Fraud & Identity Management

Loading...
Solving the Red Flags Rule problem, Part 2...

As I wrote in my previous posting, a key Red Flags Rule challenge facing many institutions is one that manages the number of referrals generated...

Read More Solving the Red Flags Rule problem, Part 2
How Red Flags Rule affects risk managers and complianc...

In my last entry, I talked about the challenges clients face in trying to meet multiple and complex regulatory requirements, such as FACT Act’s...

Read More How Red Flags Rule affects risk managers and compliance officers, Part 2
How Red Flags Rule affects risk managers and complianc...

While the FACT Act’s Red Flags Rule seems to capture all of the headlines these days, it’s just one of a number of compliance...

Read More How Red Flags Rule affects risk managers and compliance officers, Part 1
Risk-based authentication….what’s new toda...

In my previous three postings, I’ve covered basic principles that can define a risk-based authentication process, associated value propositions, and some best-practices to consider....

Read More Risk-based authentication….what’s new today or tomorrow? Part 4
Generic fraud score – best practice, Part 2...

By: Kennis Wong In Part 1 of Generic fraud score, we emphasized the importance of a risk-based approach when it comes to fraud detection....

Read More Generic fraud score – best practice, Part 2
Generic fraud score – best practice, Part 1...

By: Kennis Wong In this blog entry, we have repeatedly emphasized the importance of a risk-based approach when it comes to fraud detection. Scoring and...

Read More Generic fraud score – best practice, Part 1
Risk based authentication – some best practices ...

In my previous two blog postings, I’ve tried to briefly articulate some key elements of and value propositions associated with risk-based authentication.  In this...

Read More Risk based authentication – some best practices to consider, Part 3
Risk-based authentication’s value proposition...

In my last blog posting, I presented the foundational elements that enable risk-based authentication.  These include data, detailed and granular results, analytics and decisioning. ...

Read More Risk-based authentication’s value proposition
Red Flags Rule and commercial accounts...

By: Kristan Keelan Most financial institutions are well underway in complying with the FTC’s ID Theft Red Flags Rule by: 1.  Identifying covered accounts 2. ...

Read More Red Flags Rule and commercial accounts
Small business fraud frequently overlooked...

By: Kristan Keelan What do you think of when you hear the word “fraud”?  Someone stealing your personal identity?  Perhaps the recent news story...

Read More Small business fraud frequently overlooked
Why risk-based authentication…and what is it, for that...

The term “risk-based authentication” means many things to many institutions.  Some use the term to review to their processes; others, to their various service...

Read More Why risk-based authentication…and what is it, for that matter?
The differences between first- and third-party frauds:...

By: Kennis Wong As I said in my last post, when consumers and the media talk about fraud and fraud risk, they are usually referring to...

Read More The differences between first- and third-party frauds: Part II
The differences between first- and third-party frauds:...

By: Kennis Wong When consumers and the media talk about fraud and fraud risk, nine out of ten times they are referring to third-party...

Read More The differences between first- and third-party frauds: Part I
There is more to fraud than just identity theft...

By: Ken Pruett I find it interesting that the media still focuses all of their attention on identity theft when it comes to credit-related...

Read More There is more to fraud than just identity theft
Do you see what I see?...

By: Heather Grover In my previous blog, I covered top of mind issues that our clients are challenged with related to their risk based...

Read More Do you see what I see?