Latest Post

Loading...
Dispelling credit attribute myths, Part 2...

By: Wendy Greenawalt In the second installment of my three part series, dispelling credit attribute myths, we will discuss why attributes with similar descriptions...

Read More Dispelling credit attribute myths, Part 2
Dispelling credit attribute myths, Part 1...

By: Wendy Greenawalt This blog kicks off a three part series exploring some common myths regarding credit attributes. Since Experian has relationships with thousands...

Read More Dispelling credit attribute myths, Part 1
Collections departments invest in modern technology to...

–by Mike Sutton In today’s collections environment, the challenges of meeting an organization’s financial objectives are more difficult than ever. Case volumes are higher,...

Read More Collections departments invest in modern technology to improve financial results
How Red Flags Rule affects risk managers and complianc...

In my last entry, I talked about the challenges clients face in trying to meet multiple and complex regulatory requirements, such as FACT Act’s...

Read More How Red Flags Rule affects risk managers and compliance officers, Part 2
Prioritze collections process improvement survey resul...

–by Mike Sutton I recently interviewed a number of Experian clients to determine how they believe their organizations and industry peers will prioritize collections...

Read More Prioritze collections process improvement survey results
How Red Flags Rule affects risk managers and complianc...

While the FACT Act’s Red Flags Rule seems to capture all of the headlines these days, it’s just one of a number of compliance...

Read More How Red Flags Rule affects risk managers and compliance officers, Part 1
Risk-based authentication….what’s new toda...

In my previous three postings, I’ve covered basic principles that can define a risk-based authentication process, associated value propositions, and some best-practices to consider....

Read More Risk-based authentication….what’s new today or tomorrow? Part 4
Generic fraud score – best practice, Part 2...

By: Kennis Wong In Part 1 of Generic fraud score, we emphasized the importance of a risk-based approach when it comes to fraud detection....

Read More Generic fraud score – best practice, Part 2
Lost lead analysis...

When reviewing offers for prospective clients, lenders often deal with a significant amount of missing information in assessing the outcomes of lending decisions, such...

Read More Lost lead analysis
Generic fraud score – best practice, Part 1...

By: Kennis Wong In this blog entry, we have repeatedly emphasized the importance of a risk-based approach when it comes to fraud detection. Scoring and...

Read More Generic fraud score – best practice, Part 1
Risk based authentication – some best practices ...

In my previous two blog postings, I’ve tried to briefly articulate some key elements of and value propositions associated with risk-based authentication.  In this...

Read More Risk based authentication – some best practices to consider, Part 3
Risk-based authentication’s value proposition...

In my last blog posting, I presented the foundational elements that enable risk-based authentication.  These include data, detailed and granular results, analytics and decisioning. ...

Read More Risk-based authentication’s value proposition
Red Flags Rule and commercial accounts...

By: Kristan Keelan Most financial institutions are well underway in complying with the FTC’s ID Theft Red Flags Rule by: 1.  Identifying covered accounts 2. ...

Read More Red Flags Rule and commercial accounts
Small business fraud frequently overlooked...

By: Kristan Keelan What do you think of when you hear the word “fraud”?  Someone stealing your personal identity?  Perhaps the recent news story...

Read More Small business fraud frequently overlooked
Market intelligence solutions more important than ever...

In a recent article, www.CNNMoney.com reported that Federal Reserve Chairman, Ben Bernanke, said that the pace of recovery in 2010 would be moderate and...

Read More Market intelligence solutions more important than ever