Throughout the year, there are certain models that are incredibly popular. SUVs and crossovers fly off the shelves during the wintertime while down south, the pickup-truck is the sales king. There are times when less popular vehicles flood your inventory, creating stress for your sales team to try and get them into the hands of customers. The good news for dealers is that you don’t need to panic when strange bonus programs are floated out by the manufacturer. Data-driven methods can be used to find potential buyers. The upshot of this is dealers don’t have to wait for buyers to waltz into their showroom. Although you can pick a specific model based on incentives, it is a good idea to review your model goals to confirm they are realistic. Based on the models you are trying to move, identify the sales trends by unit and geography. This analysis may help you discover the vehicle margin opportunity isn’t worth the advertising investment. On the other hand, you may learn competitors are selling a plethora of that model and there is plenty of room to conquest market share. Always let data be your guide. Checking a vehicle’s popularity can determine if you should market it. If the model’s popularity in your geography is growing, it will be easier since potential consumers are going into showrooms, asking questions, and doing research online. On the flip side, a vehicle with declining popularity is more difficult, and therefore more expensive, to market. As vehicles become unpopular or out-of-season, aggressive pricing may be in-store. In the past, the “spray and pray” method was what dealers and marketers would use, simply hoping that your campaign would find your target. Today, the best practice is to pinpoint the demand for your model by analyzing your pre-determined market radius to identify those ZIP Codes™ which show the most interest. For example, narrowing down to neighborhoods showing recent sales of your model can help identify future purchase demand. When combined with demographic, psychographic, web analytics, and your CRM data, the formula for determining model-specific demand becomes a precise science. Determining where to market is one thing, but identifying the in-market customer is another thing altogether. To identify the persona for potential purchasers of your models, utilize a system like Experian’s Dealer Positioning System. It helps determine the demographics and psychographics of consumers along with various buying patterns. This persona will include what interests consumers of your model and what they value in a marketing message. While creating the persona, think about what kind of marketing would be the most effective. Are your customers on social media and would they prefer digital advertising? Perhaps a more traditional approach with direct mail or by phone? Understanding their preferences will indicate which approach will most effectively resonate with them. Now campaigns for your model of choice can begin. Use the ZIP Codes and demographics of your highest potential customers to create an effective media plan. Based on the data, craft out digital, traditional, or other campaign types that can be run successfully. Focus on the features that will most appeal to your key demographic– all-wheel-drive, navigation, advanced safety features, made in America, etc. Moving that model off the lot and onto the customer’s driveway does not have to be difficult. If the model is not popular in the first place or it isn’t the right time to market it, you may not want to spend money trying to promote it. With the methods we stated earlier, selling a vehicle to customers based on geotargeting and specific marketing messages make moving even the most unwanted vehicle easier. Also, remember the where, who, and what. Where are you targeting your customers, who are your customers, and what medium are you going to use? Using this can help to move that model and grant you sales success.
In my first blog post on the topic of customer segmentation, I shared with readers that segmentation is the process of dividing customers or prospects into groupings based on similar behaviors. The more similar or homogeneous the customer grouping, the less variation across the customer segments are included in each segment’s custom model development. A thoughtful segmentation analysis contains two phases: generation of potential segments, and the evaluation of those segments. Although several potential segments may be identified, not all segments will necessarily require a separate scorecard. Separate scorecards should be built only if there is real benefit to be gained through the use of multiple scorecards applied to partitioned portions of the population. The meaningful evaluation of the potential segments is therefore an essential step. There are many ways to evaluate the performance of a multiple-scorecard scheme compared with a single-scorecard scheme. Regardless of the method used, separate scorecards are only justified if a segment-based scorecard significantly outperforms a scorecard based on a broader population. To do this, Experian® builds a scorecard for each potential segment and evaluates the performance improvement compared with the broader population scorecard. This step is then repeated for each potential segmentation scheme. Once potential customer segments have been evaluated and the segmentation scheme finalized, the next step is to begin the model development. Learn more about how Experian Decision Analytics can help you with your segmentation or custom model development needs.
Marketers are keenly aware of how important it is to “Know thy customer.” Yet customer knowledge isn’t restricted to the marketing-savvy. It’s also essential to credit risk managers and model developers. Identifying and separating customers into distinct groups based on various types of behavior is foundational to building effective custom models. This integral part of custom model development is known as segmentation analysis. Segmentation is the process of dividing customers or prospects into groupings based on similar behaviors such as length of time as a customer or payment patterns like credit card revolvers versus transactors. The more similar or homogeneous the customer grouping, the less variation across the customer segments are included in each segment’s custom model development. So how many scorecards are needed to aptly score and mitigate credit risk? There are several general principles we’ve learned over the course of developing hundreds of models that help determine whether multiple scorecards are warranted and, if so, how many. A robust segmentation analysis contains two components. The first is the generation of potential segments, and the second is the evaluation of such segments. Here I’ll discuss the generation of potential segments within a segmentation scheme. A second blog post will continue with a discussion on evaluation of such segments. When generating a customer segmentation scheme, several approaches are worth considering: heuristic, empirical and combined. A heuristic approach considers business learnings obtained through trial and error or experimental design. Portfolio managers will have insight on how segments of their portfolio behave differently that can and often should be included within a segmentation analysis. An empirical approach is data-driven and involves the use of quantitative techniques to evaluate potential customer segmentation splits. During this approach, statistical analysis is performed to identify forms of behavior across the customer population. Different interactive behavior for different segments of the overall population will correspond to different predictive patterns for these predictor variables, signifying that separate segment scorecards will be beneficial. Finally, a combination of heuristic and empirical approaches considers both the business needs and data-driven results. Once the set of potential customer segments has been identified, the next step in a segmentation analysis is the evaluation of those segments. Stay tuned as we look further into this topic. Learn more about how Experian Decision Analytics can help you with your segmentation or custom model development needs.
On May 11, 2018, financial institutions will be required to perform Customer Due Diligence routines for their legal entity customers, such as a corporation or limited liability company. Here are 3 facts that you should know about this upcoming rule: When validating ownership, financial institutions can accept what customers have provided unless they have a reason to believe otherwise. Some possible trigger events requiring review of beneficial ownership information for existing accounts include: change in ownership and law enforcement warrants or subpoenas. When collecting and updating beneficial ownership information, the financial institution must retain the original and updated information. While financial institutions are required to collect the same basic customer identification program information from business owners that is required from consumer customers, your current policies may not satisfy this new rule. Learn more
In the credit game, the space is deep and diverse. From super prime to prime to subprime consumers, there is much to be learned about how different segments are utilizing credit and navigating the financial services arena. With 78 percent of full-time workers saying they live paycheck-to-paycheck and 71 percent of U.S. workers responding that they live in debt, it is not surprising a sudden life event can plunge a solid credit consumer from prime to subprime within months. Think lost job, divorce or unexpected medical bill. This population is not going away, and they are seeking ways to make ends meet and obtain finances for needs big and small. In many instances, alternative credit data can shed a light on new opportunities for traditional lenders, fintech players and those in the alternative financial space when servicing this specific consumer segment. In a new study, Clarity analyzed the trends and financial behavior of subprime loan users by looking at application and loan data in Clarity’s database, as well as overlaying VantageScore® credit score insights from Experian from 2013 to 2017. Clarity conducted this subprime trends report last year, but this is the first time it factored in VantageScore® credit score data, providing a different lens as to where consumers fall within the credit score tiers. Among the study highlights: Storefront single pay loan customers are becoming more comfortable with applying for online loans, with a growing percentage seeking installment products. For the first time in five years, online single pay lending (payday) saw a reduction in total credit utilization per customer. Online installment, on the other hand, saw an increase. While the number of online installment loans increased by 12 percent and the number of borrowers by only 9 percent, the dollar value grew by 30 percent. Online installment lenders had the greatest percentage increase in average loan amount. California and Texas remain the most significant markets for online lenders, ranking first and second for five years in a row due to population size. There has also been growth in the Midwest. The in-depth report additionally delves into demographics, indicators of financial stability among the subprime market and comparisons between storefront and online product use and performance. “Every year, there are more financial lenders and products emerging to serve this population,” said Andy Sheehan, president of Clarity Services. “It’s important to understand the trends and data associated with these individuals and how they are maneuvering throughout the credit spectrum. As we know, it is often not a linear journey.” The inclusion of the VantageScore® credit score showcased additional findings around prime versus subprime financial behaviors and looks at generational trends. Access Full Report
With 16.7 million reported victims of identity fraud in 2017 (that’s 6.64 percent of the U.S. population), it was another record year for the number of fraud victims. And as online and mobile transaction growth continued to significantly outpace brick-and-mortar growth, criminal attacks also grew rapidly. This past year, we saw an increase of more than 30 percent in e-commerce fraud attacks compared with 2016. As we’ve done over the past three years, Experian® analyzed millions of online transactions to identify fraud attack rates for both shipping and billing locations across the United States. We looked at several data points, including geography and IP address, to help businesses better understand how and where fraud is being perpetrated so they can better protect against it. The 2017 e-commerce fraud attack rate analysis shows: Delaware and Oregon continue to be the riskiest states for both billing and shipping fraud. Delaware; Oregon; Washington, D.C.; Florida; and Georgia are the top five riskiest states for billing fraud. Delaware, Oregon, Florida, New York and California are the top five riskiest states for shipping fraud, accounting for 50 percent of total fraud attacks. South El Monte, Calif., is the riskiest city overall, with an increase in shipping fraud of approximately 230 percent. Shipping fraud most often occurs near major airports and seaports due to reshippers and freight forwarders that receive domestic goods and often send them overseas. When a transaction originates from an international IP address, shipping fraud is 6.7 times likelier than the average, while billing fraud becomes 7.1 times likelier. Where is e-commerce fraud happening? Typically, the highest-risk areas for fraud are in ZIP™ codes and cities near large ports of entry or airports. These are ideal locations to reship fraudulent merchandise, enabling criminals to move stolen goods more effectively. Top 10 riskiest billing ZIP™ codes Top 10 riskiest shipping ZIP™ codes 97252 Portland, OR 97079 Beaverton, OR 33198 Miami, FL 33122 Miami, FL 33166 Miami, FL 91733 South El Monte, CA 33122 Miami, FL 97251 Portland, OR 77060 Houston, TX 97250 Portland, OR 33195 Miami, FL 33166 Miami, FL 97250 Portland, OR 97252 Portland, OR 97251 Portland, OR 33198 Miami, FL 33191 Miami, FL 33195 Miami, FL 97253 Portland, OR 33192 Miami, FL Source: Experian.com Source: Experian.com What’s more, many of the riskiest ZIP™ codes and cities experience a high volume of transactions originating from international IP addresses. In fact, the top 10 riskiest ZIP codes overall tend to experience fraudulent activity from numerous countries overseas, including China, Venezuela, Taiwan and Hong Kong, and Argentina. These fraudsters tend to implement complex fraud schemes that can cost businesses millions of dollars in fraud losses. Additionally, the analysis shows that traffic coming from a proxy server — which could originate from domestic and international IP addresses — is 74 times riskier than the average transaction. The problem The increase in e-commerce fraud attacks shouldn’t come as a huge surprise. The uptick in data breaches, merchants’ continued adoption of EMV-enabled terminals to protect against counterfeit card fraud and the abundance of consumer data on the dark web means that information is even more accessible to criminals. This enables them to open fraudulent accounts, take over legitimate accounts and submit fraudulent transactions. Another reason for the increase is automation. In the past, criminals needed a strong understanding of fraud methods and technology, but they can now bring down an entire organization by simply downloading a file and automating the submission of thousands of applications or transactions simultaneously. Since fraudsters need to make these transactions appear as normal as possible, they often leverage the cardholder’s actual billing details with slight differences, such as e-mail address or shipping location. Unfortunately, the mass availability of compromised data and the abundance of fraudsters makes it increasingly challenging to identify and separate legitimate customers from attackers across the country. Because of the widespread prevalence of fraud and data compromises, we don’t see billing fraud concentrated in just one region of the country. In fact, the top five states for billing fraud make up only about 18 percent of overall fraud attacks. Top 5 riskiest billing fraud states Top 5 riskiest shipping fraud states State Fraud attack rate State Fraud attack rate Delaware 93.4 Delaware 195.9 Oregon 86.1 Oregon 170.1 Washington, D.C. 46.5 Florida 45.1 Florida 39.2 New York 37.3 Georgia 31.5 California 32.6 Source: Experian.com Source: Experian.com Prevention and protection need to be the priority As businesses get a better understanding of how and where fraud is perpetrated, they can implement proactive strategies to detect and prevent attacks, as well as protect payment information. While no one single strategy can address the entire scope of fraud, there are advanced data sets and technology — such as device intelligence, behavioral and physical biometrics, document verification and entity resolution — that can help businesses make better fraud decisions. Fortunately, consumers can also play a major role in safeguarding their information. In addition to regularly checking their credit reports and bank/credit card statements for fraudulent activity, consumers can limit the data they share on social networking sites, where attackers often begin when perpetrating identity fraud. While we continue to help both organizations and consumers limit their exposure to e-commerce fraud, we anticipate that criminals will attempt more sophisticated fraud schemes. But businesses can stay ahead of the curve. This comes down to having a keen understanding of how fraud is being perpetrated, as well as leveraging data, technology and multiple layered strategies to better recognize legitimate customers and make more precise fraud decisions. View our e-commerce fraud heat map and download the top 100 riskiest ZIP codes in the United States. Experian is a nonexclusive full-service provider licensee of the United States Postal Service®. The following trademark is owned by the United States Postal Service®: ZIP. The price for Experian’s services is not established, controlled or approved by the United States Postal Service.
Optimizing your collections With a maximized approach to collections, you can see an uplift in performance of 5% to 30% in Key Performance Indicators against traditional techniques. Here are some suggestions for optimizing your strategies: Consider every combination of actions. Understand the tradeoffs between the different actions, which are forced by constraints. Choose the best set of actions to fit within the constraints. Maximize your collections efforts by knowing your customers better, segmenting and targeting your approach more effectively, and automating as much as possible. Learn more in our white paper Collections Optimization. Download now
Managing your customer accounts at the identity level is ambitious and necessary, but possible Identity-related fraud exposure and losses continue to grow. The underlying schemes have elevated in complexity. Because it’s more difficult to perpetrate “card present” fraud in the post–chip-and-signature rollout here in the United States, bad guys are more motivated and getting better at identity theft and synthetic identity attacks. Their organized nefarious response takes the form of alternate attack vectors and methodologies — which means you need to stamp out any detected exposure point in your fraud prevention strategies as soon as it’s detected. Experian’s recently published 2018 Global Fraud and Identity Report suggests two-thirds, or 7 out of every ten, consumers want to see visible security protocols when they transact. But an ever-growing percentage of them, fueled in no small part by those tech-savvy millennials, expect to be recognized with little or no friction. In fact, 42 percent of the surveyed consumers who stated they would do more transactions online if there weren’t so many security hurdles to overcome were — you guessed it — millennials. So how do you implement identity and account management procedures that are effective and, in some cases, even obvious while being passive enough to not add friction to the user experience? In other words, from the consumer’s perspective, “Let me know you know me and are protecting me but not making it too difficult for me when I want to access or manage my account.” Let’s get one thing out of the way first. This isn’t a one-time project or effort. It is, however, a commitment to the continued informing of your account management strategies with updated identity intelligence. You need to make better decisions on when to let a low-risk account transaction (monetary or nonmonetary) pass and when to double down a bit and step up authentication or risk assessment checks. I’d suggest this is most easily accomplished through a single, real-time access point to myriad services that should, at the very least, include: Identity verification and reverification checks for ongoing reaffirmation of your customer identity data quality and accuracy. Know Your Customer program requirements, anyone? Targeted identity risk scores and underlying attributes designed to isolate identity theft, first-party fraud and synthetic identity. Fraud risk comes in many flavors. So must your analytics. Device intelligence and risk assessment. A customer identity is no longer just their name, address, Social Security number and date of birth. It’s their phone number, email address and the various devices they use to access your services as well. Knowing how that combination of elements presents itself over time is critical. Layered passive or more active authentication options such as document verification, biometrics, behavioral metrics, knowledge-based verification and alternative data sources. Ongoing identity monitoring and proactive alerting and segmentation of customers whose identity risk has shifted to the point of required treatment. Orchestration, workflow and decisioning capabilities that allow your team to make sense of the many innovative options available in customer recognition and risk assessment — without a “throw the kitchen sink at this problem” approach that will undoubtedly be way too costly in dollars spent and good customers annoyed. Fraud attacks are dynamic. Your customers’ perceptions and expectations will continue to evolve. The markets you address and the services you provide will vary in risk and reward. An innovative marketplace of identity management services can overwhelm. Make sure your strategic identity management partner has good answers to all of this and enables you to future-proof your investments.
Identify your customers to spot fraud. It’s a simple concept, but it’s not so simple to do. In our 2018 Global Fraud and Identity Report, we found that consumers expect to be recognized and welcomed wherever and whenever they do business. Here are some other interesting findings regarding recognition and fraud: 66% of consumers surveyed appreciate seeing visible security when doing business online because it makes them feel protected. 75% of businesses want security measures that have little impact on consumers. More than half of businesses still rely on passwords as their top form of authentication. Even though you can’t see your customers face-to-face, the importance of being recognized can’t be overemphasized. How well are you recognizing your customers? Can you recognize your customers?
From malware and phishing to expansive distributed denial-of-service attacks, the sophistication, scale and impact of cyberattacks have evolved significantly in recent years. Mitigate risk by employing these best practices: Manage third-party risks. Regularly review response plans. Opt in to software updates. Educate, educate, educate. Organizations must adopt stronger, more advanced technical solutions to protect sensitive data. While enhanced technology is necessary for defending against data breaches, it can’t work independently. Learn more
While it’s important to recognize synthetic identities when they knock on your door, it’s just as important to conduct regular portfolio checkups. Every circumstance has unique parameters, but the overarching steps necessary to mitigate fraud from synthetic IDs remain the same: Identify current and near-term exposure using targeted segmentation analysis. Apply technology that alerts you when identity data doesn’t add up. Differentiate fraudulent identities from those simply based on bad data. Review front- and back-end screening procedures until they satisfy best practices. Achieve a “single customer view” for all account holders across access channels — online, mobile, call center and face-to-face. With the right set of analytics and decisioning tools, you can reduce exposure to fraud and losses stemming from synthetic identity attacks at the beginning and across the Customer Life Cycle. Learn more
Millions of Americans placed a credit freeze or restricted access to their credit file in recent months to keep identity thieves at bay. Credit freezes keep any new creditors from seeing a consumer’s credit file, which makes it nearly impossible for hackers to open new accounts fraudulently. But a credit freeze can also be problematic for consumers when they are finally ready to consider new credit products and loans. We’ve heard from credit unions and other lenders about sharing best practices to help streamline the process for consumers who want to permanently or temporarily lift the freeze to apply for a legitimate line of credit. Following are the three ways to help clients with a frozen Experian report quickly and efficiently allow access. Unfreeze account: This will remove the freeze entirely from the consumer’s credit report so that it may be accessed with the consumer’s permission. To do this, the consumer will need to contact Experian online, by phone or mail and provide his unique personal identification number (PIN) code—provided when the consumer froze his account—to un-freeze the report. Thaw account: An action that will temporarily remove the freeze for a timeframe determined by the consumer. The consumer should contact Experian online, by phone, or mail and provide his unique PIN code to thaw the report. Grant a creditor one-time access: A consumer may provide a different/temporary PIN to a lender to access the report just once. The PIN can be emailed to the consumer, presented on screen if the consumer is online, or provided on the phone or by mail. Typically, a consumer’s request to thaw or un-freeze his credit file online or by phone will thaw or un-freeze the file within minutes. Download Checklist Experian can be reached: Online: www.experian.com/freeze Phone: 888-397-3742 Mail: P.O. Box 9554, Allen, Texas 75013 Remember, if a consumer has a frozen credit file with all three credit reporting agencies, he will need to contact each agency to enable access to his report.
Trended attributes and consumer lending Digging deeper into consumer credit data can help provide new insights into trending behavior, providing more than just point-in-time credit evaluation. The information derived through trended attributes can help you understand your customers’: Payment rates and account migration behavior. Slope of balance changes. Delinquency patterns over time. Today’s consumer lending environment is more dynamic and competitive than ever. Trended attributes can give additional lift in your segmentation strategies and custom models and provides a high-definition lens that opens a world of opportunity. Learn more
As the world celebrates International Women's Day on March 8, we want to shine a light on a few of the female leaders who shape, inspire and grow Experian. From sales to strategy, to people management, big data and beyond, women are a driving force in every industry - and their stories deserve to be told. Throughout the week, meet some of the "Women of Experian." Today, we feature Laurie Jerome, an executive leading Experian's initiatives around talent, diversity and inclusion. Learn about her career journey, learnings and sources of inspiration as it pertains to leadership. What do you do at Experian? What’s a typical day like for you? I lead all talent initiatives across North America, (6,000 employees located across 24 offices and over 900 remote workers). In addition, it’s critical that we partner with our global talent teams for alignment and integration of brand, culture, leadership and succession management. In very simple terms, we are here to create a great employee experience and provide leaders with the tools, training and resources to do just that. The overall outcome is to ensure our workforce is engaged and retained. How do you motivate yourself and stay motivated? I have a motto that “If you love what you do, then you’ll never have to work a day in your life.” I found my niche early on and although I can’t say that every day I get to do what I love, I balance my day with networking, workouts and family. Work-life integration is so important for anyone who works full time. My days are full, but if they include some of those balanced elements then I feel fulfilled. One of my favorite things to do is pay it forward to others who are growing their career. I have several mentees and find so much joy in giving back and learning from them. I think it’s become more real to me now having two sons (one a recent grad and one in his second year at UCLA). With such a competitive environment for candidates and employers, I find it so rewarding to help others navigate their way. What are the most important values you demonstrate as a leader? I would have to say life-long learning no matter where you are in your career. With that comes humility and transparency in sharing what you know, and probably most importantly being vulnerable and confident enough to share what you don’t. I love to surround myself with others who bring very different skills, values and experiences to the team. It truly requires time and attention to ensure your team has a strong understanding of one another and values such differences. My team meets every other week and although some are virtual and in other locations, I insist on using video conference to keep us visually in touch and connected. There’s something about being present that matters. Oh, and speaking of presence, another important value I have is being available to my team and others no matter how busy I am. Well, I think I went over the request of providing the MOST important however they are all so related. What are some patterns you’ve noticed over the years about women at work, and things they could be doing better to advance their careers? The topic of mentoring comes up quite often. Everyone is looking for someone they can turn to and seek advice and council with on a range of topics. I think it’s great, but one piece of advice I give to those I’ve mentored is to find someone very different than yourself and capitalize on what they offer that you need. In some cases, it’s a male perspective. Like it or not, we see things through such a different lens and having that view can be very advantageous and insightful. Discover your gaps and find someone who demonstrates them well. Do you have a sponsor? Instead of selecting someone who can mentor and coach, find someone who can open doors for you and sponsor stretch assignments and new opportunities. Caveat… be prepared to be challenged and perform. It’s not for the weak of heart. I’ve always been an avid networker. It comes more natural to me. I’ve been told I have a “black belt” in networking. Women have traditionally been expected to devote more time to family and domestic responsibilities, thus lacking as much time as men to build networks. We’re starting to see more women networking. To be truly competitive in the networking arena, women may have to put more time into making contacts — and may have to ask their partners to take on a bigger share in juggling family life and work. Networking events are hard to juggle outside of work, but there are many more ways to view a network. Think about your gym buddies, those alumni groups, that stranger on the flight heading to another business meeting. You’ve got to get creative and get out of your comfort zone. And the greatest thing about networking is that it always has a mutually beneficial outcome. Go into it with a giving mindset and you’ll get so much out of it as well. Favorite authors/books? Reshma Saujani, founder of Girls Who Code and author of Women Who Don’t Wait in Life: Break the Mold, Lead the Way , offers some advice for how women can get ahead and be the ultimate leaders, even in a male-dominated environment. I love almost anything Ram Charan writes: Execution: The Discipline of Getting Things Done, The High Potential Leader, What the Customer Wants You to Know, Talent Wins: The New Playbook for Putting People First. And it wouldn’t be fair if I didn’t give credit to a woman that inspires me in all that she does – Sheryl Sandberg.