may have planned for the day when their student loan payments will be due. As the student loan pause come to an end, there are a few things that lenders and other businesses should be doing to be ready: Even if you are not a student loan lender, it is important to stay on top of the rapidly evolving student loan environment. It affects many of your customers, and your business with them needs to adapt. Anticipate that fraudsters and abusers of credit will be creative now: periods of change create opportunities for them and you should be one step ahead. Build optimized strategies in marketing, account opening, and servicing. Consider using machine learning to make more accurate predictions. Those strategies should reflect trends in payments, balances, and utilization; older credit scores look at a single point in time. Continually refresh data about your customers—including their credit scores and important attributes related to payments, balances, and utilization patterns. Look for alternative data that will give you a leg up on the competition. In the coming weeks and months, Experian’s data scientists will monitor measures of performance of the scores and attributes that you depend on in your data-driven strategies — particularly focusing on the Kolmogorov-Smirnov (KS) statistics that will show changes in the predictive power of each score and attribute. (If you are a data-driven business, your data science team or a trusted partner should be doing the same thing with a more specific look at your customer base and business strategies.) In future reports and blog posts, we’ll shed light on the impact student loans are having on your customers and on your business. In the meantime, for more information about how to use data and advanced analytics to grow while controlling costs and risks, all while staying in compliance and providing a good customer experience, visit our website.

Published: November 16, 2023 by Jim Bander

The gig economy — also called the sharing economy or access economy — is an activity where people earn income by providing on-demand work, services, or goods. Often, it is through a digital platform like an application (app) or website. The gig economy seamlessly connects individuals with a diverse range of services, whether it be a skilled handyman for those long-awaited office shelves, or an experienced chauffeur to quickly drive you to the airport to not miss your flight. However, there are instances when these arrangements fall short of expectations. The hired handyman may send a substitute who’s ill-equipped for the task, or the experienced driver takes the wrong shortcut leaving you scrambling to make your flight on time. On the flip side, there are numerous risks faced by those working in the gig/sharing economy, from irritable customers to dangerous situations. In such cases, trust takes a hit. The gig economy has witnessed a surge in recent years, as individuals gravitate towards flexible, freelance, and contract work instead of traditional full-time employment. This shift has unlocked a multitude of opportunities for both workers and businesses. Nevertheless, it has also ushered in challenges pertaining to security and trust. One such challenge revolves around the escalating significance of digital identity verification within the gig economy.  Digital identity verification and the gig economy  Digital identity verification encompasses validating a person's identity through digital means, such as biometric data, facial recognition, or document verification. Within the gig economy, this process has high importance, as it establishes trust between businesses and their pool of freelance or contract workers. With the escalating number of remote workers and the proliferation of online platforms connecting businesses with gig workers, verifying the identities of these individuals has become more vital than ever before.  Protecting gig users and improving the customer experience   One primary rationale behind the mounting importance of digital identity verification in the gig economy is its role in curbing fraud. As the gig economy gains traction, the risk of individuals misrepresenting themselves or their qualifications to secure work burgeons. This scenario can lead businesses to hire unqualified or even fraudulent workers, thereby posing severe repercussions for both the company and its customers. By adopting digital identity verification processes, businesses can ensure the legitimacy and competence of their workforce, subsequently decreasing the risk of fraudulent activities.  In the digital age, trust and safety are crucial for businesses to succeed. Consumers prioritize brands they can trust, and broken trust can lead to loss of customers.According to Experian's 2023 Fraud and Identity Report, over 52% of US consumers feel they’re more of a target for online fraud than they were a year ago. As such, online security continues to be a real concern for most consumers. Nearly 64% of consumers say that they are very or somewhat concerned with online security, with 32% saying they are very concerned. Establishing trust and safety measures not only protects your brand but also enhances the user experience, fosters loyalty, and boosts your business.    Role of a dedicated Trust and safety team  Trust and safety are the set of business practices for online platforms to follow to reduce the risk of users being exposed to harm, fraud, or other behaviors outside community guidelines. This is becoming an increasingly important function as online platforms look to protect their users while improving customer acquisition, engagement, and retention.  That team also safeguards organizations from security threats and scams. They verify customers' identities, evaluate actions and intentions, and ensure a safe environment for all platform users. This enables both organizations and customers to trust each other and have confidence in the platform. Their role has evolved from fraud prevention to encompass broader areas, such as user-generated content and the metaverse. With the rise of user-generated content, platforms face challenges like fake accounts, imitations, malicious links, and inappropriate content. As a result, trust and safety teams have expanded their focus and are involved in product engineering and customer journey design. Another noteworthy factor contributing to the growing emphasis on digital identity verification for trust and safety teams stems from the necessity to adhere to diverse regulations and laws. Many countries have implemented stringent regulations to safeguard workers and ensure the legal and ethical operations of businesses. In the United States, for instance, businesses must verify the identities and work eligibility of all employees, including freelancers and contractors, as part of the Form I-9 process. By leveraging digital identity verification tools, businesses can streamline these procedures and guarantee compliance with prevailing regulations.  Mitigating risk in online marketplaces  To mitigate risks in online marketplaces, businesses can take several steps, including creating a clear set of user guidelines, implementing identity verification during onboarding, enforcing multi-factor authentication for all accounts, leveraging reverification during high-risk moments, performing link analysis on the user base, and applying automation. Online identity verification plays a pivotal role in safeguarding gig workers themselves. With the surge of online platforms connecting businesses with freelancers and contractors, there comes an augmented risk of workers falling prey to scams or identity theft. By mandating digital identity verification as an integral part of the onboarding process, these platforms can shield workers and ensure they only engage with bona fide businesses.  While automation can be a powerful tool for fraud detection and mitigation, it is not a cure-all solution. Automated identity verification has its strengths, but it also has its weaknesses. While automation can spot risk signals that a human might miss, a human might spot risk signals that automation would have skipped. Therefore, for many companies, the goal should not be full automation but achieving the right ratio of automation to manual review. Manual review takes time, but it's necessary to ensure that all potential risks are identified and addressed. The more efficient these processes can be, the better, as it allows for a quicker response to potential threats. As the number of individuals embracing freelance and contract work surges, and businesses increasingly rely on these workers to carry out vital responsibilities, ensuring the security and trustworthiness of these individuals becomes paramount. By integrating digital identity verification processes, businesses can shield themselves against fraud, comply with regulations, and cultivate trust with their gig workers.  Finding the right partner While trust and safety are concerns for all online marketplaces, there’s no universal solution that will apply to all businesses and in all cases. Your trust and safety policies need to be tailored to the realities of your business. The industries you serve, regions you operate in, regulations you are subject to, and expectations of your users should all inform your processes. Experian’s comprehensive suite of customizable identity verification solutions can help you solve the problem of trust and safety once and for all.  Learn more *This article leverages/includes content created by an AI language model and is intended to provide general information.

Published: November 14, 2023 by Alex Lvoff

With great risk comes great reward, as the saying goes. But when it comes to business, there's huge value in reducing and managing that risk as much as possible to maximize benefits — and profits. In today's high-tech strategic landscape, financial institutions and other organizations are increasingly using risk modeling to map out potential scenarios and gain a clearer understanding of where various paths may lead. But what are risk models really, and how can you ensure you're creating and using them correctly in a way that actually helps you optimize decision-making? Here, we explore the details. What is a risk model? A risk model is a representation of a particular situation that's created specifically for the purpose of assessing risk. That risk model is then used to evaluate the potential impacts of different decisions, paths and events. From assigning interest rates and amortization terms to deciding whether to begin operating in a new market, risk models are a safe way to analyze data, test assumptions and visualize potential scenarios. Risk models are particularly valuable in the credit industry. Credit risk models and credit risk analytics allow lenders to evaluate the pluses and minuses of lending to clients in specific ways. They are able to consider the larger economic environment, as well as relevant factors on a micro level. By integrating risk models into their decision-making process, lenders can refine credit offerings to fit the assessed risk of a particular situation. It goes like this: a team of risk management experts builds a model that brings together comprehensive datasets and risk modeling tools that incorporate mathematics, statistics and machine learning. This predictive modeling tool uses advanced algorithmic techniques to analyze data, identify patterns and make forecasts about future outcomes. Think of it as a crystal ball — but with science behind it. Your team can then use this risk model for a wide range of applications: refining marketing targets, reworking product offerings or reshaping business strategies. How can risk models be implemented? Risk models consolidate and utilize a wide variety of data sets, historical benchmarks and qualitative inputs to model risk and allow business leaders to test assumptions and visualize the potential results of various decisions and events. Implementing risk modeling means creating models of systems that allow you to adjust variables to imitate real-world situations and see what the results might be. A mortgage lender, for example, needs to be able to predict the effects of external and internal policies and decisions. By creating a risk model, they can test how scenarios such as falling interest rates, rising unemployment or a shift in loan acceptance rates might affect their business — and make moves to adjust their strategies accordingly. One aspect of risk modeling that can't be underestimated is the importance of good data, both quantitative and qualitative. Efforts to implement or expand risk modeling should begin with refining your data governance strategy. Maximizing the full potential of your data also requires integrating data quality solutions into your operations in order to ensure that the building blocks of your risk model are as accurate and thorough as possible. It's also important to ensure your organization has sufficient model risk governance in place. No model is perfect, and each comes with its own risks. But these risks can be mitigated with the right set of policies and procedures, some of which are part of regulatory compliance. With a comprehensive model risk management strategy, including processes like back testing, benchmarking, sensitivity analysis and stress testing, you can ensure your risk models are working for your organization — not opening you up to more risk. How can risk modeling be used in the credit industry? Risk modeling isn't just for making credit decisions. For instance, you might model the risk of opening or expanding operations in an underserved country or the costs and benefits of existing one that is underperforming. In information technology, a critical branch of virtually every modern organization, risk modeling helps security teams evaluate the risk of malicious attacks. Banking and financial services is one industry for which understanding and planning for risk is key — not only for business reasons but to align with relevant regulations. The mortgage lender mentioned above, for example, might use credit risk models to better predict risk, enhance the customer journey and ensure transparency and compliance. It's important to highlight that risk modeling is a guide, not a prophecy. Datasets can contain flaws or gaps, and human error can happen at any stage.. It's also possible to rely too heavily on historical information — and while they do say that history repeats itself, they don't mean it repeats itself exactly. That's especially true in the presence of novel challenges, like the rise of artificial intelligence. Making the best use of risk modeling tools involves not just optimizing software and data but using expert insight to interpret predictions and recommendations so that decision-making comes from a place of breadth and depth. Why are risk models important for banks and financial institutions? In the world of credit, optimizing risk assessment has clear ramifications when meeting overall business objectives. By using risk modeling to better understand your current and potential clients, you are positioned to offer the right credit products to the right audience and take action to mitigate risk. When it comes to portfolio risk management, having adequate risk models in place is paramount to meet targets. And not only does implementing quality portfolio risk analytics help maximize sales opportunities, but it can also help you identify risk proactively to avoid costly mistakes down the road. Risk mitigation tools are a key component of any risk modeling strategy and can help you maintain compliance, expose potential fraud, maximize the value of your portfolio and create a better overall customer experience. Advanced risk modeling techniques In the realm of risk modeling, the integration of advanced techniques like machine learning (ML) and artificial intelligence (AI) is revolutionizing how financial institutions assess and manage risk. These technologies enhance the predictive power of risk models by allowing for more complex data processing and pattern recognition than traditional statistical methods. Machine learning in risk modeling: ML algorithms can process vast amounts of unstructured data — such as market trends, consumer behavior and economic indicators — to identify patterns that may not be visible to human analysts. For instance, ML can be used to model credit risk by analyzing a borrower’s transaction history, social media activities and other digital footprints to predict their likelihood of default beyond traditional credit scoring methods. Artificial intelligence in decisioning: AI can automate the decisioning process in risk management by providing real-time predictions and risk assessments. AI systems can be trained to make decisions based on historical data and can adjust those decisions as they learn from new data. This capability is particularly useful in credit underwriting where AI algorithms can make rapid decisions based on market conditions. Financial institutions looking to leverage these advanced techniques must invest in robust data infrastructure, skilled personnel who can bridge the gap between data science and financial expertise, and continuous monitoring systems to ensure the models perform as expected while adhering to regulatory standards. Challenges in risk model validation Validating risk models is crucial for ensuring they function appropriately and comply with regulatory standards. Validation involves verifying both the theoretical foundations of a model and its practical implementation. Key challenges in model validation: Model complexity: As risk models become more complex, incorporating elements like ML and AI, they become harder to validate. Complex models can behave in unpredictable ways, making it difficult to understand why they are making certain decisions (the so-called "black box" issue). Data quality and availability: Effective validation requires high-quality, relevant data. Issues with data completeness, accuracy or relevance can lead to incorrect model validations. Regulatory compliance: With regulations continually evolving, keeping risk models compliant can be challenging. Different jurisdictions may have varying requirements, adding to the complexity of validation processes. Best practices: Regular reviews: Continuous monitoring and periodic reviews help ensure that models remain accurate over time and adapt to changing market conditions. Third-party audits: Independent reviews by external experts can provide an unbiased assessment of the risk model’s performance and compliance. These practices help institutions maintain the reliability and integrity of their risk models, ensuring that they continue to function as intended and comply with regulatory requirements. Read more: Blog post: What is model governance? How Experian can help Risk is inherent to business, and there's no avoiding it entirely. But integrating credit risk modeling into your operations can ensure stability and profitability in a rapidly evolving business landscape. Start with Experian's credit modeling services, which use expansive data, analytical expertise and the latest credit risk modeling methodologies to better predict risk and accelerate growth. Learn more *This article includes content created by an AI language model and is intended to provide general information.

Published: November 9, 2023 by Julie Lee

This article was updated on April 23, 2024. Keeping your organization and consumers safe can be challenging as cybercriminals test new attack vectors and data breaches continually expose credentials. Instead of relying solely on usernames and passwords for user identity verification, adding extra security measures like multi-factor authentication can strengthen your defense. What is multi-factor authentication? Multi-factor authentication, or MFA, is a method of authenticating people using more than one type of identifier. Generally, you can put these identifiers into three categories based on the type of information: Something a person knows: Usernames, passwords, and personal information are common examples of identifiers from this category. Something a person has: These could include a phone, computer, card, badge, security key, or another type of physical device that someone possesses. Something a person is: Also called the inherence factor, these are intrinsic behaviors or qualities, such as a person's voice pattern, retina, or fingerprint. The key to MFA is it requires someone to use identifiers from different categories. For example, when you withdraw money from an ATM, you're using something you have (your ATM card or phone), and something you know (your PIN) or are (biometric data) to authenticate yourself. Common types of authenticators Organizations that want to implement multi-factor authentication can use different combinations of identifiers and authenticators. Some authenticator options include: One-time passwords: One-time passwords (OTPs) can be generated and sent to someone's mobile phone via text to confirm the person has the phone or via email. There are also security tokens and apps that can generate OTPs for authentication. (Something you know.) Knowledge-based authentication: Knowledge-based authentication (KBA) identity verification leverages the ability to verify account information or a payment card, “something you have,” by confirming some sequence of numbers from the account. (Something you know.) Security tokens: Devices that users plug into their phone or computer, or hold near the device, to authenticate themselves. (Something you have.) Biometric scans: These can include fingerprint and face scans from a mobile device, computer, or security token. (Something you are.) Why MFA is important It can be challenging to keep your users and employees from using weak passwords. And even if you enforce strict password requirements, you can't be sure they're not using the same password somewhere else or accidentally falling for a phishing attack. In short, if you want to protect users' data and your business from various types of attacks, such as account takeover fraud, synthetic identity fraud, and credential stuffing, you’ll need to require more than a username and password to authenticate users. That’s where MFA comes in. Because it uses a combination of elements to verify a consumer’s identity, if one of the required components in a transaction is missing or supplied incorrectly, the transaction won’t proceed. As a result, you can ensure you’re interacting with legitimate consumers and protect your organization from risk. LEARN MORE: Explore our fraud prevention solutions. How to provide a frictionless MFA experience While crucial to your organization, in-person and online identity verification shouldn’t create so much friction that legitimate consumers are driven away. Experian's 2023 U.S. Identity and Fraud Report found that 96 percent of consumers view OTPs as convenient identity verification solutions when opening a new account. An increasing number of consumers also view physical and behavioral biometrics as some of the most trustworthy recognition methods — 81 and 76 percent, respectively. To create a low friction MFA experience that consumers trust, you could let users choose from different MFA authentication options to secure their accounts. You can also create step-up rules that limit MFA requests to riskier situations — such as when a user logs in from a new device or places an unusually large order. To make the MFA experience even more seamless for consumers, consider adding automated identity verification (AIV) to your processes. Because AIV operates on advanced analytics and artificial intelligence, consumers can verify their identities within seconds without physical documentation, allowing for a quick, hassle-free verification experience. How Experian powers multi-factor authentication Experian offers various identity verification and risk-based authentication solutions that organizations can leverage to streamline and secure their operations, including: Experian’s CrossCore® Doc Capture confidently verifies identities using a fully supported end-to-end document verification service where consumers upload an image of a driver’s license, passport, or similar directly from their smartphone. Experian’s CrossCore Doc Capture adds another layer of security to document capture with a biometric component that enables the individual to upload a “selfie” that’s compared to the document image. Experian's OTP service uses additional verification checks and identity scoring to help prevent fraudsters from using a SIM swapping attack to get past an MFA check. Before sending the OTP, we verify that the number is linked to the consumer's name. We also review additional attributes, such as whether the number was recently ported and the account's tenure. Experian's Knowledge IQSM offers KBA with over 70 credit- and noncredit-based questions to help you engage in additional authentication for consumers when sufficiently robust data can be used to prompt a response that proves the person has something specific in their possession. You can even configure it to ask questions based on your internal data and phrase questions to match your brand's language. Learn more about how our multi-factor authentication solutions can help your organization verify consumer identities and mitigate fraud. Learn about our MFA solutions

Published: November 9, 2023 by Guest Contributor

  Managing digital identities is a necessity, responsibility and privilege. When done right, digital identity management solutions can help consumers feel recognized and safe. In turn, companies can build strong and personalized relationships with their customers while complying with regulatory requirements and combating hydra-like fraud attacks. What is digital identity? The concept and definition of a digital identity have expanded as everyday interactions increasingly happen in digital realms. Today, a digital identity is more than an online account. Identities can be created and depend on all the digital information associated with a unique entity, which may be a person, business or device. A person's digital identity often includes online and offline attributes that fall into one of three categories: Something a user knows, such as a username, password or PIN. Something a user has, such as a mobile phone or security token. Something that's part of the user, such as a fingerprint, iris, voice pattern, behavior or preferences. People are increasingly open to sharing this type of personal information if it serves a purpose. Our Global Identity and Fraud Report found that 57 percent of consumers are willing to share data if it ensures greater security or prevents fraud, and 63 percent of consumers think sharing data is beneficial (up from 51 percent in 2021).1 People can also use these identifiers to verify their identity at a later point. But digital identity verification tools should rely on more than user-provided verification alone. A person may have hundreds or thousands of digital interactions every day, and these can leave digital footprints that you can use to create or expand digital identities. These types of identifiers — such as search queries, geotags, behaviors and device information — can also help you authenticate a user and offer a more customized and seamless experience. However, when focusing on consumers' digital identities, it's important to remember that their identity is more than the sum of data points. A person's digital identity is unique and personal, and it should be managed accordingly. The business side's challenges A discussion of what makes up an identity can quickly turn philosophical. For instance, you can't authenticate identical twins based on a face scan or DNA test, so what is it that makes them unique? In some ways, the example gets to the heart of businesses' challenges today. To create a safe and enjoyable online identity verification experience, you need to be able to distinguish between a real person and an imitator, even when the two look nearly identical. Access to more information can make this easier, but you then need to ensure that you can keep this information secure. It can be a tricky balance, but if you get it right, your efforts will be rewarded. People want to be recognized as they move across channels and devices, and organizations want to be able to quickly and accurately identify users with a friction-right experience that also helps prevent fraud. However, while 84 percent of businesses say recognizing customers is "very" or "extremely" important, only about 33 percent of consumers are confident that they'll be repeatedly recognized online.1 There's a clear gap — and an opportunity to better meet customers' desires. Organizations across industries know they need a customer recognition strategy and 82% already have one in place.2 Some businesses address this challenge with identity platforms that are standardized and interoperable. Standardization allows the platform to gather and store the growing influx of data that it can use as part of a digital identity strategy. Interoperability allows the platform to match different types of data, including physical data, with a person to verify their digital identity and avoid the creation of duplicate identities. In short, the platforms can make sense of increasingly large amounts of internal and external data and easily incorporate new data sources as they become available. Regulatory compliance and digital identity Navigating the regulatory landscape is a significant challenge for organizations dealing with digital identities. Compliance is not only necessary for legal reasons but also critical to maintaining customer trust and safeguarding institutional reputation. Organizations must stay informed about the regulatory frameworks that affect digital identity, such as the General Data Protection Regulation (GDPR) in the European Union, the California Consumer Privacy Act (CCPA), and other pertinent laws in jurisdictions they operate. These regulations dictate how personal data can be collected, stored, used and shared. Staying ahead of regulatory changes: Regulatory landscapes are dynamic, particularly concerning digital data. Organizations should engage with policymakers and participate in industry forums to  stay ahead of changes. By proactively managing compliance, organizations can avoid costly penalties, operational disruptions and reputational damage. The consumer's perspective Some organizations are adopting a consumer-centric approach to digital identity that puts consumers' needs and desires first. These can broadly be broken into four categories: Security: While people want a seamless and personalized experience, security and privacy are listed as top concerns year after year.1 That might not be surprising given that data breaches continually make headlines and there are growing concerns over identity theft. Privacy: Security is related to privacy, but privacy means more than keeping consumers' information safe from hackers. Our April 2022 Global Insight Report found that 90 percent of consumers want some or complete control over how their personal data is used. 3 Recognition: People want to be continually recognized once they share and verify their identity, even if they move between devices or channels. And nearly 70 percent of consumers say it's important for businesses to recognize them across multiple visits.1 Inclusion: Consumers may have varying levels of access to technology, comfort with technology and access to physical identifiers. Creating digital identity solutions for these potential barriers can also increase financial inclusion. While these are all areas of focus, organizations also need to find the right fit for each person and interaction. For instance, consumers may expect and even appreciate a robust verification process when they're opening a new financial account. But they could quickly be turned off by a similar process if they're making a small purchase or trying to play a new online game. What to look for in a digital identity partner Digital identity solutions and services have grown increasingly sophisticated to meet today's challenges. Identity hubs and data orchestration engines can connect with multiple services to help create, resolve, verify and authenticate identities. By moving away from a siloed approach, businesses can offer customers a better experience while minimizing their risk throughout the customer journey. When comparing potential partners, look for a company that: Has a customer-first approach: If your business is customer-first, then you need a partner who has a similar view. Uses multidimensional data: The partner should be able to offer and use offline and digital data sources to resolve, verify and authenticate digital identities. Its capabilities may become increasingly important as new data sources emerge. Isn't afraid to innovate: Look into how the partner is testing and using the latest advancements, such as artificial intelligence, in its digital identity solutions. Protects your brand: Understand how the partner helps detect and prevent fraud while creating a seamless experience for your customers and protecting their data. The right partner can increase your bottom line, help you build trust and improve your brand's reputation. Learn more about Experian Identity, an integrated approach to digital identity that builds on Experian's decades of experience managing and securing identifying information. Learn more 1“2022 Global Identity and Fraud Report: Building digital consumer trust amidst rising fraud activity and concerns," Experian, June 2022 2“2021 Global Identity and Fraud Report: Protecting and enabling customer engagements in the new digital era," Experian, April 2021. https://www.experian.com/content/dam/marketing/na/global-da/pdfs/GIDFR_2022.pdf https://www.experian.co.th/wp-content/uploads/2021/04/Experian-Global-Identity-Fraud-Report-2021.pdf 3"Global Insights Report: April 2022," Experian, April 2022. https://www.experian.com/blogs/global-insights/wp-content/uploads/2022/04/WaveReportApril2022.pdf *This article includes content created by an AI language model and is intended to provide general information.

Published: November 9, 2023 by Stefani Wendel

This article was updated on November 9, 2023. Fraud – it’s a word that comes up in conversations across every industry. While there’s a general awareness that fraud is on the rise and is constantly evolving, for many the full impact of fraud is misunderstood and underestimated. At the heart of this challenge is the tendency to lump different types of fraud together into one big problem, and then look for a single solution that addresses it. It’s as if we’re trying to figure out how to un-bake a terrible cake instead of thinking about the ingredients and the process needed to put them together in the first place. This is the first of a series of articles in which we’ll look at some of the key ingredients that create different types of fraud, including first party, third party, synthetic identity, and account takeover. We’ll talk about why they’re unique and why we need to approach each one differently. At the end of the series, we’ll get a result that’s easier to digest. I had second thoughts about the cake metaphor, but in truth it really works. Creating a good fraud risk management process is a lot like baking. We need to know the ingredients and some tried-and-true methods to get the best result. With that foundation in place, we can look for ways to improve the outcome every time. Let’s start with a look at the best known type of fraud, third party. What is third-party fraud? Third-party fraud – generally known as identity theft – occurs when a malicious actor uses another person’s identifying information to open new accounts without the knowledge of the individual whose information is being used. When you consider first-party vs third-party fraud, or synthetic identity fraud, third-party stands out because it involves an identifiable victim that’s willing to collaborate in the investigation and resolution, for the simple reason that they don’t want to be responsible for the obligation made under their name. Third-party fraud is often the only type of activity that’s classified as fraud by financial institutions. The presence of an identifiable victim creates a high level of certainty that fraud has indeed occurred. That certainty enables financial institutions to properly categorize the losses. Since there is a victim associated with it, third party fraud tends to have a shorter lifespan than other types. When victims become aware of what’s happening, they generally take steps to protect themselves and intervene where they know their identity has been potentially misused. As a result, the timeline for third-party fraud is shorter, with fraudsters acting quickly to maximize the funds they’re able to amass before busting out. How does third-party fraud impact me? As the digital transformation continues, more and more personally identifiable information (PII) is available on the dark web due to data breaches and phishing scams. Given that consumer spending is expected to increase1, we anticipate that the amount of PII readily available to criminals will only continue to grow. All of this will lead to identity theft and increase the risk of third-party fraud. More than $43 billion in total losses was reported due to identity theft and fraud in the U.S. in 2022.2 Solving the third-party fraud problem We’ve examined one part of the fraud problem, and it is a complex one. With Experian as your partner, solving for it isn’t. Continuing my cake metaphor, by following the right steps and including the right ingredients, businesses can detect and prevent fraud. Third-party fraud detection and prevention involves two distinct steps. Analytics: Driven by extensive data that captures the ways in which people present their identity—plus artificial intelligence and machine learning—good analytics can detect inconsistencies, and patterns of usage that are out of character for the person, or similar to past instances of known fraud. Verification: The advantage of dealing with third-party fraud is the availability of a victim that will confirm when fraud is happening. The verification step refers to the process of making contact with the identity owner to obtain that confirmation and may involve identity resolution. It does require some thought and discipline to make sure that the contact information used leads to the identity owner—and not to the fraudster. In a series of articles, we’ll be exploring first-party fraud, synthetic identity fraud, and account takeover fraud and how a layered fraud management solution can help keep your business and customers safe and manage third-party fraud detection, first-party fraud, synthetic identity fraud, and account takeover fraud prevention. Let us know if you’d like to learn more about how Experian is using our identity expertise, data, and analytics to create robust fraud prevention solutions. Contact us 1 Experian Ascend Sandbox 2 2023 U.S. Identity and Fraud Report, Experian.

Published: November 9, 2023 by Chris Ryan

This article was updated on November 9, 2023. Account takeover fraud is a huge, illicit business in the United States with real costs for consumers and the organizations that serve them. In fact, experts predict that by the end of 2023, account takeover losses will be over $635 billion. With consumers' data, your reputation, and your organization's financial picture on the line, now's the time to learn about account takeover fraud and how to prevent it.  What is account takeover fraud?  Account takeover fraud is a form of identity theft where bad actors gain unlawful access to a user's online accounts in order to commit financial crimes. This often involves the use of bots.  information that enables account access can be compromised in a variety of ways. It might be purchased and sold on the dark web, captured through spyware or malware or even given “voluntarily" by those falling for a phishing scam.  Account takeover fraud can do far more potential damage than previous forms of fraud because once criminals gain access to a user's online account, they can use those credentials to breach others of that user's accounts.  Common activities and tools associated with account takeover fraud include: Phishing: Phishing fraud relies on human error by impersonating legitimate businesses, usually in an email. For example, a scammer might send a phishing email disguising themselves as a user's bank and asking them to click on a link that will take them to a fraudulent site. If the user is fooled and clicks the link, it can give the hackers access to the account.  Credential stuffing/cracking: Fraudsters buy compromised data on the dark web and use bots to run automated scripts to try and access accounts. This strategy, called credential stuffing, can be very effective because many people reuse insecure passwords on multiple accounts, so numerous accounts might be breached when a bot has a hit. Credential cracking takes a less nuanced approach by simply trying different passwords on an account until one works.  Malware: Most people are aware of computer viruses and malware but they may not know that certain types of malware can track your keystrokes. If a user inadvertently downloads a “key logger", everything they type, including their passwords, is visible to hackers.  Trojans: As the name suggests, a trojan works by hiding inside a legitimate application. Often used with mobile banking apps, a trojan can overlay the app and capture credentials, intercept funds and redirect financial assets.  Cross-account takeover: One evolving type of fraud concern is cross-account takeover. This is where hackers take over a user's financial account alongside another account such as their mobile phone or email. With this kind of access, fraudsters can steal funds more easily and anti-fraud solutions are less able to identify them.  Intermediary new-account fraud: This type of fraud involves using a user's credentials to open new accounts in their name with the aim of draining their bank accounts.  This is only an overview of some of the most prevalent types of account takeover fraud. The rise of digital technologies, smartphones, and e-commerce has opened the door to thieves who can exploit the weaknesses in digital security for their own aims. The situation has only worsened with the rapid influx of new and inexperienced online users driven by the COVID-19 pandemic.  Why should you be concerned, now?  Now that digital commerce and smartphone use are the norm, information used to access accounts  is a security risk. If a hacker can get access to this information, they may be able to log in to multiple accounts.. The risk is no longer centralized; with every new technology, there's a new avenue to exploit.   To exacerbate the situation, the significant shift to online, particularly online banking, spurred by the COVID-19 pandemic, appears to have amplified account takeover fraud attempts. In 2019, prior to the pandemic, 1.5 billion records — or approximately five records per American — were exposed in data breaches. This can potentially increase as the number of digital banking users in the United States is expected to reach almost 217 million by 2025. Aite research reported that 64 percent of financial institutions were seeing higher rates of account takeover fraud than before COVID. Unfortunately, this trend shows no sign of slowing down. The increase in first-time online users propelled by COVID has amplified the critical security issues caused by a shift from transaction fraud to identity-centric account access. Organizations, especially those in the financial and big technology sectors, have every reason to be alarmed.  The impact of account takeover fraud on organizations  Account takeover can be costly, damage your reputation and require significant investments to identify and correct.  Protection of assets  When we think of the risks to organizations of account takeover fraud, the financial impact is usually the first hazard to come to mind. It's a significant worry: According to Experian's 2023 U.S. Identity and Fraud report, account takeover fraud was among the top most encountered fraud events reported by U.S. businesses. And even worse, the average net fraud loss per case for debit accounts has been steadily increasing since early 2021. The costs to businesses of these fraudulent activities aren't just from stolen funds. Those who offer credit products might have to cover the costs of disputing chargebacks, card processing fees or providing refunds. Plus, in the case of a data breach, there may be hefty fines levied against your organization for not properly safeguarding consumer information. Add to these the costs associated with the time of your PR department, sales and marketing teams, finance department and customer service units.  In short, the financial impact of account takeover fraud can permeate your entire organization and take significant time to recoup and repair.  Protection of information  Consumers rightfully expect organizations to have a solid cybersecurity plan and to protect their information but they also want ease and convenience. In many cases, it's the consumers themselves who engage in risky online behavior — reusing the same password on multiple sites or even using the same password on all sites. These lax security practices open users up to the possibility of multiple account takeovers. Making things worse for organizations, security strategies can annoy or frustrate consumers. If security measures are too strict, they risk alienating consumers or even generating false positives, where the security measure flags a legitimate user.  Organizations are in the difficult position of having to balance effective security measures with a comfortable user experience. Reputation  When there's a data breach, it does significant damage to your organization's reputation by demonstrating weaknesses in your security. Fraudulent account take-overs can affect the consumers who rely on you significantly and if you lose their trust, they're likely to sever their relationship with you. Large-scale data breaches can sully your organization's reputation with the general public, making consumers less likely to consider your services. How to build an account takeover fraud prevention strategy  There are numerous ways to build an account takeover fraud prevention strategy, but to work for your and individual consumers, it must pair robust risk management with a low friction user experience.  Here are some of the key elements to an account takeover fraud prevention strategy that hits the right notes.  Monitor interactions The risk of account takeover is constant so your monitoring should be as well. A layered, proactive and passive fraud prevention program can monitor your interactions, reduce false positives and keep track of consumers' digital identities. Use the right tools When it comes to fraud prevention, you've got plenty of choices but you'll want to make sure you use the tools that protect you, as well as consumer data, while always providing a positive experience. We use risk-based identity and device authentication and targeted step-up authentication to keep things running smoothly and only pull in staff for deeper investigations where necessary. Automate to reduce manual processes  Your organization's fraud prevention strategy likely includes manual processes, tasks that are completed by employees—but humans make mistakes that can be costly. Taking the wrong action, or even no action at all, can result in a security breach. Automated tasks like threat filtering and software and hardware updates can reduce the risk to your organization while improving response time and freeing up your team.  Choose a nimble platform  Technology changes quickly and so does fraud. You'll need access to a layered platform that lets you move as quickly as the bad actors do.  The bottom line  You can effectively mitigate against the risk of account takeover fraud and offer consumers a seamless experience. Learn more about account takeover fraud prevention and fraud management solutions.  Fraud management solutions

Published: November 9, 2023 by Guest Contributor

For companies that regularly engage in financial transactions, having a customer identification program (CIP) is mandatory to comply with the regulations around identity verification requirements across the customer lifecycle. In this blog post, we will delve into the essentials of a customer identification program, what it entails, and why it is important for businesses to implement one. What is a customer identification program? A CIP is a set of procedures implemented by financial institutions to verify the identity of their customers. The purpose of a CIP is to be a part of a financial institution’s fraud management solutions, with similar goals as to detect and prevent fraud like money laundering, identity theft, and other fraudulent activities. The program enables financial institutions to assess the risk level associated with a particular customer and determine whether their business dealings are legitimate. An effective CIP program should check the following boxes: Confidently verify customer identities Seamless authentication Understand and anticipate customer activities Where does Know Your Customer (KYC) fit in? KYC policies must include a robust CIP across the customer lifecycle from initial onboarding through portfolio management. KYC solutions encompass the financial institution’s customer identification program, customer due diligence and ongoing monitoring. What are the requirements for a CIP? Customer identification program requirements vary depending on the type of financial institution, the type of account opened, and other factors. However, the essential components of a CIP include verifying the customer's identity using government-issued identification, obtaining and verifying the customer's address, and checking the customer against a list of known criminals, terrorists, or suspicious individuals. These measures  help detect and prevent financial crimes. Why is a CIP important for businesses? CIP helps businesses mitigate risk by ensuring they have accurate and up-to-date information about their customers. This also helps financial institutions comply with laws and regulations that require them to monitor financial transactions for any suspicious activities. By having a robust CIP in place, businesses can establish trust and rapport with their customers. According to Experian’s 2024 U.S. Identity and Fraud Report, 63% of consumers say it's extremely or very important for businesses to recognize them online. Having an effective CIP in place is part of financial institutions showing their consumers that they have their best interests top of mind. Finding the right partner It’s important to find a partner you trust when working to establish processes and procedures for verifying customer identity, address, and other relevant information. Companies can also utilize specialized software that can help streamline the CIP process and ensure that it is being carried out accurately and consistently. Experian’s proprietary and partner data sources and flexible monitoring and segmentation tools allow you to resolve CIP discrepancies and fraud risk in a single step, all while keeping pace with emerging fraud threats with effective customer identification software. Putting consumers first is paramount. The security of their identity is priority one, but financial institutions must pay equal attention to their consumers’ preferences and experiences. It is not just enough to verify customer identities. Leading financial institutions will automate customer identification to reduce manual intervention and verify with a reasonable belief that the identity is valid and eligible to use the services you provide. Seamless experiences with the right amount of friction (I.e., multi-factor authentication) should also be pursued to preserve the quality of the customer experience. Putting it all together As cybersecurity threats are becoming more sophisticated, it is essential for financial institutions to protect their customerinformation and level up their fraud prevention solutions. Implementing a customer identification program is an essential component in achieving that objective. A robust CIP helps organizations detect, prevent, and deter fraudulent activities while ensuring compliance with regulatory requirements. While implementing a CIP can be complex, having a solid plan and establishing clear guidelines is the best way for companies to safeguard customer information and maintain their reputation. CIPs are an integral part of financial institutions security infrastructures and must be a business priority. By ensuring that they have accurate and up-to-date data on their customers, they can mitigate risk, establish trust, and comply with regulatory requirements. A sound CIP program can help financial institutions detect and prevent financial crimes and cyber threats while ensuring that legitimate business transactions are not disrupted, therefore safeguarding their customers' information and protecting their own reputation. Learn more

Published: November 7, 2023 by Stefani Wendel

In a series of articles, we talk about different types of fraud and how to best solve for them. This article will explore first-party fraud and how it's similar to biting into a cookie you think is chocolate chip, only to find that it’s filled with raisins. The raisins in the cookie were hiding in plain sight, indistinguishable from chocolate chips without a closer look, much like first-party fraudsters. What is first-party fraud? First-party fraud refers to instances when an individual purposely misrepresents their identity in exchange for goods or services. Borrowers may falsify income, misrepresent employment or exploit credit systems without the intention of repaying. In the financial services industry, it's often miscategorized as credit loss and written off as bad debt, which masks true fraud exposure and distorts credit-risk forecasting. Read now: Download Experian’s latest research on first-party fraud Common types of first-party fraud include: Chargeback fraud: Also known as "friendly fraud," chargeback fraud occurs when an individual knowingly makes a purchase with their credit card and then requests a chargeback from the issuer, claiming they didn't authorize the purchase. Application fraud: This takes place when an individual uses stolen or manipulated information to apply for a loan, credit card or job. In 2023, the employment sector accounted for 45% of all false document submissions — 70% of those who falsified their resumes still got hired. Fronting: Done to get cheaper rates, this form of insurance fraud happens when a young or inexperienced individual is deliberately listed as a named driver, when they're actually the main driver of the vehicle. Goods lost in transit fraud (GLIT): This occurs when an individual claims the goods they purchased online did not arrive. To put it simply, the individual is getting a refund for something they actually already received. Bust-out: This occurs when an individual builds what appears to be good credit behavior over time, making small purchases and on-time payments, and then suddenly maxes out their credit lines or abandons repayment entirely. The account looks legitimate until the “bust-out,” making it one of the hardest forms of first-party fraud to detect. Credit washing: This happens when an individual falsely disputes legitimate accounts or debts to have them removed from their credit report. By portraying valid obligations as fraud, the individual can temporarily improve their credit standing or access new credit they wouldn’t qualify for otherwise. A first-party fraudster can also recruit “money mules” — individuals who are persuaded to use their own information to obtain credit or merchandise on behalf of a larger fraud ring. This type of fraud has become especially prevalent as more consumers are active online. Money mules constitute up to 0.3% of accounts at U.S. financial institutions, or an estimated $3 billion in fraudulent transfers. How does it impact my organization? Firstly, first-party fraud can cause significant losses. According to our latest study, first-party fraud costs $36.7 million annually on average. Nearly one-third of respondents in our annual Identity and Fraud survey reported that first-party fraud had increased stress on their businesses. An imperfect first-party fraud solution can also strain relationships with good customers and hinder growth. When lenders have to interpret actions and behavior to assess customers, there’s a lot of room for error and losses. Those same losses hinder growth when misclassification inflates credit-risk estimates and masks true fraud exposure. This type of fraud isn’t a single-time event, and it doesn’t occur at just one point in the customer lifecycle. It occurs when good customers develop fraudulent intent, when new applicants who have positive history with other lenders have recently changed circumstances or when seemingly good applicants have manipulated their identities to mask previous defaults. Finally, misclassified first-party fraud losses can impact how your organization categorizes and manages risk – and that’s something that touches every department. Solving the first-party fraud problem First-party fraud detection requires a shift in how we think about the fraud problem. It starts with the ability to separate first-party fraud and credit risk, since they are often indiscernible at origination.  To effectively combat first-party fraud, businesses should consider the following actions: Define first-party fraud as its own risk: Don’t blend it into credit loss. Build targeted models that use behavioral, identity and activity signals. Start with first-payment default as a key indicator. Use a longer risk window: A 12-month view helps surface early fraud patterns and supports stronger credit and fraud analysis. Unify fraud, credit and compliance decisions: Coordinated strategies reduce blind spots and improve customer experience. Upgrade your models: Apply machine learning and segment by factors like credit age or product type to better detect bust-outs and early defaults. Combine credit and noncredit data: Use device intelligence, identity velocity and behavioral data to help separate fraud from financial hardship. Benchmark against peers: Regular comparisons help assess exposure, validate performance and refine strategies. How Experian can help As we’ve already discussed, the fraud problem is complex. However with a partner like Experian, you can leverage the fraud risk management strategies required to perform a closer examination and the ability to differentiate between the types of fraud so you can determine the best course of action moving forward. Additionally, our robust fraud management solutions can be used for synthetic identity fraud and account takeover fraud prevention, which can help you minimize customer friction to improve and deepen your relationships while preventing fraud. Contact us if you’d like to learn more about how Experian is using our identity expertise, data and analytics to improve identity resolution and detect and prevent all types of fraud. Contact us Read report Watch webinar

Published: October 31, 2023 by Chris Ryan

In today’s fast-paced world, the telecommunications industry is not just about connecting calls or sending messages. It’s about creating seamless digital experiences, especially when onboarding new customers. However, with the rise of digital services, the industry faces an increasing challenge: the need to mitigate fraud while streamlining the onboarding process.  The digital onboarding revolution Digital onboarding has transformed the way customers join telecommunications services. No longer are people required to visit a physical store or wait for lengthy paperwork. Instead, they can sign up for mobile, internet or TV services from the comfort of their homes, often within minutes. The convenience, however, has opened new doors for fraudsters. As the onboarding process happens online, the risk of identity theft, synthetic identity fraud and other fraudulent activities has surged. So, how can telecom companies provide fritctionless experiences while keeping fraud at bay? Mitigating fraud in telecommunications onboarding Know your customer (KYC) verification: Implement robust KYC solutions to verify the identity of new customers. This may include identity document checks, facial recognition or biometric authentication. Device and location data; and velocity: Analyze the device and location data of applicants. Does the device match the customer’s claimed location? Unusual patterns could signal potential fraud.  Behavioral analysis: Monitor user behavior during the onboarding process. Frequent changes in information or suspicious browsing activity may indicate fraudulent intent.   Machine learning (ML) and artificial intelligence (AI): Leverage AI/ML algorithms to detect patterns and anomalies humans might miss. These technologies can adapt and evolve to stay ahead of fraudsters.   Document verification: Use document verification services to ensure that documents provided by customers are genuine. This can include checks for altered or forged documents. Industry data sharing–consortia: Collaborate with industry databases and share fraud-related information to help identify applicants with a history of fraudulent activity or reveal patterns. The balancing act While it’s crucial to mitigate fraud, telecommunication companies must strike a balance between security and a seamless onboarding experience. Customers demand a hassle-free process, and overly stringent security measures can deter potential subscribers. By combining advanced technology, behavioral analysis and proactive fraud prevention strategies, telecom companies can create a secure digital onboarding journey that minimizes risk without compromising user experience. In doing so, they empower customers to embrace the convenience of digital services while staying one step ahead of fraudsters in today’s interconnected world.  Learn more about Experian and the telecom industry Learn more about our fraud and identity solutions

Published: October 26, 2023 by Kim Le

In this article...Fraud fueled by real-time paymentsReimbursement is vital to victimsAuthorized push payment fraud preventionTaking the next steps with the right partner Authorized Push Payment fraud, also known as APP fraud or APP scams, involves a fraudster persuading a victim to willingly deposit funds to their account or to the account of a complicit third party, also known as a money mule. This type of fraud often includes social engineering of the victim using fake investment schemes, impersonation scams, purchase scams or other schemes. Social engineering clouds victims' judgments and encourages them to make payments willingly to one or more money mules, with funds eventually reaching fraudsters' accounts. This type of fraud has become more attractive to criminals since the advent of real-time payment systems, which are now a reality worldwide. Fraud fueled by real-time payments Authorized push payment fraud is becoming more prevalent, and it is imperative that you know how to detect and prevent it to safeguard your organization. Real-time payment systems, such as Faster Payments in the United Kingdom (UK), PIX in Brazil, the New Payments Platform in Australia, and FedNow in the USA, make real-time payment fraud a reality.  APP fraud is notoriously difficult for banks to prevent because the victim is sending the money themselves, and steps that banks take to authenticate customers are ineffective, as the customer will pass identity checks. The victims cannot reverse a payment once they realize they have been conned, as payments made using real-time payment schemes are irrevocable. APP fraud is particularly prevalent in countries where banks have an infrastructure that facilitates fast or immediate transfers, like the UK. Reimbursment is vital to victims Some common types of authorized push payment fraud include attacks on individuals like romance scams, family emergency swindles, targeting property transactions, and intercepting supplier payments. To protect against APP fraud, it is important to employ layered fraud protection across all products and channels used to manage real-time payments. But that alone is not enough. Reimbursement is vital in reversing the financial distress caused by APP scams, but it cannot reverse the emotional distress these scams cause. Prevention, detection, and awareness measures must be moved up on the agenda for banks, non-traditional lenders, PSPs (Payment Service Providers), and customers alike to ensure that the customer is protected at every stage of the payment journey.  Effective alerts are a key focus area for preventing customers from falling victim to APP scams. An effective warning is one that is dynamic and tailored to the customer’s payment journey. Recent research indicates that minor changes to notifications across banking apps can have the potential to drastically reduce the number of individuals that fall victim to APP fraud. The biggest effects were achieved when a combination of risk-based and Call to Action (CTA) warnings were implemented over a period of time. A collective effort across the banking industry and beyond is crucial to protect customers and tackle the fight against APP fraud. Banks, non-traditional lenders, and PSPs can raise awareness to educate their customers on the signs and risks of APP scams, and work with industry oversight bodies to commit to voluntary standards and codes to ensure good customer outcomes. Online forums, social media platforms, and influential voices also have a role to play in raising awareness of and preventing scams. Customers can also help by being vigilant and reading and acting upon warnings and information presented to them.  Authorized push payment fraud prevention To effectively combat authorized push payment fraud, financial institutions must implement a range of measures, including:  Direct communication with consumers.  Enhanced transaction monitoring.  Effective risk mitigation and management.  Improved employee education.  Public awareness campaigns.   In response to this growing threat, banks have introduced various checks and balances, such as the Confirmation of Payee (CoP) service in the UK, which cross-references bank details with the account holder's name when processing online payments.  Banks are also leveraging sophisticated fraud prevention software stacks, incorporating machine learning and contextual data to identify and flag suspicious transactions. By utilizing AI technologies, financial institutions can process  data points faster and enhance their fraud detection capabilities, mitigating identity risk and safeguarding customer accounts. Clear communication with customers is essential in the fight against APP fraud. Higher-risk companies now include warnings in their communications, advising customers not to act on messages that request payment into new bank accounts.  Financial institutions can also offer cool-off periods before payments are sent, increase due diligence around payment destinations, and monitor accounts that regularly receive high-value payments. Additionally, financial institutions can play a crucial role in educating their customers and promoting awareness around this increasingly common type of fraud. By combining these approaches with robust fraud prevention software, the public can fight against this type of fraudulent attack.  Taking the next steps with the right partner At Experian, we offer rich data sources, advanced analytics capabilities, and the consultancy services needed to rapidly adopt data analytics solutions that mitigate fraud risks. Our solutions are used by PSPs of all types and sizes – including some of the largest banks – to identify potentially fraudulent customers and transactions, and to ensure that action is taken in real time to prevent fraudulent payments being made.  Learn more about our fraud management solutions

Published: October 25, 2023 by Alex Lvoff

Model governance is growing increasingly important as more companies implement machine learning model deployment and AI analytics solutions into their decision-making processes. Models are used by institutions to influence business decisions and identify risks based on data analysis and forecasting. While models do increase business efficiency, they also bring their own set of unique risks. Robust model governance can help mitigate these concerns, while still maintaining efficiency and a competitive edge. What is model governance? Model governance refers to the framework your organization has in place for overseeing how you manage your development, model deployment, validation and usage.1 This can involve policies like who has access to your models, how they are tested, how new versions are rolled out or how they are monitored for accuracy and bias.2 Because models analyze data and hypotheses to make predictions, there's inherent uncertainty in their forecasts.3 This uncertainty can sometimes make them vulnerable to errors, which makes robust governance so important. Machine learning model governance in banks, for example, might include internal controls, audits, a thorough inventory of models, proper documentation, oversight and ensuring transparent policies and procedures. One significant part of model governance is ensuring your business complies with federal regulations. The Federal Reserve Board and the Office of the Comptroller of the Currency (OCC) have published guidance protocols for how models are developed, implemented and used. Financial institutions that utilize models must ensure their internal policies are consistent with these regulations. The OCC requirements for financial institutions include: Model validations at least once a year Critical review by an independent party Proper model documentation Risk assessment of models' conceptual soundness, intended performance and comparisons to actual outcomes Vigorous validation procedures that mitigate risk Why is model governance important — especially now? More and more organizations are implementing AI, machine learning and analytics into their models. This means that in order to keep up with the competition's efficiency and accuracy, your business may need complex models as well. But as these models become more sophisticated, so does the need for robust governance.3 Undetected model errors can lead to financial loss, reputation damage and a host of other serious issues. These errors can be introduced at any point from design to implementation or even after deployment via inappropriate usage of the model, drift or other issues. With model governance, your organization can understand the intricacies of all the variables that can affect your models' results, controlling production closely with even greater efficiency and accuracy. Some common issues that model governance monitors for include:2 Testing for drift to ensure that accuracy is maintained over time. Ensuring models maintain accuracy if deployed in new locations or new demographics. Providing systems to continuously audit models for speed and accuracy. Identifying biases that may unintentionally creep into the model as it analyzes and learns from data. Ensuring transparency that meets federal regulations, rather than operating within a black box. Good model governance includes documentation that explains data sources and how decisions are reached. Model governance use cases Below are just three examples of use cases for model governance that can aid in advanced analytics solutions. Credit scoring A credit risk score can be used to help banks determine the risks of loans (and whether certain loans are approved at all). Governance can catch biases early, such as unintentionally only accepting lower credit scores from certain demographics. Audits can also catch biases for the bank that might result in a qualified applicant not getting a loan they should. Interest rate risk Governance can catch if a model is making interest rate errors, such as determining that a high-risk account is actually low-risk or vice versa. Sometimes changing market conditions, like a pandemic or recession, can unintentionally introduce errors into interest rate data analysis that governance will catch. Security challenges One department in a company might be utilizing a model specifically for their demographic to increase revenue, but if another department used the same model, they might be violating regulatory compliance.4 Governance can monitor model security and usage, ensuring compliance is maintained. Why Experian? Experian® provides risk mitigation tools and objective and comprehensive model risk management expertise that can help your company implement custom models, achieve robust governance and comply with any relevant federal regulations. In addition, Experian can provide customized modeling services that provide unique analytical insights to ensure your models are tailored to your specific needs. Experian's model risk governance services utilize business consultants with tenured experience who can provide expert independent, third-party reviews of your model risk management practices. Key services include: Back-testing and benchmarking: Experian validates performance and accuracy, including utilizing statistical metrics that compare your model's performance to previous years and industry benchmarks. Sensitivity analysis: While all models have some degree of uncertainty, Experian helps ensure your models still fall within the expected ranges of stability. Stress testing: Experian's experts will perform a series of characteristic-level stress tests to determine sensitivity to small changes and extreme changes. Gap analysis and action plan: Experts will provide a comprehensive gap analysis report with best-practice recommendations, including identifying discrepancies with regulatory requirements. Traditionally, model governance can be time-consuming and challenging, with numerous internal hurdles to overcome. Utilizing Experian's business intelligence and analytics solutions, alongside its model risk management expertise, allows clients to seamlessly pass requirements and experience accelerated implementation and deployment. Experian can optimize your model governance Experian is committed to helping you optimize your model governance and risk management. Learn more here. References 1Model Governance," Open Risk Manual, accessed September 29, 2023. https://www.openriskmanual.org/wiki/Model_Governance2Lorica, Ben, Doddi, Harish, and Talby, David. "What Are Model Governance and Model Operations?" O'Reilly, June 19, 2019. https://www.oreilly.com/radar/what-are-model-governance-and-model-operations/3"Comptroller's Handbook: Model Risk Management," Office of the Comptroller of the Currency. August 2021. https://www.occ.treas.gov/publications-and-resources/publications/comptrollers-handbook/files/model-risk-management/pub-ch-model-risk.pdf4Doddi, Harish. "What is AI Model Governance?" Forbes. August 2, 2021. https://www.forbes.com/sites/forbestechcouncil/2021/08/02/what-is-ai-model-governance/?sh=5f85335f15cd

Published: October 24, 2023 by Julie Lee

Have you heard about the mischievous ghosts haunting our educational institutions? No, I am not talking about Casper's misfit pals. These are the infamous ghost students! They are not here for a spooky study session, oh no! They are cunning fraudsters lurking in the shadows, pretending to be students who never attend classes. It is taking ghosting to a whole new level. Understanding ghost student fraud Ghost student fraud is a serious and alarming issue in the educational sector. The rise of online classes due to the pandemic has made it easier for fraudsters to exploit application systems and steal government aid meant for genuine students. Community colleges have become primary targets due to slower adoption of cybersecurity defenses. It is concerning to hear that a considerable number of applications, such as in California (where Social Security numbers are not required at enrollment), are fictitious, with potential losses in financial aid meant for students in need. The use of stolen or synthetic identities in creating bot-powered applications further exacerbates the problem. The consequences of enrollment fraud can have a profound impact on institutions and students. The recent indictment of individuals involved in enrollment fraud, where identities were stolen to receive federal student loans, highlights the severity of the issue. Unfortunately, the lack of awareness and inadequate identity document verification processes in many institutions make it difficult to fully grasp the extent of the problem. What is a ghost student? Scammers use different methods to commit ghost student loan fraud, including creating fake schools or enrolling in real colleges. Some fraudsters use deceitful tactics to obtain the real identities of students, and then they use it to fabricate loan applications. Types of ghost loan fraud, include: Fake loan offers: Fraudsters contact students via various channels, claiming to offer exclusive student loan opportunities with attractive terms and low interest rates. They often request personal and financial information including their SSN and bank account information and use it to create ghost loans. Identity theft: Threat actors will steal personal info through data breaches or phishing. They will then forge loan applications using the victim’s identity. Targeting vulnerable individuals: Ghost student loan fraud tends to prey on those already burdened by debt. Scammers may target borrowers with poor credit history, promising loan forgiveness or debt consolidation plans in exchange for a fee. Once the victim pays, the fraudsters disappear. Ultimately, addressing ghost student fraud requires a multi-faceted approach involving collaboration between educational institutions, government agencies, and law enforcement to safeguard the accessibility and integrity of education for all deserving students. Safeguarding the financial integrity of educational institutions One powerful weapon in the battle against ghost student fraudsters is the implementation of robust identity verification solutions. Financial institutions, online marketplaces, and government entities have long employed such tools to verify the authenticity of individuals, and their application in the educational domain can be highly effective. By leveraging these tools, institutions can swiftly and securely carry out synthetic fraud detection and confirm the identity of applicants by cross-referencing multiple credible sources of information. For instance, government-issued IDs can be verified against real-time selfies, email addresses can be screened against reliable databases, and personally identifiable information (PII) can be compared to third-party dark web data to detect compromised identities. Clinching evidence from various sources renders it nearly impossible for fraudsters to slip past the watchful eyes of enrollment officers. Moreover, implementation of identity verification measures can be facilitated through low-code implementation, ensuring seamless integration into existing enrollment workflows without requiring extensive technical expertise or incurring exorbitant development costs. To further fortify security measures, educational institutions may consider incorporating biometric enrollment and authentication solutions. By requiring face or voice biometrics for accessing school resources, institutions can create an additional layer of protection against fraudsters and their ethereal counterparts. The reluctance of fraudsters to enroll their own biometric data serves as a powerful deterrent against their intrusive activities. Taking action By adopting these robust measures, higher educational institutions can fortify their defenses against ghost student fraud and maintain the integrity of their finances. The use of online identity verification methods and biometric authentication systems not only strengthens the enrollment process but serves as a stringent reminder that there is no resting place for fraudsters within the hallowed halls of education. To learn more about how Experian can help you leverage fraud prevention solutions, visit us online or request a call. *The SSN Verification tool, better known as eCBSV is also a tool that can be utilized to verify SSN.  *This article leverages/includes content created by an AI language model and is intended to provide general information.

Published: October 18, 2023 by Janine Movish

In financial crime, fraudsters are always looking for new avenues to exploit. The mortgage industry has traditionally been a primary target for fraudsters. But with the 30-year fixed-mortgage rate average above 7.19% for the month of September, it has caused an inherent slowdown in the volume of home purchases. As a result, criminals are turning to other lucrative opportunities in mortgage transactions. They have evolved their techniques to capitalize on unsuspecting homeowners and lenders by shifting their focus from home purchases to Home Equity Line of Credit (HELOC), as they see it as a more compelling option.  Understanding mortgage fraud  Mortgage fraud occurs when individuals or groups intentionally misrepresent information during the mortgage application process for personal gain. The most common forms of mortgage fraud include income misrepresentation, false identity, property flipping schemes, and inflated property appraisals. Over the years, financial institutions and regulatory bodies have implemented robust measures to combat such fraudulent activities.  As the mortgage industry adapts to counter established forms of fraud, perpetrators are constantly seeking new opportunities to circumvent detection. This has led to a shift in fraud trends, with fraudsters turning their focus to alternative aspects of the mortgage market. One area that has captured recent attention is HELOC fraud, also known as home equity loan fraud.  HELOC fraud: An attractive target for fraudsters  What is a HELOC?  HELOCs are financial products that allow homeowners to borrow against the equity in their homes, often providing flexible access to funds. While HELOCs can be a valuable financial tool for homeowners, they also present an attractive opportunity for fraudsters due to their unique characteristics.  HELOC fraud schemes  An example of a home equity loan fraud scheme is a fraudster misrepresenting himself to deceive a credit union call center employee into changing a member’s address and phone number. Three days later, the fraudster calls back to reset the member’s online banking password, allowing the fraudster to login to the member’s account. Once logged in, the fraudster orders share drafts to be delivered to the new address they now control. The fraudster then forges three share drafts totaling $309,000 and funds them through unauthorized advances against the member’s HELOC through online banking platforms.   Why HELOCs are becoming the next target for mortgage fraud  Rising popularity: HELOCs have gained significant popularity in recent years, enticing fraudsters seeking out opportunities with larger potential payouts.  Vulnerabilities in verification: The verification process for HELOCs might be less rigorous than traditional mortgages. Fraudsters could exploit these vulnerabilities to manipulate property valuations, income statements, or other critical information.  Lack of awareness: Unlike conventional mortgages, there may be a lack of awareness among homeowners and lenders regarding the specific risks associated with HELOCs. This knowledge gap can make it easier for fraudsters to perpetrate their schemes undetected.  Home equity loans do not have the same arduous process that traditional first mortgages do. These loans do not require title insurance, have less arduous underwriting processes, and do not always require the applicant to be physically present at a closing table to gain access to cash. The result is that those looking to defraud banks can apply for multiple HELOC loans simultaneously while escaping detection.  Prevention and safeguards  There are several preventive measures and fraud prevention solutions that can be established to help mitigate the risks associated with HELOCs. These include:  Education and awareness: Homeowners and lenders must stay informed about the evolving landscape of mortgage fraud, including the specific risks posed by HELOCs. Awareness campaigns and educational materials can play a significant role in spreading knowledge and promoting caution.   Enhanced verification protocols: Lenders should implement advanced verification processes and leverage data analytics and modeling thorough property appraisals, income verification, and rigorous background checks. Proper due diligence can significantly reduce the chances of falling victim to HELOC-related fraud.  Collaboration and information sharing: Collaboration between financial institutions, regulators, and law enforcement agencies is essential to combat mortgage fraud effectively. Sharing information, best practices, and intelligence can help identify emerging fraud trends and deploy appropriate countermeasures.  Acting with the right solution  Mortgage fraud is a constant threat that demands ongoing vigilance and adaptability. As fraudsters evolve their tactics, the mortgage industry must stay one step ahead to safeguard homeowners and lenders alike. With concerns over HELOC-related fraud rising, it is vital to raise awareness, strengthen preventive measures, and foster collaboration to protect the integrity of the mortgage market. By staying informed and implementing robust safeguards, we can collectively combat and prevent mortgage fraud from disrupting the financial security of individuals and the industry.  Experian mortgage is powering advanced capabilities across the mortgage lifecycle by gaining market intelligence, enhancing customer experience to remove friction and tapping into industry leading data sources to gain a complete view of borrower behavior.   To learn more about our HELOC fraud prevention solutions, visit us online or request a call.  *This article leverages/includes content created by an AI language model and is intended to provide general information.

Published: September 27, 2023 by Alex Lvoff

In today's fast-paced financial landscape, financial institutions must stay ahead of the curve when it comes to account opening and onboarding. Digital account opening, empowering a prospective client to securely and efficiently open a new account, is key to how banks, credit unions and other financial institutions grow their business and expand their portfolio. Regardless of the time, money and other resources a financial institution invests in marketing to the right target prospect and tailoring an attractive offer, it’s worthless if that prospective customer can’t complete the process due to a poor account opening experience. Unhappy customers vote with their feet. A recent Experian study found that of the more 2,000 consumers surveyed who’d opened a new account in the last six months, 37% took their business elsewhere due to a negative account opening experience.   The choice of a reliable partner can make all the difference to your account opening and onboarding experience. The right partner must provide your financial institution with access to the freshest credit data; advanced analytics, scores and models to empower you to say yes to the right customers that meet your lending criteria; and industry-leading decision engines that make the best decisions and enable you to provide a seamless customer experience.  Moreover, the right partner will also help you in maintaining high levels of security without compromising user experience, all while adhering to regulatory compliance.  Recently, Liminal, a leading advisory and market intelligence firm specializing in the digital identity, cybersecurity, and fintech markets, released its highly anticipated Link™ Index Report for Account Opening in Financial Services, which evaluates solution providers in the financial sector, in the areas of compliance and fraud prevention for account opening. The report recognized Experian as a market leader for compliance and fraud prevention capabilities and market execution. Experian’s identity verification and fraud prevention solutions, including CrossCore® and Precise ID®, received the highest score out of the 32 companies highlighted in the report. It found that Experian was recognized by 94% of buyers and 89% identified Experian as a market leader.   “We’re thrilled to be named the top market leader in compliance and fraud prevention capabilities and execution by Liminal’s Link Index Report,” said Kathleen Peters, Chief Innovation Officer for Experian’s Decision Analytics business in North America. “We’re continually innovating to deliver the most effective identity verification and fraud prevention solutions to our clients so they can grow their business, mitigate risk and provide a seamless customer experience.”  You can access the full report here. To learn more about Experian’s award-winning fraud solutions, visit our identity fraud hub.  Download Liminal Link Index Report

Published: September 25, 2023 by Jesse Hoggard

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe