Loading...

When we think about fraud prevention

Published: January 10, 2011 by Matt Ehrlich

When we think about fraud prevention, naturally we think about mininizing fraud at application. We want to ensure that the identities used in the application truly belong to the person who applies for credit, and not from some stolen identities.

But the reality is that some fraudsters do successfully get through the defense at application. In fact, according to Javelin’s 2011 Identity Fraud Survey Report, 2.5 million accounts were opened fraudulently using stolen identities in 2010, costing lenders and consumers $17 billion.

And these numbers do not even include other existing account fraud like account takeover and impersonation (limited misusing of account like credit/debit card and balance transfer, etc.). This type of existing account fraud affected 5.5 million accounts in 2010, costing another $20 billion.

So although it may seem like a no brainer, it’s worth emphasizing that we need to continue to detect fraud for new and established accounts.

Existing account fraud is unlikely to go away any time soon.  Lending activities have changed significantly in the last couple of years. Origination rate in 2010 is still less than half of the volume in 2008, and booked accounts become riskier. In this type of environment, when regular consumers are having hard time getting new credits, fraudsters are also having hard time getting credit. So naturally they will switch their focus to something more profitable like account takeover.

Does your organization have appropriate tools and decisioning strategy to fight against existing account fraud?

Related Posts

Fraud-as-a-Service (FaaS) represents an emerging and increasingly sophisticated business model within cybercrime. Read more.

Published: September 19, 2024 by Alex Lvoff

Reject inferencing techniques unlock a more comprehensive view of your applicant pool for more informed underwriting decisions. 

Published: September 17, 2024 by Julie Lee

Replay attacks are network-based security hacks attackers use to fraudulently gain access to a network or system. Learn more.

Published: September 12, 2024 by Brian Funicelli