Financial Services

Loading...

–by Andrew Gulledge General configuration issues Question selection– In addition to choosing questions that generally have a high percentage correct and fraud separation, consider...

Published: December 14, 2009 by Guest Contributor

A recent New York Times (1) article outlined the latest release of credit borrowing by the Federal Reserve, indicating that American’s borrowed less for the ninth-straight month...

Published: December 10, 2009 by Kelly Kent

In my last blog, I discussed the presence of strategic defaulters and outlined the definitions used to identify these consumers, as well as other...

Published: December 10, 2009 by Kelly Kent

I have already commented on “secret questions” as the root of all evil when considering tools to reduce identity theft and minimize fraud losses. ...

Published: December 7, 2009 by Guest Contributor

–by Andrew Gulledge Where does Knowledge Based Authenticationfit into my decisioning strategy? Knowledge Based Authentication can fit into various parts of your authentication process....

Published: December 7, 2009 by Guest Contributor

By: Wendy Greenawalt In my last blog on optimization we discussed how optimized strategies can improve collection strategies. In this blog, I would like...

Published: December 7, 2009 by Guest Contributor

For the past couple years, the deterioration of the real estate market and the economy as a whole has been widely reported as a...

Published: November 30, 2009 by Kelly Kent

By: Wendy Greenawalt Optimization has become a “buzz word” in the financial services marketplace, but some organizations still fail to realize all the possible business...

Published: November 30, 2009 by Guest Contributor

–by Jeff Bernstein In the current economic environment, many lenders and issuers across the globe are struggling to manage the volume of caseloads coming...

Published: November 23, 2009 by Guest Contributor

In my last post I discussed the problem with confusing what I would call “real” Knowledge Based Authentication (KBA) with secret questions.   However, I don’t...

Published: November 23, 2009 by Guest Contributor

–by Andrew Gulledge Definition and examples Knowledge Based Authentication (KBA) is when you ask a consumer questions to which only they should know the...

Published: November 23, 2009 by Guest Contributor

By: Tom Hannagan Understanding RORAC and RAROC I was hoping someone would ask about these risk management terms…and someone did. The obvious answer is...

Published: November 19, 2009 by Guest Contributor

Round 1 – Pick your corner There seems to be two viewpoints in the market today about Knowledge Based Authentication (KBA): one positive, one...

Published: November 16, 2009 by Guest Contributor

Many compliance regulations such the Red Flags Rule, USA Patriot Act, and ESIGN require specific identity elements to be verified and specific high risk...

Published: November 16, 2009 by Keir Breitenfeld

The value of a good decision can generate $150 or more in customer net present value, while the cost of a bad decision can...

Published: November 13, 2009 by Roger Ahern

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe