Legitimate address discrepancies are common, which surprises most people. And handling every address discrepancy as a high fraud risk is operationally expensive and inhibits...
Knowing a consumer’s credit information at a single point in time only tells part of the story. I often hear one of our Experian...
Fraud and address manipulation (Part 1) Identifying an address as incorrect seems simple enough. But in reality, address mismatches between an application and credit...
Internet-connected devices provide endless possibilities, but they rely on technology and collected data to deliver on their promises. This can compromise your network security....
Fraud and cybersecurity are two of the biggest risks challenging organizations and the economy today. Fraud has become its own industry, to the tune...
As we approach the one-year anniversary of the EMV liability shift, we have seen an increase in e-commerce fraud — to the tune of...
Historically, the introduction of EMV chip technology has resulted in a significant drop in card-present fraud, but a spike in card-not-present (CNP) fraud. CNP...
Did you know that identities can shift (for better or worse) in just 30 days? To succeed in today’s multichannel, mobile environment, businesses must...
Ten years after homeowners took advantage of a thriving real-estate market to borrow against their homes, many are falling behind on payments, potentially leaving...
Experian’s annual global fraud report reveals trends that can help organizations mitigate fraud and improve the customer experience: Apply the right-sized fraud solutions to...
In an attempt to stay ahead of fraud, systems have become more complex, more expensive and even more difficult to manage, leading to more...
All customers are not created equally – at least when it comes to one’s ability to pay. Incomes differ, financial circumstances vary and economic...
Many fraud and compliance teams are struggling to keep pace with new business dynamics. Here are several of the many mobile device trends affecting...
Every day, millions of new things get connected online, such as toasters, heart monitors and cars. Many of these things have weak security controls...
It’s impossible to capture all of the insights and learnings of 36 breakout sessions and several keynote addresses in one post, but let’s summarize...