Loading...

Optimizing the Tenant Selection Process to Protect Against Fraud

Published: August 23, 2023 by Manjit Sohal

This article was originally published on multifamilyinsiders.com

One of the challenges currently facing the rental housing industry is the amount of lease application fraud. An Entrata study found a 111% increase in lease application fraud between 2019 and 2020. In the same study, 55% of surveyed apartment managers and rental operators said their properties experience fraudulent lease application attempts every few months, and 15% said their communities were subjected to multiple attempts each month. One-third of respondents described themselves as “very concerned” about application fraud.

Just as alarming as the rise in attempts is the apparent likelihood of success. In the study, 65% of apartment managers said they are not confident in their current fraud prevention efforts.

Some applicants can use a range of tools to commit fraud such as fake pay stubs, bank statements, employment records, and other falsified documents.

Unfortunately, readily available computer technology makes it all too easy for applicants to produce these falsified documents.

Tools to fight against fraud

Apartment communities that rely on an overly manual screening process may find themselves at a disadvantage in the current landscape. Relying on associates to manually verify things like income and employment history can increase the risk of a deceitful applicant being successful. In addition, these processes can be extraordinarily time-consuming, which means leasing associates have less bandwidth for their many other important duties and responsibilities. Not to mention, the units stay unoccupied while these time-consuming verifications are being done manually.

Among the general screening technologies that operators should consider:

  • Automated verification of income, assets and employment — These solutions eliminate the need for operators to collect this kind of documentation from applicants. Furthermore, it eliminates the opportunity for applicants to supply falsified supporting documentation.
  • Frictionless authentication — A multi-layered identity verification process for those applying for rental housing, frictionless authentication detects the subtle and not-so-subtle signs that an applicant is, to one degree or another, using a false identity. By highlighting discrepancies, the process assigns a “score” to quantify the likelihood that misrepresentation is taking place. Additional confirmation of the applicant’s identity can be completed using a one-time passcode (OTP) or knowledge-based authentication (KBA). This technology also uses device intelligence to recognize the risks associated with the physical devices (such as computers, tablets, and smartphones) that consumers use for online applications to identify potential imposters.

In today’s landscape, apartment owners and operators need to make sure they’re protecting themselves against fraudulent applicants, who may not fulfill their financial obligations as outlined in their leases.

By embracing the ever-growing array of advanced screening tools and technologies, owners and operators can achieve that protection and reduce their risk significantly — and save their associates time and energy.

Related Posts

Fraud rings cause an estimated $5 trillion in financial damages every year, making them one of the most dangerous threats facing today’s businesses. They’re organized, sophisticated and only growing more powerful with the advent of Generative AI (GenAI). Armed with advanced tools and an array of tried-and-true attack strategies, fraud rings have perfected the art of flying under the radar and circumventing traditional fraud detection tools. Their ability to adapt and innovate means they can identify and exploit vulnerabilities in businesses' fraud stacks; if you don’t know how fraud rings work and the right signs to look for, you may not be able to catch a fraud ring attack until it’s too late. What is a fraud ring? A fraud ring is an organized group of cybercriminals who collaborate to execute large-scale, coordinated attacks on one or more targets. These highly sophisticated groups leverage advanced techniques and technologies to breach fraud defenses and exploit vulnerabilities. In the past, they were primarily humans working scripts at scale; but with GenAI they’re increasingly mobilizing highly sophisticated bots as part of (or the entirety of) the attack. Fraud ring attacks are rarely isolated incidents. Typically, these groups will target the same victim multiple times, leveraging insights gained from previous attack attempts to refine and enhance their strategies. This iterative approach enables them to adapt to new controls and increase their impact with each subsequent attack. The impacts of fraud ring attacks far exceed those of an individual fraudster, incurring significant financial losses, interrupting operations and compromising sensitive data. Understanding the keys to spotting fraud rings is crucial for crafting effective defenses to stop them. Uncovering fraud rings There’s no single tell-tale sign of a fraud ring. These groups are too agile and adaptive to be defined by one trait. However, all fraud rings — whether it be an identity fraud ring, coordinated scam effort, or large-scale ATO fraud scheme — share common traits that produce warning signs of imminent attacks. First and foremost, fraud rings are focused on efficiency. They work quickly, aiming to cause as much damage as possible. If the fraud ring’s goal is to open fraudulent accounts, you won’t see a fraud ring member taking their time to input stolen data on an application; instead, they’ll likely copy and paste data from a spreadsheet or rely on fraud bots to execute the task. Typically, the larger the fraud ring attack, the more complex it is. The biggest fraud rings leverage a variety of tools and strategies to keep fraud teams on their heels and bypass traditional fraud defenses. Fraud rings often test strategies before launching a full-scale attack. This can look like a small “probe” preceding a larger attack, or a mass drop-off after fraudsters have gathered the information they needed from their testing phase. Fraud ring detection with behavioral analytics Behavioral analytics in fraud detection uncovers third-party fraud, from large-scale fraud ring operations and sophisticated bot attacks to individualized scams. By analyzing user behavior, organizations can effectively detect and mitigate these threats. With behavioral analytics, businesses have a new layer of fraud ring detection that doesn’t exist elsewhere in their fraud stack. At a crowd level, behavioral analytics reveals spikes in risky behavior, including fraud ring testing probes, that may indicate a forthcoming fraud ring attack, but would typically be hidden by sheer volume or disregarded as normal traffic. Behavioral analytics also identifies the high-efficiency techniques that fraud rings use, including copy/paste or “chunking” behaviors, or the use of advanced fraud bots designed to mimic human behavior. Learn more about our behavioral analytics solutions and their fraud ring detection capabilities. Learn more

Published: February 27, 2025 by Presten Swenson

Discover how token-based authentication works, its types, and why businesses trust it to secure sensitive data.

Published: February 11, 2025 by Theresa Nguyen

Financial identity theft is one of the biggest threats to consumer’s financial wellness in today’s age. Learn how you can help prevent it.

Published: January 24, 2025 by Sarah Larson

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe