Payments and the Internet of things has been colliding for a while now – and it surfaced again recently with Mastercard announcing that it is...
Leveraging customer intelligence in the age of mass data compromise Hardly a week goes by without the media reporting a large-scale hack of sensitive...
Customer Experience during the holiday shopping season During the holidays, consumers transact at a much greater rate than any other time of the year....
Electronic signatures and their emerging presence in our Internet-connected world I had the opportunity to represent Experian at the eSignRecords 2015 conference in New...
We all know that first party fraud is a problem. No one can seem to agree on the definitions of first party fraud and...
Profile of an online fraudster I recently read a study about the profile of a cybercriminal. While I appreciate the study itself, one thing...
What the EMV Shift means for you I recently facilitated a Webinar looking at myths and truths in the market regarding the EMV liability...
While walking through a toy store in search of the perfect gift for a nephew, I noticed the board game Risk, which touts itself...
What will the EMV shift really mean for consumers and businesses here in the U.S.? Businesses and consumers across the U.S. are still adjusting...
Small Business Fraud When you hear the word “fraud” it’s unlikely that small business fraud comes to mind. However, in terms of potential losses,...
Understanding and managing first party fraud Background/Definitions Wherever merchants, lenders, service providers, government agencies or other organizations offer goods, services or anything of value...
Protecting your customer The impact of fraud on the customer relationship Sadly fraudsters seem to always be one-step ahead of fraud-prevention strategies, causing organizations...
Increased volume of fraud attempts during back to school shopping season Back to school shopping season will be the first time many consumers’ use...
Protecting consumers from fraud this summer vacation It’s that time of year again – when people all over the U.S. take time away from life’s...
Imagine the following scenario: an attacker acquires consumers’ login credentials through a data breach. They use these credentials to test account access and observe...