White Paper. Account Opening: The Front Door of Fraud. Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud
|
|
- Warren Ward
- 8 years ago
- Views:
Transcription
1 White Paper Account Opening: The Front Door of Fraud Effective Enterprise-wide Fraud Mitigation Solutions to Combat New-Account Fraud August 2010
2 Table of Contents Introduction The hidden costs of fraud Fraud challenges Beef up your front-line defenses first Scenarios for fighting application fraud Summary
3 Introduction Lenders are making progress in improving their fraud mitigation processes, but much work remains to be done. The number of identity fraud victims rose 12 percent in 2009 to 11.1 million adults. The total annual dollar amount of identity fraud increased 12.5 percent to $54 billion the highest level since the survey began in The faceless channel for account opening is highly vulnerable More than three-fourths of American adults are Internet-active at home, 4 and most Internet users have become comfortable in conducting their financial affairs online. As Internet access becomes ubiquitous for U.S. consumers, cyber-criminals have taken note. Fraudsters have stepped up their efforts to exploit the Internet for identity theft, account takeovers and other forms of fraud. The result: Online account opening for credit cards and other non-secured loans a preferred growth channel for lenders has become one of the most popular avenues for fraud. According to a Javelin study, the use of stolen identity information to open new credit card accounts increased 33 percent in In the online channel, new accounts opened fraudulently were more than double 2008 s levels. 2 This white paper: examines fraud trends from the lender s perspective, mainly focusing on fraud related to opening new accounts suggests specific solutions to protect against both true-name and synthetic identity fraud. The hidden costs of fraud Criminals are targeting easily monetized payment card information. Most are credit cards but debit cards, too, are vulnerable. Credit cards are an attractive target for fraudsters throughout a card s life cycle. Opportunities for fraud are present at account opening, during online account maintenance, during online transactions and at the point of sale, when a card is lost, and even after the cardholder has died. 1
4 Challenges in dealing with fraud 1. Fraud is hard to measure. Fraud has varying definitions, and even the definitions can be ambiguous. When fraud is suspected, lenders are often reluctant to pinpoint an account, application or transaction as being fraudulent without clear proof. Consequently, many fraudulent transactions are written off as credit losses. xxxxxxxxxxxxxxxxxxxxxxxxxxx 2. Fraud patterns are a dynamic, moving target. When lenders bolster their fraud defenses in one area, criminals find new soft spots and shift their attacks to these lessprotected areas. Mercator Advisory Group calls this the balloon effect, with fraudsters constantly probing for the most vulnerable, least defended areas and focusing their efforts on these weak spots. xxxxxxxxxxxxxxxx 3. Fraud mitigation efforts need to be dynamic, too. Lenders need to constantly scrutinize and upgrade their fraud defenses. Old methods may not need to be discarded many of them still need to be in place, just modernized and expanded to keep up with fraudsters ever-shifting tactics. xxxxxxxxxxxx 4. Fraud containment efforts may collide with growth goals. Lenders understandably want to maximize new business opportunities. Their dilemma is how to screen effectively for the likelihood of fraud without generating too many false positives legitimate applicants who are declined because they exhibit some traits often seen in fraudulent applications. 5. New customers and fraudsters both prefer the online channel. Look at the demographics of the customers you re trying to attract. More and more are likely to be younger professionals who rely heavily on the Internet. A new bank customer, for example, may be more familiar with the bank s website than its nearest brick-and-mortar bank. The trick is to exploit online channels without taking on excessive fraud risk. xxxxxxxxxxxxxxxxxxxxxxx 6. The scope of fraud activity is broad. Because there are so many aspects to fraud detection, prevention and resolution, and because they change so rapidly, fraud control managers face daunting challenges. There are no full-scale solutions that fit every lender s situation. Estimates or measurements of annual fraud losses of credit card issuers are difficult to find. However, Mercator Advisory Group has attempted to shed light on the extent of credit card fraud. Its December 2008 report, Credit Card Issuer Fraud Management, notes that fraud losses are keeping pace with the growth in the value of credit card transactions. The report pegs credit card fraud losses at around $1 billion in the U.S. or 1.2% of issuer expenses. 3 This, however, is just the tip of the iceberg. Unreported and undetected fraud losses at issuers, says Mercator s report, are significant and probably end up classified as credit losses. When hidden costs are considered, the total loss figure mushrooms. According to Mercator, the direct costs of fraud attributable in some way to U.S. credit cards could easily exceed $16 billion. And that doesn t include about $2 billion that banks spend on fighting fraud with technology, staffing, investigations and related fraud control expenses. Nor does it include the largest, murkiest, unknown cost category that Mercator calls the dark numbers of fraud: victim costs, damaged company reputations, unreported and undetected fraud, misclassified issuer losses, data breach forensics, lawsuits, and opportunity costs. Fraud challenges Financial institutions face a multitude of challenges in dealing with the many faces of fraud. (See sidebar.) For many, protecting against new-account fraud needs to be a top priority. Various point solutions address different pieces of the fraud mitigation problem, and some are specifically designed for the Internet channel. For example, during an online application process, the IP address can be checked for consistency with the applicant s billing address. Other tools can be applied to specific situations, channels or product lines. However, no comprehensive solutions exist for enterprise management of fraud. There are no swift-to-implement, turnkey solutions. Beef up your front-line defenses first Many financial institutions lack the resources to implement all best practices for fraud management in the near term. However, fraud mitigation demands constant attention. Inaction is not a realistic alternative for forward-thinking financial institutions. 2
5 Equifax recommends that lenders objectively assess their fraud control strengths and weaknesses, and use the assessment to set realistic goals. Industry Executive Concerned About New-Account Fraud BankInfoSecurity.com, a reference site for the banking community, named online account applications as one of ten predominant types of fraud that institutions and their customers can expect to see in 2010, according to industry experts. Criminals use new accounts not just for immediate financial gain; they also use multiple accounts to keep cash balances from becoming suspicious and to create identities for future activity. 4 Focus attention on any weak spots in your first lines of defense. Account opening needs to be a rock-solid bulwark in your fraud defenses. The best way to fight new-account fraud: Use an integrated suite of real-time defenses at the time and channel of application. A strong approach should have these attributes: Real-time processes for identity verification and out-ofwallet authentication Flexibility to apply different fraud mitigation solutions to different types of fraud Robust leveraging of internal and external data sources, supported by appropriate analytics Scenarios for fighting application fraud Equifax has expanded its line of fraud mitigation products into an integrated, real-time suite. Here are a few examples illustrating how the Equifax Identity Suite addresses some typical scenarios of application fraud: Scenario I: True-Name Identity Fraud Business problem: Criminals use stolen identities to open new accounts via a lender s online or call center channel. It is fairly easy for a criminal to obtain personal information (such as name, address, Social Security number and date of birth) to use in a fraudulent manner. As a result, identity theft continues to be a major white collar crime in the United States. Identity theft can be defined as any act in which someone uses the personal information of another without that person s knowledge or consent. A common term for this type of identity theft, where the fraudster poses as the actual consumer, is true-name fraud. Fraud scenario: Relying on the anonymity of a credit card issuer s Internet channel, a fraudster uses stolen personal information to apply for an account in the victim s name. 3
6 The ROI of Fraud Mitigation What s the value of real-time screening of loan applications? For one Equifax customer, a regional bank, the value exceeds $2 million per month. Previously, the bank s processes were unable to perform fraud checks until after loan decisions were completed so a few days often passed before fraud was detected. The bank turned to Equifax for a solution that would screen loan traffic for fraud in real time, enable custom fraud rules using multiple data sources, and perform analysis of fraud hits. Equifax designed a comprehensive solution, including verification and authentication tools, along with data integration, workflow management, analytics and decisioning capabilities. The new fraud mitigation program eliminates delays, minimizes manual activity and reduces potential fraud losses. Net savings the first year amounted to $14.2 million, after deducting the total first-year costs for the solution (about $400,000 for software, implementation and transaction costs). The latest data shows the savings from prevented fraud losses are ongoing and growing in fact, the savings now exceed $2 million per month. To detect attempts at true-name fraud, especially in the Internet channel, lenders need more than simple fraud tools that cross-check applicant-supplied information with various databases. Anti-fraud tools that merely check the validity of the name, date of birth and address, for example, don t thwart criminals who have already obtained that information through some means of identity theft. Solution: Use a combination of authentication and modeling techniques. Predictive modeling. Studies by Equifax have proved that predictive tools customized to a specific lender are effective in spotting fraudulent applications in a real-time environment. Predictive modeling can demonstrably reduce losses from true-name identity theft. Optimum performance is achieved when the model draws upon a variety of data types, including: credit-file attributes, such as balance, high credit, delinquency, and inquiry information. Mismatched attributes. Examples of mismatch situations that generate flags: drivers license number, house number, date of birth month/year, name/address/ssn. application-specific attributes channel and time of application can be indicators of fraud. Fraud is a difficult behavior to define and even more difficult to predict. The bad guys are constantly changing their methods, making patterns hard to establish. Therefore, predictive solutions must be continually updated with the latest data. From a technology perspective, there is no cookie-cutter, one-sizefits-all approach to fighting fraud. Just as you might use several tools to repair a leaking faucet, several tools may need to work together for specific fraud detection and mitigation situations. True-name fraud calls for a combination of strong defensive measures aimed at answering the key question: Is the applicant the person he or she claims to be? Advanced techniques can often identify true-name fraud at the source, at the time of application. Two of the best techniques are: Real-time authentication. In the high-exposure Internet channel for credit applications, one proven technique is to ask the applicants several knowledge-based questions. The answers, which are delivered in real-time, should only be known by the real person. 4
7 Many banks and credit unions rely on eidverifier as the cornerstone of their ID authentication defenses against true-name fraud. eidverifer can be used in call centers or via the Internet to authenticate a consumer s identity using an adaptive real-time quiz capability. The tool presents multiple-choice questions to the applicant that should only be known by that actual person. Equifax works closely with customers to include plenty of innovative, out of wallet questions from credit and non-credit sources. For example, using proprietary information from Equifax s unique The Work Number service, eidverifier can create queries based on current or former employment. In addition, eidverifier: performs transactional velocity checks to detect repeat attempts uses a statistical model to provide a fraud index score as part of the overall assessment relies on non-public sources to minimize false-positives Scenario II: Synthetic Identity Fraud Problem At the credit bureau, an inquiry on an identity fabricated in this manner created a no-hit just what the criminals wanted, knowing that this lender s policy allowed booking applications from no-hits. Business problem: A credit card issuer experiences fraud losses when criminals use fabricated account information, usually with a real SSN. To open an account, scammers may create a whole new identity using a combination of real and false information. Typically, the fraudster attaches a bogus name to a real Social Security number. Called synthetic identity fraud, this type of fraud is increasing and is becoming more common than true-name identity fraud. Up to half of all new account fraud involves synthetic identities that often go unreported, Gartner Inc. estimates. 5 Fraud scenario: A card issuer offered credit cards via the online channel. Criminals soon uncovered the opportunity for synthetic identity fraud. Taking advantage of the loose credit policy, they fabricated bogus identities. In most cases, the fraudsters concocted names and addresses, and gave each identity a birth date within the 21 to 23 age range. Then they assigned real social security numbers to each fictitious applicant. 5
8 Solution At Equifax we do not build synthetic fraud files. We do not add trades to a file when the Social Security number belongs to someone else. We do not add the inquiry Social Security number to the Social Security segment. Solution: Use identity component screening especially the applicant s SSN, which needs to be scrutinized closely. The crucial first step in recognizing, and combating, synthetic identity fraud is to scrutinize the identity s components (such as name, address, Social Security number, and telephone number). Are they accurate; what is known from existing records about portions of the identity? The overall goal is to verify the existence of this identity. Discrepancies in Social Security numbers are frequently a tip-off to synthetic fraud. Equifax has several products that complement each other in assessing the validity of Social Security numbers: 1. Identity Scan checks SSNs for high risk factors for example, has the SSN ever been issued by the Social Security Administration? Was it issued recently? Has the SSN been reported as deceased or misused? 2. Equifax SSN Affirm checks whether the SSN belongs to a real person. It uses a proprietary comparison algorithm to see if the SSN matches the applicant s name, the name of another consumer, or no names in the database. Moreover, Identity Scan found that many of the SSNs were issued in the 1950 s and 60s long before the birthdates of the applicants. Summary In the fight against fraud, there is no cookie cutter approach for lenders. Often the best strategy involves multiple layers of defenses. With the right mix of fraud mitigation tools, you not only minimize losses, you also improve compliance and staff productivity. The Equifax Identity Suite provides your organization with an integrated suite of real-time, industry-leading defenses against account opening fraud a proactive solution that acts at the time and channel of application. The suite consists of identity screening, verification and authentication tools that work in real time to minimize losses from various types of fraud. Equifax augments the Identity Suite with differentiated data assets and predictive analytics, all delivered through flexible decisioning technology. 6
9 Products in the Equifax Identity Suite can be quickly and seamlessly integrated into your account opening processes. The products provide high ROI, which comes from multiple sources: significantly reduced identity fraud losses reduced operational costs by eliminating much of the time wasted on excessive manual reviews of false positives and time-consuming verification processes higher profits by minimizing false negatives and application abandonment by legitimate prospects higher loyalty and retention of security-conscious customers Equifax has extensive experience working across multiple industries to help customers optimize their fraud prevention processes. We welcome the opportunity to explore the best fraud mitigation approaches for your environment and level of risk. 7
10 About Equifax Equifax empowers businesses and consumers with information they can trust. A global leader in information solutions, we leverage one of the largest sources of consumer and commercial data, along with advanced analytics and proprietary technology, to create customized insights that enrich both the performance of businesses and the lives of consumers. With a strong heritage of innovation and leadership, Equifax continuously delivers innovative solutions with the highest integrity and reliability. Businesses large and small rely on us for consumer and business credit intelligence, portfolio management, fraud detection, decisioning technology, marketing tools, and much more. We empower individual consumers to manage their personal credit information, protect their identity, and maximize their financial well-being. Headquartered in Atlanta, Georgia, Equifax Inc. operates in the U.S. and 14 other countries throughout North America, Latin America, Europe and Asia. Equifax is a member of Standard & Poor s (S&P) 500 Index and its common stock is traded on the New York Stock Exchange under EFX. Endnotes 1 Javelin Strategy & Research. Javelin Study Finds Identity Fraud Reached New High in 2009, but Consumers are Fighting Back. News release. February 10, Javelin. Javelin Study Finds Identity Fraud Reached New High in Paterson, Ken. Credit Card Issuer Fraud Management Report Highlights. Mercator Advisory Group, December McGlasson, Linda. 10 Faces of Fraud for Bankinfosecurity.com. December 14, Gartner, Inc. 7.5 Percent of U.S. Adults Lost Money as a Result of Financial Fraud. 8
11 This publication contains many of the valuable trademarks, service marks, names, titles, logos, images, designs, copyrights and other proprietary materials owned, registered and used by Equifax Inc. and its affiliated companies, including but not limited to the registered mark Equifax ; any unauthorized use of same is strictly prohibited and all rights are reserved by Equifax Inc. and its affiliated companies. All other trademarks and service marks not owned by Equifax Inc. or its affiliated companies that appear in this publication are the property of their respective owners. Copyright 2010, Equifax Inc., Atlanta, Georgia. All rights reserved. Printed in the U.S.A. EFS-1004-ADV 8/10
Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy
CONSUMER INFORMATION SOLUTIONS Automotive Services Tools for dealers, lenders and industry service providers that drive profitable results in today s economy Reach the right prospects Automotive solutions
More informationWhite Paper. Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper
White Paper Predictive Modeling for True-Name Fraud An Equifax Analytical Services Research Paper Dave Whitin, Consultant Michiko Wolcott, Statistician September 2006 Table of contents Executive summary...................................
More informationThe New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age
How to Battle the Leading Identity Fraud Tactic in The Digital Age In the 15 years since synthetic identity fraud emerged as a significant threat, it has become the predominant tactic for fraudsters. The
More informationFind the digital fingerprints of fraud in the financial services industry
Find the digital fingerprints of fraud in the financial services industry Velocity and pattern detection tool adds powerful capabilities for next-generation fraud management Gasan Awad Vice President,
More informationThe Facets of Fraud. A layered approach to fraud prevention
The Facets of Fraud A layered approach to fraud prevention Recognizing Fraud The various guises of fraud lead many organizations to believe they are not victims of deception or to vastly underestimate
More informationWHITE PAPER. Credit Issuers. Stop Application Fraud at the Source With Device Reputation
WHITE PAPER Credit Issuers Stop Application Fraud at the Source With Device Reputation Table of Contents Overview 1 Why you need more than conventional methods of fraud detection 2 It is not just credit
More informationSpotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
More informationIneffective fraud prevention destroys profit margins. The right analytics keeps your business on target.
White Paper Ineffective fraud prevention destroys profit margins. The right analytics keeps your business on target. Research provided by Javelin Strategy & Research February 2010 Risk Solutions Financial
More information5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically
More informationA Unique Perspective into the World of Identity Fraud
White Paper A Unique Perspective into the World of Identity Fraud Explore the value of LexisNexis FraudPoint solutions in fraud detection. Risk Solutions Identity Management Executive Summary There are
More informationProduct. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution
Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively
More informationWHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules
WHITEPAPER Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules May 2008 2 Table of Contents Introduction 3 ID Analytics for Compliance and the Red Flag Rules 4 Comparison with Alternative
More informationSolving Online Credit Fraud Using Device Identification and Reputation
Solving Online Credit Fraud Using Device Identification and Reputation White Paper July 2007 Solving Online Credit Fraud Using Device Identification and Reputation About this White Paper iovation has pioneered
More informationEmpowering Brokers to Identify and Combat Mortgage Fraud
Empowering Brokers to Identify and Combat Mortgage Fraud An Equifax White Paper October 2007 Author: Paul Wills Equifax Global Product Management Introduction In today s lending environment, mortgage fraud
More informationALERTS NOTIFICATION USER GUIDE
Page 1 of 10 ABOUT EQUIFAX ALERTS NOTIFICATION USER GUIDE Equifax Canada Inc. Box 190 Jean Talon Station Montreal, Quebec H1S 2Z2 Equifax empowers businesses and consumers with information they can trust.
More informationPrepaid Fraud Mitigation: Leveraging the Processing Relationship to Prevent Fraud Throughout the Prepaid Lifecycle
Prepaid Fraud Mitigation: Leveraging the Processing Relationship to Prevent Fraud Throughout the Prepaid Lifecycle Conducted by Javelin Strategy & Research October 2009 2008 Javelin Strategy & Research
More informationFraud detection in newly opened accounts. Connecting data helps predict identity theft
Fraud detection in newly opened accounts Connecting data helps predict identity theft Executive summary Fraud continues to be a genuine threat and challenge. After a sharp and unexplained drop in identity
More informationWhite Paper. The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy. October 2008
> White Paper The Data Matching Game: Enabling Customer Data Integration and Protecting Consumer Privacy October 2008 Table of Contents Introduction..............................................1 What
More informationone admin. one tool. Providing instant access to hundreds of industry leading verification tools.
2 7 12 14 11 15 8 16 10 41 40 42 19 49 45 44 50 48 47 51 46 52 53 55 54 56 57 67 68 1 5 39 43 58 71 81 82 69 70 88 25 29 23 26 22 3 21 28 4 6 32 30 38 33 31 37 34 35 36 63 59 64 60 62 61 65 72 73 66 74
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious
More informationMeeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions
Leveraging Risk & Compliance for Strategic Advantage IBM Information Management software Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions XXX Astute financial services
More informationDeterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.
Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints
More informationProfitably Managing Risk in Your Credit Portfolio
Profitably Managing Risk in Your Credit Portfolio An Equifax White Paper February 2007 Author: Richard Becker Assistant Vice President, Product Development Equifax Inc. As Acquisition Marketing Cools Off,
More informationUnderstanding and Combating Online Fraud in 2014
Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.
More informationCard Not Present Fraud Webinar Transcript
Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share
More informationFraud Solution for Financial Services
Fraud Solution for Financial Services Transforming Fraud Detection and Prevention in Banks and Financial Services In the digital age, the implications of financial crime against banks and other financial
More informationImprove Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps. An IDology, Inc. Whitepaper
Improve Your Call Center Performance 7 Ways A Dynamic KBA Solution Helps An IDology, Inc. Whitepaper Delivering a pleasant consumer experience on the phone is a make or break opportunity for creating positive
More information1 Billion Individual records that were hacked in 2014 3.
783 Major data breaches in 204 up 27% from 203 2. Billion Individual records that were hacked in 204 3. 3 Fraud has changed The way we live and manage our finances today has changed radically from just
More informationAn Oracle White Paper October 2009. An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions
An Oracle White Paper October 2009 An Integrated Approach to Fighting Financial Crime: Leveraging Investments in AML and Fraud Solutions Executive Overview Today s complex financial crime schemes pose
More informationWHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
WHITE PAPER Internet Gambling Sites Expose Fraud Rings and Stop Repeat Offenders with Device Reputation Table of Contents Confident Casinos: How to stop fraud before it starts 1 Organized Fraud: A Growing
More informationWhite Paper. Hidden red flags? Or hidden green? With new 360 data, you can more easily see your new customer s true colors
White Paper Hidden red flags? Or hidden green? With new 360 data, you can more easily see your new customer s true colors Brad Jones Vice President, Retail Banking Solutions Leader Equifax Inc. brad.jones@equifax.com
More informationA strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
More informationIdentity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals.
White Paper An Overview of Complementary Approaches Identity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals. February 2010 Risk Solutions Financial Services Introduction
More informationProtecting Online Gaming and e-commerce Companies from Fraud
Protecting Online Gaming and e-commerce Companies from Fraud White Paper July 2007 Protecting Online Gaming and e-commerce Companies from Fraud Overview In theory, conducting business online can be efficient
More informationBest Practices in Account Takeover
WHITEPAPER Best Practices in Account Takeover July 2013 2 Table of Contents Introduction 3 Account Takeover is Painful 4 Differences between Account Takeover and Account Compromise 4 Why Account Compromise
More informationUtilizing Credit Scoring to Predict Patient Outcomes. An Equifax Predictive Sciences Research Paper September 2005
Utilizing Credit Scoring to Predict Patient Outcomes An Equifax Predictive Sciences Research Paper September 2005 Introduction Improving Your Revenue Cycle Performance Through Financial Management Solutions
More informationProtect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
More informationAn effective approach to preventing application fraud. Experian Fraud Analytics
An effective approach to preventing application fraud Experian Fraud Analytics The growing threat of application fraud Fraud attacks are increasing across the world Application fraud is a rapidly growing
More informationIdentity Theft Repair Kit
Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact
More informationI See Fraud Rings. by Dr. Stephen Coggeshall Chief Analytics and Science Officer. November 2012 WHITEPAPER
WHITEPAPER I See Fraud Rings by Dr. Stephen Coggeshall Chief Analytics and Science Officer November 2012 2 Table of Contents Introduction 3 What is Identity Fraud? 4 Types of Identity Fraud 4 What is an
More informationWhy Data Security is Critical to Your Brand
Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait
More informationIDENTITY THEFT PREVENTION PROGRAM OVERVIEW
AUTOMOTIVE IDENTITY THEFT PREVENTION PROGRAM OVERVIEW What is the Red Flag Ruling? The Red Flag Ruling requires automotive dealerships to implement policies and procedures to prevent fraud due to identity
More informationWHITE PAPER Fighting Banking Fraud Without Driving Away Customers
WHITE PAPER Fighting Banking Fraud Without Driving Away Customers Effective Methods for Targeting Cybercrime in Financial Services Table of Contents Introduction 1 Stopping Fraud: One Goal Among Many 2
More informationCREDIT SCORE USER GUIDE
Page 1 of 11 ABOUT EQUIFAX Equifax empowers businesses and consumers with information they can trust. A global leader in information solutions, we leverage one of the largest sources of consumer and commercial
More informationSAS. Fraud Management. Overview. Real-time scoring of all transactions for fast, accurate fraud detection. Challenges PRODUCT BRIEF
PRODUCT BRIEF SAS Fraud Management Real-time scoring of all transactions for fast, accurate fraud detection Overview Organizations around the globe lose approximately 5 percent of annual revenues to fraud,
More informationIDENTITY THEFT FRAUD
FRAUD ALERT! SYNTHETIC IDENTITY THEFT FRAUD & n How to Protect Yourself n Data Breaches and You n Free Credit Reports SYNTHETIC IDENTITY THEFT and FRAUD It is hardly news that identity thieves and cybercriminals
More informationMortgage Services > Today s mortgage lenders are faced with. constant challenges Equifax can help. CONSUMER INFORMATION SOLUTIONS
CONSUMER INFORMATION SOLUTIONS Mortgage Services > Today s mortgage lenders are faced with constant challenges Equifax can help. From quick access to tri-merge reports to independent third-party appraisals,
More informationFight identity-theft tax fraud with integrated layers of authentication
WHITE PAPER Fight identity-theft tax fraud with integrated layers of authentication Jeffrey Huth Vice President, Product Strategy TransUnion Government Information Solutions Executive summary Identity-theft
More informationHoliday Fraud Myths. How They Leave Retailers Vulnerable
Holiday Fraud Myths How They Leave Retailers Vulnerable Table of Contents 03 04 06 08 10 12 14 Introduction Myth #1 Digital Gift Cards Myth #2 Distance, Dollar and Expedite Myth #3 Machine vs. Manual Review
More informationStopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
More informationA CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud
A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts
More informationReclaiming your identity
Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist
More informationNow is the time for a fresh approach to detecting fraud
Now is the time for a fresh approach to detecting fraud Learn where today s fraud detection falls short and what you can do about it. Read on. Table of Contents Now is the time for a fresh approach to
More informationACI Response to FFIEC Guidance
ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention
More informationTop 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
More informationWhite Paper. Real-time Credit Marketing at the Point-of-Sale. Why Real-time Prescreen-of-One Should Get a Bigger Share of Your Marketing Budget
> White Paper Real-time Credit Marketing at the Point-of-Sale Why Real-time Prescreen-of-One Should Get a Bigger Share of Your Marketing Budget Andrew Skillen October 2008 Table of Contents Introduction..............................................1
More informationWHITE PAPER Moving Beyond the FFIEC Guidelines
WHITE PAPER Moving Beyond the FFIEC Guidelines How Device Reputation Offers Protection Against Future Security Threats Table of Contents Introduction 1 The FFIEC Guidelines 2 Why Move Beyond Complex Device
More informationUsing Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty
Using Real Time Interactive Notifications to Effectively Fight Fraud, Accelerate Resolution and Increase Customer Loyalty Conducted by Javelin Strategy & Research June 2010 All Rights Reserved Rising Fraud
More informationThe State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology
The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies
More informationRSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
More informationHow child identity theft happens.
How child identity theft happens. Facts you should know about identity theft. What is identity theft? Identity theft is the act of using someone s personal information such as an account number, driver
More informationChild Identity Fraud - Current Trends and Advantages
WHITEPAPER 2011 Child Identity Fraud Study July 2011 2 Table of Contents Introduction 3 Key Findings 3 Background on Child Identity Fraud 4 Research on Child Identity Fraud 4 Description of the Consumer
More informationInformation to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
More informationhttp://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available
More informationBenefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS
FACT SHEET LIFELOCK ULTIMATE PLUS Your bank accounts and credit are a gold mine for identity thieves. LifeLock Ultimate Plus service gives you some peace of mind knowing you have LifeLock s most comprehensive
More informationThree proven methods to achieve a higher ROI from data mining
IBM SPSS Modeler Three proven methods to achieve a higher ROI from data mining Take your business results to the next level Highlights: Incorporate additional types of data in your predictive models By
More informationData Management Services > Master data management: a critical cornerstone
COMMERCIAL INFORMATION SOLUTIONS Data Management Services > Master data management: a critical cornerstone in the success of your business By cleansing and enriching your customer, supplier and employee
More informationHow the Past Changes the Future of Fraud
How the Past Changes the Future of Fraud Addressing payment card fraud with models that evaluate multiple risk dimensions through intelligence Card fraud costs the U.S. card payments industry an estimated
More informationID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N
ID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N M i c h e l l e C u m m i n g s, C I A, C F E, C D F M According to the National Crime Victimization
More informationIDENTITY THEFT VICTIMS: IMMEDIATE STEPS
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of
More informationVulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
More informationInformation Protection
Information Protection Security is Priority One InfoArmor solutions are created to be SSAE 16, ISO 27001 and DISA STIG compliant, requiring adherence to rigorous data storage practices. We not only passed
More informationFighting Online Fraud
White Paper Fighting Online Fraud Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant
More informationRecognize the many faces of fraud
Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and
More informationWRITTEN TESTIMONY OF JOHN A
WRITTEN TESTIMONY OF JOHN A. KOSKINEN COMMISSIONER INTERNAL REVENUE SERVICE BEFORE THE SENATE FINANCE COMMITTEE ON UNAUTHORIZED ATTEMPTS TO ACCESS TAXPAYER DATA JUNE 2, 2015 Chairman Hatch, Ranking Member
More informationFRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper
FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper In the UK, Europe s largest online market, consumers continue to embrace m-commerce at an astonishing speed with an estimated
More informationKey Factors for Payers in Fraud and Abuse Prevention. Protect against fraud and abuse with a multi-layered approach to claims management.
White Paper Protect against fraud and abuse with a multi-layered approach to claims management. October 2012 Whether an act is technically labeled health insurance fraud or health insurance abuse, the
More informationHOME DEPOT DATA BREACH
HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data
More informationHow To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
More informationIdentity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
More informationIdentity Theft. Emergency Repair Kit
Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair
More informationINTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
More informationIdentity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation
Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation June 2009 Cairo, Egypt Joanna P. Crane Identity Theft Program Manager Senior Attorney The views
More informationThe Predictive Fraud and Abuse Analytic and Risk Management System
The Predictive Fraud and Abuse Analytic and Risk Management System Empowering healthcare payers and stakeholders in preventing and recovering fraudulent healthcare payments IkaIntegrity : Your real-time
More informationThe In-Depth Guide to Fraud Prevention in International E-commerce
The In-Depth Guide to Fraud Prevention in International E-commerce The Evolution of Fraud Cyberattacks are not a new threat, yet the rise in high-profile hacking cases has merchants rightfully concerned
More informationIDENTITY THEFT RESOURCE KIT
IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What
More informationHOW ARE BANKS FIGHTING THE WAR ON FRAUD? To answer that question, Neustar asked the industry.
HOW ARE BANKS FIGHTING THE WAR ON FRAUD? To answer that question, Neustar asked the industry. CONTENTS First, how do you define banking fraud? 2 Banks are fighting fraud on many different fronts. 3 Who
More informationYour Employees May Be Under Attack From Cybercriminals
LifeLock ebook: Your Employees May Be Under Attack From Cybercriminals Keep Employees Productive at Work with Identity Theft Protection 0010 IDENTITY 001010011 CREDIT CARD 11010100101110 SOCIAL SECURITY
More informationEVERY TWO SECONDS. The Financial Institution s Guide to Protecting Customers from Identity Crimes
EVERY TWO SECONDS The Financial Institution s Guide to Protecting Customers from Identity Crimes Don t lose your customers to identity crimes. Every 2 seconds, an identity fraud occurs in the United States.*
More informationStatement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the
Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005
More informationKnowledge Based Authentication [KBA] is not just for onboarding new customers
White Paper The Role of Knowledge Based Authentication (KBA) In Identity Proofing Knowledge Based Authentication [KBA] is not just for onboarding new customers December 2013 Risk Solutions Best Practices
More informationPreventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations
Preventing Healthcare Fraud through Predictive Modeling Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services Project initiated: July 2012 Project
More informationThe Long Con: An Analysis of Synthetic Identities
WHITEPAPER The Long Con: An Analysis of Synthetic Identities October 2014 2 Table of Contents Introduction 3 Defining Synthetic Identities 4 Differentiating Synthetic Identity Fraud 5 Synthetic Fraud and
More informationIdentity Theft Repair Kit
Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact
More informationMCPHS IDENTITY THEFT POLICY
SECTION 1: BACKGROUND MCPHS IDENTITY THEFT POLICY The risk to the College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only
More informationRed Flags Hidden Issues that Threaten Dealer Profitability. To hear the audio portion of this Webinar, dial: 1.866.501.3430
Red Flags Hidden Issues that Threaten Dealer Profitability To hear the audio portion of this Webinar, dial: 1.866.501.3430 Randy Henrick Associate General Counsel DealerTrack, Inc. To hear the audio portion
More informationIntercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
More informationWhite paper. Biometrics and the mitigation of card-related fraud
White paper Biometrics and the mitigation of card-related fraud The Aadhaar scheme, primarily envisaged to provide every resident proof of identity, holds a great deal of promise for other applications
More informationFighting Identity Theft with the Red Flags Rule: A How-To Guide for Business
Federal Trade Commission BCP Business Center business.ftc.gov Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business An estimated nine million Americans have their identities stolen
More informationCREDIT REPORT USER GUIDE
Page 1 of 17 ABOUT EQUIFAX CREDIT REPORT USER GUIDE Equifax Canada Inc. Box 190 Jean Talon Station Montreal, Quebec H1S 2Z2 Equifax empowers businesses and consumers with information they can trust. A
More information