Fraud & Identity Management

Loading...

By: Ken Pruett The use of Knowledge Based Authentication (KBA) or out of wallet questions continues to grow. For many companies, this solution is...

Published: January 18, 2010 by Guest Contributor

Conducting a validation on historical data is a good way to evaluate fraud models; however, fraud best practices dictate that a proper validation uses...

Published: January 13, 2010 by Chris Ryan

In a previous blog, we shared ideas for expanding the “gain” to create a successful ROI to adopt new fraud best practices  to improve. ...

Published: January 11, 2010 by Chris Ryan

By definition, “Return on Investment” is simple: (The gain from an investment – The cost of the investment) _______________________________________________ The cost of the investment...

Published: January 4, 2010 by Chris Ryan

By: Heather Grover In my previous entry, I covered how fraud prevention affected the operational side of new DDA account opening. To give a...

Published: January 4, 2010 by Guest Contributor

By: Heather Grover In past client and industry talks, I’ve discussed the increasing importance of retail branches to the growth strategy of the bank....

Published: December 30, 2009 by Guest Contributor

The definition of account management authentication is:  Keep your customers happy, but don’t lose sight of fraud risks and effective tools to combat those...

Published: December 28, 2009 by Keir Breitenfeld

–by Andrew Gulledge Intelligent use of features Question ordering: You want some degree of randomization in the questions that are included for each session....

Published: December 22, 2009 by Guest Contributor

Account management fraud risks: I “think” I know who I’m dealing with… Risk of fraudulent account activity does not cease once an application has been...

Published: December 21, 2009 by Keir Breitenfeld

–by Andrew Gulledge General configuration issues Question selection– In addition to choosing questions that generally have a high percentage correct and fraud separation, consider...

Published: December 14, 2009 by Guest Contributor

–by Andrew Gulledge Where does Knowledge Based Authenticationfit into my decisioning strategy? Knowledge Based Authentication can fit into various parts of your authentication process....

Published: December 7, 2009 by Guest Contributor

In my last post I discussed the problem with confusing what I would call “real” Knowledge Based Authentication (KBA) with secret questions.   However, I don’t...

Published: November 23, 2009 by Guest Contributor

–by Andrew Gulledge Definition and examples Knowledge Based Authentication (KBA) is when you ask a consumer questions to which only they should know the...

Published: November 23, 2009 by Guest Contributor

Round 1 – Pick your corner There seems to be two viewpoints in the market today about Knowledge Based Authentication (KBA): one positive, one...

Published: November 16, 2009 by Guest Contributor

Many compliance regulations such the Red Flags Rule, USA Patriot Act, and ESIGN require specific identity elements to be verified and specific high risk...

Published: November 16, 2009 by Keir Breitenfeld

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe