Latest Posts

Loading...

Research shows that investing in superior customer management easily can exceed returns of 20 percent in the first year of implementation.  A return that compounds in subsequent years as a results of customer-centric strategies that drive customer's loyalty, new customer referrals, and increased revenue opportunities.  Customer loyalty is a key driver that differentiates retail banks when trying to retain existing and attract new customers.   And cited by customers themselves as the way to win their business today.  Achieving superior customer management, however, can be expensive and operationally prohibitive; and let's not to forget to mention there are a number of different approaches that aim to meet such a standard, but fail because critical qualitative insights are not captured in back-end systems of record (SOR).  These "black-box" strategies struggle to be widely adopted across the enterprise and die a slow, internal political death - with wasted resources left on the floor.  It also leaves the customer feeling frustrated and dissatisfied, maybe even ready to flee. One such example was recently illustrated in an article in Credit Union Times.   Changing the retail bank's approach to adopt best practices in developing holistic customer-centric strategies is paramount to the improvement of the customer experiences, and the bottom line. Quantitative data alone can represent only a partial view of reality whereas holistic customer strategies exploit the full value of the enterprise by synthesizing customer knowledge from SOR with external off-your firm financial information and critical qualitative input from customer-facing staff.   Customer-facing staff are critical in the adoption of such strategies and need to be actively engaged to extract customer learnings that will lead to the modification and alignment of customer-level treatement strategy designs and predictive models with the real world.   A collaborative approach, blending art and science, ensures complete adoption across the enterprise and measurable customer experience improvements that can be monetized for shareholders through improved customer retention and new customer acquisitions.  Get access to details on the framework to design and deploy such customer-centric strategies. 

Published: December 6, 2012 by Guest Contributor

By: Maria Moynihan The public sector is not unlike the private sector when it comes to data. Both require accuracy and relevancy for optimized processes and decision-making. For government agencies, maintaining a holistic view of constituents is more important than ever. By linking data across department systems, governments improve operations, citizen profiling and overall record management.  No longer do agencies have to muddle through records of Maria Moynihan, Mari Moynihan, M Moynihan, and other variations of name or contact information when they all are truly one in the same. Unfortunately, without the right tools and know how, database maintenance, record deduplication, and account validation can be a daunting process.  Below are five critical steps to helping government agencies execute successful linkage of database records: Step 1: Engage stakeholders Data stewards are not mind readers. They work with finite data and rely on stakeholders to provide insight. Seek input from users across departments and functions. Step 2: Identify impacts and priorities Data errors and disparate data prevent stewards from amalgamating records and defining a master database. Focus on areas of strategic priority. Step 3: Create success criteria Look for and set quantifiable metrics for matching. Consider what data needs to be linked and what thresholds are acceptable given objectives. Step 4: Define new standards Create established workflows and guidelines for evaluating, merging and purging records. Step 5: Leverage matching technology Integrate robust deduplication tools to design multiple workflows and handle a variety of matching challenges. In short, without data stewards seeking input from commercial stakeholders, an understanding of the data impacts, and establishing a clear process including defined methodologies and technology for deduplication, government agencies will remain challenged in trying to figure out if Maria, Mari, and M are the same person in databases. Click here to see the full guide to Creating a Single View.  

Published: December 6, 2012 by Guest Contributor

Returns on investment from superior customer-centric strategies easily can exceed 20 percent in the first year of implementation. However, this number is compounded exponentially in subsequent years due to repeat business, new customer referrals and customer loyalty. Learn more about the design and deployment of holistic retail bank customer-centric strategies that synthesize critical information and qualitative banker insights. Source: Implementing differentiated customer-centric strategies: Retail-banker-friendly strategy development that resonates with your customers and shareholders, an Experian white paper.

Published: December 4, 2012 by admin

With the constant (and improving!) changes in the consumer credit landscape, understanding the latest trends is vital for institutions to validate current business strategies or make adjustments to shifts in the marketplace.  For example, a recent article in American Banker described how a couple of housing advocates who foretold the housing crisis in 2005 are now promoting a return to subprime lending. Good story lead-in, but does it make sense for MY business?  How do you profile this segment of the market and its recent performance?  Are there differences by geography?  What other products are attracting this risk segment that could raise concerns for meeting a new mortgage obligation?   There is a proliferation of consumer loan and credit information online from various associations and organizations, but in a static format that still makes it challenging to address these types of questions. Fortunately, new web-based solutions are being made available that allow users to access and interrogate consumer trade information 24x7 and keep abreast of constantly changing market conditions.  The ability to manipulate and tailor data by geography, VantageScore® credit score risk segments and institution type are just a mouse click away.  More importantly, these tools allow users to customize the data to meet specific business objectives, so the next subprime lending headline is not just a story, but a real business opportunity based on objective, real-time analysis. Explore the features from one such tool available.  

Published: December 4, 2012 by Alan Ikemura

Six states are the top producers of turkeys: Minnesota at 46 million, North Carolina at 36 million, Arkansas at 29 million, Missouri at 17.5 million, Virginia at 17 million and Indiana at 16.5 million. This accounts for nearly two-thirds of turkeys produced in the United States as of September 2012. The average wholesale price for frozen whole turkey during fourth-quarter 2012 is projected to range from $1.10 to $1.14 per pound -- similar to the 2011 fourth-quarter average price of $1.11 per pound. The average retail price for whole frozen turkeys in September 2012 was $1.62, about 6 cents lower than the average retail price for whole frozen turkeys in September 2011. Source: National Agricultural Statistics Service (NASS), Agricultural Statistics Board and United States Department of Agriculture (USDA).

Published: November 26, 2012 by admin

According to a recent Ponemon Institute study, 44 percent of consumers who were notified about a data breach believed the breached company was hiding something. When data breaches occur, it is extremely important to be there for customers and to address their concerns. When companies hide a data breach, impacted consumers begin to suspect the breach is actually much worse than the company claims, and trust in the organization begins to wane. Find out more by downloading the data breach case study of lessons learned from the field.

Published: November 18, 2012 by admin

Gone are the days when validating scoring models was a thing you did when you got around to it. Besides that fact that the OCC wants models validated at least once a year, it’s just good business sense to make sure your tools are working as expected. At a minimum, the OCC wants back testing, stress testing, benchmarking and sensitivity analysis, but there is another aspect to validations that needs to be taken into consideration. Most lenders do not rely exclusively on a scoring model of their decisioning (or at least they shouldn’t). Whether it’s a dual score strategy or attribute overlay, additional underwriting criteria is often used to help refine and optimize decision strategies. However, those same overlays need to be incorporated into the model validation process so that the results are not misleading. VantageScore® Solutions, LLC has just published a concise white paper offering excellent examples of how to make sure your overlay criteria are an integral part of the overall validation process, ensuring your effort here are yielding the right results. And while on the topic of model validation, next time I’ll review what to do when you have no idea what to test for. Stay tuned!

Published: November 15, 2012 by Veronica Herrera

When validating a model in the presence of overlay criteria, it is important to remember that any metrics computed at the aggregate portfolio level will not be indicative of the model's true performance. While traditional validation methodologies and portfolio metrics may provide directional insight into model performance, the overlay strategy is an additional variable that must be accounted for in each step of the validation analysis. An effective validation should include: Establishment of an appropriate base line Piece-wise validation of overlay segments An overlay strategy analysis Do you have model validation questions? Learn more and transform your business goals with Experian's Analytical Consulting Services. Source: VantageScore® Solutions LLC white paper: Validating a Credit Score Model in Conjunction with Additional Underwriting Criteria. VantageScore® is owned by VantageScore Solutions, LLC.

Published: November 11, 2012 by admin

By: Joel Pruis The commercial lending - traditional C&I, CRE and other - segment is one of the last areas to be “automated” or captured within an automated lending platform.   Many of us talk about the need to automate this segment but the discussion needs to start with the question of “What does it mean to automate originations in the commercial segment?  Let’s start to break this down and define it. Previously, we have covered how to define small business for your respective financial institution.  If you use that as a measurement of what is small business, the remaining segment would by default be your commercial segment.  It seems obvious but good to re-iterate to keep the context on commercial. What we are not planning to cover is the small business segment where there is relatively high application volume and low total dollar production.  If we compare small business and commercial across two major characteristics, we the distinction becomes more clear. The above chart represents the typical situation – the probable not the possible scenario.  For example, there are situations where the sales lead time is days not months for a commercial lending opportunity or a small business application can sometimes take over a year to get the application. I like analogies so let’s compare mass produced furniture vs. custom furniture to small business vs. commercial.  Mass produced furniture is high volume but low dollar per unit (small business) while the custom furniture is the low volume but high dollar per unit production (commercial). Basically, the furniture being mass produced has a low need for any customization with high demand and a low cost of production on a per unit basis.  Conversely, the custom furniture production has relatively low volume but a higher cost of production on a per unit basis. The custom furniture maker has no set designs, no set product line but rather examples of past work that has been done.  There are no set materials that are to be used and no set prescribed method for manufacturing any particular item. While one customer may want a dining room table that has leaves to expand the seating as needed, another may want a drop-leaf table or simply a static table top.  It is up to the customer to decide what the criteria is to best suit the need.  The talented furniture maker will provide his/her expertise to provide the best product/solution for the customer but the end result is ultimately up to the customer.  Such a design will be worked and potentially reworked multiple times before the right design in actually approved by the customer.  Once the design is approved, the work begins on creating the piece of furniture.  The creation may follow a standard set of procedures or may not.  The key is that there is no set way that must be followed in the creation.  The furniture maker will not wait until all material is available but rather can start on portions of the furniture (turning the legs, rough cutting the wood for the table top).  While there is likely an agreed upon delivery date, the success is dependent upon completing the furniture by that date, not following a set prescribed path to completion. It is possible to design and capture the small business origination process with its defined roles and responsibilities in a detailed process map.  The small business origination process can measure and monitor service level agreements and set expectations with the client around the entire process before the application is even taken.  Prescribed order and dependency around the activity and/or task-level process mapping can be accomplished in the small business origination process with a high degree of accuracy and consistency from one application to the next. The commercial loan origination process, however, cannot be captured with a high degree of accuracy and/or consistency.  Individual efforts can certainly be captured and specific service level agreements can be established.  For example, the spreading of financial statements can follow a prescribed methodology and service level agreements can be established.  However, attempts to establish service level agreements that when combined could adequately set expectations of total turnaround times, estimated completion times and prescribed methodologies would result in much lower compliance with such prescribed processes rendering it meaningless. Joel Pruis is a senior business consultant with Experian's Global Consulting Practice.  To learn more about strategy consulting and access more thought-leadership from our team, please visit www.experian.com/consultingservices.

Published: November 5, 2012 by Guest Contributor

As of Q2 2012, subprime borrowers are carrying the largest retail card balances, with an average card balance per account of $620 and $700 for VantageScore® credit score D and F tiers, respectively. The national average balance on a retail account is $329 — an increase of 39 percent over 2011. VantageScore® credit score A tier (super-prime) consumers carry the lowest average balance at $99 per account. Source: Experian-Oliver Wyman Market Intelligence Reports. VantageScore® is owned by VantageScore Solutions, LLC.

Published: November 4, 2012 by admin

While technology undoubtedly has made accessing medical information much easier and faster, it also has also provided an increased potential for medical data breaches especially as health personnel begin to use unsecure mobile devices for personal and work use.  With an increase in health care employees using their own tablets and smartphones in the workplace, many healthcare companies are considering adopting a Bring Your Own Device (BYOD) policy.  However, many companies have failed to implement mobile data breach protection, breaking the HIPAA Security Rule which requires healthcare companies to perform a risk analysis of the processes by which they protect the confidentiality of electronic patient health information maintained by their organization.  Companies are required to use the information gathered from the analysis to take measures to ensure the confidentiality of patient data and to reduce risks to a reasonable level.  If companies don’t comply and there is a data security breach, they can be heavily fined by the U.S. Department of Health & Human Services. Just recently, a teaching hospital and medical practice associated with a large university was fined $1.5 million in a data breach of patient information when a laptop computer containing unencrypted data on 3,621 patients and research subjects was stolen.  Hospital and practice officials were found guilty of violating the HIPAA Security Rule by not implementing data protection and security on their mobile devices.  The loss of laptops, portable storage gadgets like thumb drives and cell phones have already cost insurance companies, drugstores, medical practices and even a government health and social services department, millions of dollars in fines. Unfortunately, this troubling trend doesn’t just affect the medical industry.  In August 2012, Coalfire (a firm that provides IT audit and risk assessment) surveyed 400 individuals across North America covering a variety of industries about their company’s mobile device security practices. The data revealed that many organizations lack policies addressing mobile cyber security threats. Download our Free Data Breach Response Guide Key statistics from the survey: 84 percent use the same smartphone for personal and work usage. 47 percent don’t have a password on their mobile phone. 51 percent said their companies cannot remotely wipe data from mobile devices if they are lost or stolen. 49 percent said their IT departments have not discussed mobile/cyber security with them. Clearly, companies are not doing enough to protect themselves and their employees from the expensive cost of a data breach.  As mobile devices become popular and less expensive, workers will naturally want to use them for their jobs.  Therefore, it is prudent for companies to adopt business data breach protection and security policies to protect not only their company data but also their pocketbook.

Published: November 1, 2012 by Michael Bruemmer

It comes as no surprise to anyone that cell phone usage continues to rise, while at the same time the usage of wire lines, or what used to be affectionately known as POTS (Plain Old Telephone Service), continues to decline. Some recent statistics, supplied by the CDC show that: 34% of all households are now wireless only 25 states have rates of primary wireless exceeding 50% Landline only households is now down to only 10.2% When you couple that with churn rates for cell phones that can exceed 40% a year, it becomes paramount to find a good source for cell numbers if you are trying to contact an existing customer or collect on an overdue bill. But where can debt collectors go to find reliable cell phone numbers? The cell phone providers won’t sell you a database, there is no such thing as 411 for cell phones, nor is it likely there will be one in the near future with the aforementioned 40%+ churn rates. Each cell phone service provider will continue to protect their customer base. There are a few large compilers of cell phone numbers; they mostly harvest these numbers from surveys and sources that capture the numbers as a part of an online service—think ringtones here! These numbers can be good, at least initially, if they came with an address which enables you to search for them. The challenge is that these numbers can grow stale relatively quickly. Companies that maintain recurring transactions with consumers have a better shot at having current cell numbers. Utilities and credit bureaus offer an opportunity to capture these self-reported numbers. At our company, over 40% of self-reported phones are cell phones. However, in most cases, you must have a defined purpose as governed by Gramm Leach Bliley (GLB) in order to access them. Of course, the defined purpose also goes hand in hand with the Telephone Consumer Protection Act (TCPA), which restricts use of automatic dialers and prohibits unsolicited calls via a cell phone. Conclusion? If you are trying to find someone’s cell number for debt collection purposes, I recommend using a resource more likely to receive updates on the owner of a cell over that of compilers who are working with one time event data. In today’s world, obtaining an accurate good cell number is a challenge and will continue to be. What cell phone number resources have been most effective for you?

Published: October 31, 2012 by Guest Contributor

Returns on investment from superior customer-centric strategies easily can exceed 20 percent in the first year of implementation. However, this number is compounded exponentially in subsequent years due to repeat business, new customer referrals and customer loyalty. Learn more about the design and deployment of holistic retail bank customer-centric strategies that synthesize critical information and qualitative banker insights. Source: Implementing differentiated customer-centric strategies: Retail-banker-friendly strategy development that resonates with your customers and shareholders, an Experian white paper.

Published: October 28, 2012 by admin

During Q2 of 2012, home equity line of credit (HELOC) delinquency rates were the lowest in recent years. The delinquency rate fell below 1 percent for all performance categories: 30 to 59 days past due (DPD) fell to 0.88 percent; 60 to 89 DPD was at 0.42 percent and 90 to 180 DPD was at 0.99 percent. Source: Experian-Oliver Wyman Market Intelligence Reports.

Published: October 26, 2012 by admin

Not surprisingly, bankcard utilization is the highest among subprime consumers with VantageScore D and F tiers having average bankcard utilization rates of 68% and 81% respectively. In comparison, VantageScore A tier (super prime) consumers had an average bankcard utilization rate of 6% and VantageScore B tier (prime) consumers had an average bankcard utilization rate of 15%. Join our panel of experts on October 23 to hear from industry experts on key regulations that are changing the way banks need to conduct business in order to grow and stay profitable. Source: Experian Oliver Wyman Market Intelligence Reports.

Published: October 25, 2012 by admin

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe