Financial institutions are revisiting their policies and thresholds for lending to small businesses and are slowly loosening restrictions. In a recent survey by the Federal Reserve Board, 9.2 percent of senior loan officers said they have "somewhat" eased their standards for lending to small firms and provided commercial borrowers more leeway, in the form of slightly bigger credit lines and longer maturity terms.
By: Maria Moynihan Cybersecurity, identity management and fraud are common and prevalent challenges across both the public sector and private sector. Industries as diverse as credit card issuers, retail banking, telecom service providers and eCommerce merchants are faced with fraud threats ranging from first party fraud, commercial fraud to identity theft. If you think that the problem isn't as bad as it seems, the statistics speak for themselves: Fraud accounts for 19% of the $600 billion to $800 billion in waste in the U.S. healthcare system annually Medical identity theft makes up about 3% of 8.3 million overall victims of identity theft In 2011, there were 431 million adult victims of cybercrime in 24 countries In fiscal year 2012, the IRS’ specialized identity theft unit saw a 78% spike from last year in the number of ID theft cases submitted The public sector can easily apply the same best practices found in the private sector for ID verification, fraud detection and risk mitigation. Here are four sure fire ways to get ahead of the problem: Implement a risk-based authentication process in citizen enrollment and account management programs Include the right depth and breadth of data through public and private sources to best identity proof businesses or citizens Offer real-time identity verification while ensuring security and privacy of information Provide a Knowledge Based Authentication (KBA) software solution that asks applicants approved random questions based on “out-of-wallet” data What fraud protection tactics has your organization implemented? See what industry experts suggest as best practices for fraud protection and stay tuned as I share more on this topic in future posts. You can view past Public Sector blog posts here.
Providing more evidence of a housing recovery, Q1 2013 mortgage originations increased 16 percent year over year to $471 billion. The Midwest region delivered the strongest annual gain, with a 29 percent increase over the previous year.
A recent survey that polled Americans on credit scores found that while nearly half of respondents (49 percent) check their credit scores at least once per year, the rest check once every two years or less, including a worrisome 22 percent who never check. The most common reasons for checking a credit score include purchasing a home (31 percent) or an automobile (32 percent).
VantageScore Solutions’ analysts recently examined how many accounts consumers with prime credit scores typically have in their credit file. Consumers who generally qualify for loans have an average of 13 loans in their credit files, and typically the oldest loan is more than 15 years old.
By: Lloyd Parker Another Experian Vision Conference comes to a close today but not without a full morning of breakout sessions with compelling speakers and experts sharing real-world strategies for real opportunity and real growth. The conference concluded with an entertaining and thought-provoking speaker, Sir Ken Robinson, Ph.D., author of The Element: How Finding Your Passion Changes Everything and Out of our Minds: Learning to Be Creative, who shared with us ideas on how to cultivate innovation and change within organizations in order to grow with their environments and continue to thrive. We’d like to thank you for making this year’s event one of the best. And thank you for the confidence you give us all year round. We know the great responsibility that goes along with that and we are committed to helping your business succeed. Top Tweets of the Week #Vision2013 the slowest growing loan segment (actually it is negative) is HELOC @cumagazine@dougbenzine at -8% YOY.#engage — Mike Horrocks (@mikehorrocks) May 8, 2013 #vision2013 great credit union discussion at experian conference! — Doug Benzine (@DougBenzine) May 8, 2013 #Vision2013 @sirkenrobinson (1) we are living in a time of revolution (2) we have to think differently about talents (3) then act different — Mike Horrocks (@mikehorrocks) May 8, 2013 'Most adults don't know what their true aptitudes are' Sir Ken Robinson #vision2013 — Michele Raneri (@MLRaneri) May 8, 2013 #Vision2013 @sirkenrobinson Our kids are not trains, they are rockets ready to explore and we need to help them only light the fuse. #engage — Mike Horrocks (@mikehorrocks) May 8, 2013
By: Lloyd Parker James W. Paulsen, Ph.D., Chief Investment Strategist at Wells Capital Management kicked off day two at the Experian Vision 2013 Conference with an upbeat economic outlook for 2013 and what it means longer term, for the next generation. Paulsen is nationally recognized for his views on the economy and publishes his own commentary assessing economic and market trends through his newsletter, Economic and Market Perspective. Today he demonstrated to conference attendees how the United States is in a “gear” year and that the “new normal” has been going on for the past 25 years. His optimism predicts that for the next 10 years we’ll see an estimated 3% GDP growth. As mentioned by some on Twitter, “he makes statistics fun.” The morning was followed by more insightful breakout sessions and the launch of a new session format called, “Viewpoints” – fast paced, quick-hitting sessions that highlight new innovations, forward-thinking solutions and product demonstrations designed to satisfy the attendee’s desire to learn more. Networking activities filled the afternoon, and at the time of post the winners of the golf tournament had not yet been announced. Other highlights from the day Viewpoint: The art of portfolio analysis Maintaining a strong commercial portfolio starts with knowledge. In this session, new concepts are introduced and old concepts were questioned as we shared validated intelligence on which commercial triggers are best suited for effective portfolio management. Viewpoint: A 900% return on small-business marketing Here proven approaches were reviewed for targeting existing small-business customers and prospects for deposits and loans using available firmographic data, business credit scores and response models. Viewpoint: Transaction data signals – challenges and opportunities Experian’s R&D Data Lab shared team insights into how underutilized transaction data might be leveraged as well as how to overcome some of the technical and business challenges that arise. Viewpoint: Find time and money in your credit authorization process Attendees learned how to improve decision making and productivity by bringing together multiple sources of credit authorization information in Baker Hill Advisor®. Viewpoint: Commercial fraud – An ounce of prevention is worth a pound of cure Protecting personal identities is commonplace for most businesses. Commercial fraud may not be a primary concern, but one “rare” occurrence could mean a big loss to profits and reputation. Attendees learned how BizID can prevent fraud in business portfolios and help ensure that appropriate preventive measures are taken. Viewpoint: SaaS for intelligent customer decisioning – separating the hype from the reality A stroll down memory lane highlighted the hype and reality of technology over the last several decades and looked at the realities we face that make this space so difficult to predict. Attendees looked at criteria to help them decipher what’s working, what they can do about it and the critical points to focus on when looking at SaaS solutions. Top tweets: "USA is in a GEAR Year" expects 3% growth this year. #vision2013 #finserv — Patricia Hines (@PJHines) May 7, 2013 #Vision2013 @aitegroup 32% of mobile users think mobile is secure & 55% think it is somewhat secure. Banks need to #engage mobile banking. — Mike Horrocks (@mikehorrocks) May 7, 2013 @experianvision "Growth may surpass expectations this year. Confidence is being upwardly adjusted." Dr. James W. Paulsen. #vision2013 — Martha Staten (@Sauconyandsuds) May 7, 2013
By: Maria Moynihan Reduced budgets, quickly evolving technologies, a weakened economy and resource constraints are clearly impacting the Public Sector, but it’s not all doom and gloom. Always with new challenges, come new opportunities. Government agencies must still effectively run programs, optimize processes and find growth in revenue streams. Below you will find the top 5 business challenges facing the Public Sector and municipal utilities today and ways to overcome them: 1. Difficulty finding debtors When asked to name the top challenge to their debt collection processes, governments most often indicate the difficulty in locating debtors whose whereabouts don’t in fact match information they have on hand. Skip tracing with right party contact data is key to finding people or businesses for collections and there are several cost effective ways to do this - either through industry leading tools or by tapping into available sources like voter registration information. 2. Difficulty in prioritizing debt collection efforts When resources are limited, it is critical to not only focus efforts by size, but by likelihood to make contact and access debtors with an ability to pay. Credit and demographic data elements like income, assets, past payment behavior, and age can all be brought together to better identify areas of greater ROI over others. 3. Lack of data available By simply incorporating third-party data and analytics into an established infrastructure, agencies can immediately gain improved insight for efficient decision making. Leverage on-hand data sources to improve understandings of individuals or businesses. 4. Difficulty of incorporating tools to improve debt recovery Governments too often attempt to reduce backlogs by simply trying to accelerate processes that are suboptimal to start with. This is both expensive and unlikely to produce the desired result. In the case of debt collection, success is driven by the tools and processes that allow for refined monitoring, segmentation and prioritization of accounts for improved decisioning. 5. Difficulty in determining to outsource or continue to internally collect While outsourcing to debt collection agencies is always an option, it may not be the most resourceful one, or in some cases, even necessary. Cost to value considerations per effort need to be made by agencies and often, the most effective strategy is to perform minimal efforts internally and to outsource older or skip accounts to third party agencies. What is your agency’s biggest business challenge? See what industry experts suggest as best practices for Public Sector collections or download Experian’s guide to Maximizing Revenue Potential in the Public Sector to learn more.
By: Lloyd Parker There aren’t many things that energize me more than seeing our clients arrive for the Experian Vision 2013 Conference. Industry leaders from all over the world have joined us in Southern California to kick-off a full day of insightful topics. This year’s event sold out in record time and we have many first time attendees taking advantage of the opportunities to network and learn from industry peers. Today began with a welcome from Steve Wagner, President of Consumer Information Services followed by Victor Nichols, Chief Executive Officer, Experian North America and myself, Lloyd Parker, Group President Credit Services. We launched our key theme of Real Strategies, Real Growth, Real Opportunities, discussing the concept of “reality checks.” Reality check #1: Micro-targeting is required Identify market differences Understand your customer segments Adapt to specific needs of your empowered consumers Reality check #2: Managing risk Protect against risks that follow success Keep your door open for good business Focus on operational efficiencies Reality check #3: Optimizing engagement Utilize all the data of each customer Understand all of your customer touch points Manage customer strategies holistically A key theme of the day was the economic, regulatory and political changes impacting our economy and your customers. We had a conversation with Timothy F. Geithner, 75th U.S. Secretary of the Treasury, who shared his experiences as the principal architect of the President’s strategy to avert economic collapse and to reform the financial system. He also discussed international economic challenges and gave us his personal outlook on the economy. The afternoon featured many great speakers and industry experts across many topics that included hearing from many of our regulators on the topic of banking regulations; experts in the area of mobile payments and banking; along with many of our clients who shared their successful programs and experiences working across consumer and commercial portfolios and the customer lifecycle. Other highlights from the day Things overheard at the Roundtable Sessions: “You don’t need extensive touches for small loans, but let go of Excel,” Community bank topics “Loans are milk, deposits are steak,” Issues and opportunities within commercial risk management roles topic “Pent up demand will lead to overall positive auto market conditions near term,” Automotive hot topics “Keeping various systems in synch; Spend time early on implementation to define biz requirements,” Overcoming system operation challenges topic “Marketing to the underserved remains a challenge,” Issues and opportunities in consumer risk management roles topic “Using mobile to go paperless in commercial lending to improve convenience,” Mobile tools for business lending topic Top tweets: #vision2013 "Be relentlessly skeptical. Be humble about what you don't know." Former Secretary Timothy Geithner. — Martha Staten (@Sauconyandsuds) May 6, 2013 Experian CEO to Us bankers on current reg environment. "we have to get in compliance. We have to grow in compliance".#vision2013 — eric haller (@erichaller2) May 6, 2013 Great description of the current environment - "Economic Pinball" Victor Nichols #vision2013 #finserv — Patricia Hines (@PJHines) May 6, 2013 #vision2013.@experiancredit data lab is the "most unique initiative in the industry". The lab lets you #engage w/ untraditional data. — Mike Horrocks (@mikehorrocks) May 6, 2013 Only take risks you can understand, measure, and monitor. CRO round table. #vision2013 — alissa (@adh314) May 6, 2013 The phone is the new wallet. Apps are the new cards. #engage #vision2013 — Andrew Beddoes (@beddoesa712) May 6, 2013
A recent analysis by Experian Automotive found that, overall, consumers purchasing a hybrid have significantly higher credit scores than those purchasing another type of new vehicle. The average credit score for a loan on a new hybrid was 790, compared with the national average credit score of 755 for a loan on any new vehicle.
While VantageScore® credit score super-prime consumers carried the lowest average credit card balance of all credit tiers in Q4 2012 ($2,581), this group experienced the greatest average balance increase (6 percent) when compared with the previous quarter. All other credit tiers had little or no change to their average credit card balance.
As we prepare to attend next week’s FS-ISAC & BITS Summit we know that the financial services industry is abuzz about massive losses from the ever-evolving attack vectors including DDoS, Malware, Data Breaches, Synthetic Identities, etc. Specifically, the recent $200 million (and counting) in losses tied to a sophisticated card fraud scheme involving thousands of fraudulent applications submitted over several years using synthetic identities. While the massive scale and effectiveness of the attack seems to suggest a novel approach or gap in existing fraud prevention controls, the fact of the matter is that many of the perpetrators could have been detected at account opening, long before they had an opportunity to cause financial losses. Synthetic identities have been a headache for financial institutions for years, but only recently have criminal rings begun to exploit this attack vector at such a large scale. The greatest challenge with synthetic identities is that traditional account opening processes focus on identity verification compliance around the USA PATRIOT Act and FACT Act Red Flags guidance, risk management using credit bureau scores, and fraud detection using known fraudulent data points. A synthetic identity ring simply sidesteps those controls by using new false identities created with data that could be legitimate, have no established credit history, or slightly manipulate elements of data from individuals with excellent credit scores. The goal is to avoid detection by “blending in” with the thousands of credit card, bank account, and loan applications submitted each day where individuals do not have a credit history, where minor typos cause identity verification false positives, or where addresses and other personal data does not align with credit reports. Small business accounts are an even easier target, as third-party data sources to verify their authenticity are sparse even though the financial stakes are higher with large lines of credit, multiple signors, and complex (sometimes international) transactions. Detecting these tactics is nearly impossible in a channel where anonymity is king — and many rings have become experts on gaming the system, especially as institutions continue to migrate the bulk of their originations to the online channel and the account opening process becomes increasingly faceless. While the solutions described above play a critical role in meeting compliance and risk management objectives, they unfortunately often fall short when it comes to detecting synthetic identities. Identity verification vendors were quick to point the finger at lapses in financial institutions’ internal and third-party behavioral and transactional monitoring solutions when the recent $200 million attack hit the headlines, but these same providers’ failure to deploy device intelligence alongside traditional controls likely led to the fraudulent accounts being opened in the first place. With synthetic identities, elements of legitimate creditworthy consumers are often paired with other invalid or fictitious applicant data so fraud investigators cannot rely on simply verifying data against a credit report or public data source. In many cases, the device used to submit an application may be the only common element used to link and identify other seemingly unrelated applications. Several financial institutions have already demonstrated success at leveraging device intelligence along with a powerful risk engine and integrated link analysis tools to pinpoint these complex attacks. In fact, one example alone spanned hundreds of applications and represented millions of dollars in fraud saves at a top bank. The recent synthetic ring comprising over 7,000 false identities and 25,000 fraudulent cards may be an extreme example of the potential scope of this problem; however, the attack vector will only continue to grow until device intelligence becomes an integrated component of all online account opening decisions across the industry. Even though most institutions are satisfying Red Flags guidance, organizations failing to institute advanced account opening controls such as complex device intelligence can expect to see more attacks and will likely struggle with higher monetary losses from accounts that never should have been booked.
Findings from Experian's latest State of the Automotive Finance Market analysis showed the average loan term for a new vehicle jumped to an all-time high of 65 months in Q4 2012, up from 63 months in Q4 2011. More consumers also are opting for leases, with the lease share of new auto financing increasing to 24.79 percent, up from 10.45 percent in Q4 2011.
Outsourcing can be risky business. The Ponemon Institute reports that 65% of companies who outsourced work to a vendor have had a data breach involving consumer data and 64% say it has happened more than once. Their study, Securing Outsourced Consumer Data, sponsored by Experian® Data Breach Resolution also found that the most common cause for breaches were negligence and lost or stolen devices. Despite the gravity of these errors, only 38 percent of businesses asked their vendor to fix the problems that led to the breach and surprisingly, 56% of the companies learned about the data breach accidentally instead of through security protocols and control procedures. These findings come from a survey of 748 people in a supervisory (or higher) job who work in vendor management at companies that share or transfer consumer data mainly for marketing, finance and outsourced IT operations including cloud services and payment processing. The survey also polled the vendors and 57% of them reported that they in turn, outsourced work to a third party. 23% of vendors could not tell how often data loss happened which is a sign that they don’t have proper procedures and policies in place to know when incidents occur. When asked about their data breach notification practices, only 16 percent of vendors said they immediately notified their client after the breach investigation with 25 percent saying they don’t even tell clients about breaches of data. Keeping all work and information in house is not feasible in today’s multi-corporate companies, and outsourcing is a business reality, however, all parties have a responsibility to protect the sensitive and confidential data that is entrusted to them. When outsourcing consumer data to vendors, here are a few guidelines companies need to follow to safeguard the information: 1. Make sure you hold vendors to the same security standards as your own in-house security policies and practices. 2. Make sure the vendor has appropriate security and controls procedures in place to monitor potential threats. 3. Audit the vendor’s security and privacy practices and make sure in your contract with them, the vendor is legally obligated to fix data problems should a breach occur including notifying consumers. 4. Monitor the security and privacy practices of vendors you work with especially if you share consumer data with them. 5. Require background checks for vendor employees who have access to confidential information. The goal of this study was to better understand what companies are doing to protect consumer data they outsource and where improvements could be made to insure privacy and security when sharing private information with third parties. The solution seems to be that all parties must first agree that data privacy and protection is paramount and then work toward the mutual goal of achieving responsible privacy and security practices. Download the Securing Outsourced Consumer Data report
The most recent release of the S&P/Experian Consumer Credit Default Indices showed national credit default rates decreased in February. The national composite* moved from 1.63 percent in January to 1.55 percent in February. First mortgage and bankcard default rates followed a similar pattern. These trends are consistent with other economic news, such as improvements in employment and continuing gains in housing.