Public Sector
Voter registration lists are the backbone of our democratic process. However, maintaining accurate and up-to-date lists is a challenge that election agencies constantly face. With several regulations related to voting and election integrity that have been enacted or proposed in the last two years, maintaining a quality voter list is more important now than ever before. Election officials now have a powerful tool at their disposal: commercially available data to enhance voter list maintenance and boost voter confidence. The importance of maintaining voter lists Audit teams within election agencies are tasked with ensuring election integrity through voter list maintenance. These teams need reliable tools to: Verify and correct voter registration data Identify and update contact information Provide a cost-effective method for record updates Reduce election costs for taxpayers Success stories in voter list management Case study: West Virginia Secretary of State The West Virginia Secretary of State (WVSOS) uses Experian’s TrueTrace™ solution to enhance voter roll maintenance. Traditionally a skip-tracing solution for debt collectors, TrueTrace leverages unique data sources to ensure voters receive correct information, reducing wasted resources and improving election efficiency. WVSOS was challenged with enhancing their existing processes to a more robust 50-state comparison for cross-state movers. After WVSOS’s first data pull using TrueTrace, nearly 16,000 individuals were identified with a potential new "best" address that were also not flagged by other data comparison programs used by the state. The results? Of the almost 16,000 mailings sent, about 25% returned were undeliverable, confirming those individuals had moved. Access the full case study to discover best practices for maintaining voter rolls and conducting cost-effective elections. Webinar: El Paso County Clerk & Recorder's Office The El Paso County Clerk & Recorder’s Office was looking to bring transparency, efficiency, and increased voter confidence to the elections in El Paso County, Texas. To achieve this, they required verified enriched data for registered voters. By partnering with Experian, voter data was enriched using our TrueTrace solution. This partnership has enabled the Office to verify and append the most up-to-date voter address, leading to significant improvements in list maintenance. To date, the El Paso County Clerk & Recorder’s Office has seen a reduction of more than $39,860 in undeliverable ballot costs. Their ROI to date is a positive $4,537 back to the citizens of El Paso County. Listen to our on-demand webinar to hear more about this collaboration. Visit us online to learn more about our public sector solutions. Learn more
This series will dive into our monthly State of the Economy report, providing a snapshot of the top monthly economic and credit data for those in financial services to proactively shape their business strategies. As we near the end of the first quarter, the U.S. economy has maintained its solid standing. We're also starting to see some easing in a few areas. This month saw a slight uptick in unemployment, slowed spending growth, and a slight increase in annual headline inflation. At the same time, job creation was robust, incomes continued to grow, and annual core inflation cooled. In light of the mixed economic landscape, this month’s upcoming Federal Reserve meeting and their refreshed Summary of Economic Projections should shine some light on what’s in store in the coming months. Data highlights from this month’s report include: Annual headline inflation increased from 3.1% to 3.2%, while annual core inflation cooled from 3.9% to 3.8%. Job creation remained solid, with 275,000 jobs added this month. Unemployment increased to 3.9% from 3.7% three months prior. Mortgage delinquencies rose for accounts (2.3%) and balances (1.8%) in February, contributing to overall delinquencies across product types. Check out our report for a deep dive into the rest of March’s data, including consumer spending, the housing market, and originations. To have a holistic view of our current environment, we must understand our economic past, present, and future. Check out our annual chartbook for a comprehensive view of the past year and download our latest forecasting report for a look at the year ahead. Download March's State of the Economy report Download latest forecast For more economic trends and market insights, visit Experian Edge.
This series will dive into our monthly State of the Economy report, providing a snapshot of the top monthly economic and credit data for those in financial services to proactively shape their business strategies. In February, economic growth and job creation outperformed economists’ expectations, likely giving confirmation to the Federal Reserve that it remains too early to begin cutting rates. Data highlights from this month’s report include: U.S. real GDP rose 3.3% in Q4 2023, driven by consumer spending and bringing the average annual 2023 growth to 2.5%, the same as the five-year average growth prior to the pandemic. The labor market maintained its strength, with 353,000 jobs added this month and unemployment holding at 3.7% for the third month in a row. Consumer sentiment rose 13% in January, following a 14% increase in December, as consumers are feeling some relief from cooling inflation. Check out our report for a deep dive into the rest of February’s data, including inflation, the latest Federal Reserve announcement, the housing market, and credit card balances. To have a holistic view of our current environment, we must understand our economic past, present, and future. Check out our annual chartbook for a comprehensive view of the past year and register for our upcoming Macroeconomic Forecasting webinar for a look at the year ahead. Download report Register for webinar For more economic trends and market insights, visit Experian Edge.
This article was updated on November 9, 2023. Fraud – it’s a word that comes up in conversations across every industry. While there’s a general awareness that fraud is on the rise and is constantly evolving, for many the full impact of fraud is misunderstood and underestimated. At the heart of this challenge is the tendency to lump different types of fraud together into one big problem, and then look for a single solution that addresses it. It’s as if we’re trying to figure out how to un-bake a terrible cake instead of thinking about the ingredients and the process needed to put them together in the first place. This is the first of a series of articles in which we’ll look at some of the key ingredients that create different types of fraud, including first party, third party, synthetic identity, and account takeover. We’ll talk about why they’re unique and why we need to approach each one differently. At the end of the series, we’ll get a result that’s easier to digest. I had second thoughts about the cake metaphor, but in truth it really works. Creating a good fraud risk management process is a lot like baking. We need to know the ingredients and some tried-and-true methods to get the best result. With that foundation in place, we can look for ways to improve the outcome every time. Let’s start with a look at the best known type of fraud, third party. What is third-party fraud? Third-party fraud – generally known as identity theft – occurs when a malicious actor uses another person’s identifying information to open new accounts without the knowledge of the individual whose information is being used. When you consider first-party vs third-party fraud, or synthetic identity fraud, third-party stands out because it involves an identifiable victim that’s willing to collaborate in the investigation and resolution, for the simple reason that they don’t want to be responsible for the obligation made under their name. Third-party fraud is often the only type of activity that’s classified as fraud by financial institutions. The presence of an identifiable victim creates a high level of certainty that fraud has indeed occurred. That certainty enables financial institutions to properly categorize the losses. Since there is a victim associated with it, third party fraud tends to have a shorter lifespan than other types. When victims become aware of what’s happening, they generally take steps to protect themselves and intervene where they know their identity has been potentially misused. As a result, the timeline for third-party fraud is shorter, with fraudsters acting quickly to maximize the funds they’re able to amass before busting out. How does third-party fraud impact me? As the digital transformation continues, more and more personally identifiable information (PII) is available on the dark web due to data breaches and phishing scams. Given that consumer spending is expected to increase1, we anticipate that the amount of PII readily available to criminals will only continue to grow. All of this will lead to identity theft and increase the risk of third-party fraud. More than $43 billion in total losses was reported due to identity theft and fraud in the U.S. in 2022.2 Solving the third-party fraud problem We’ve examined one part of the fraud problem, and it is a complex one. With Experian as your partner, solving for it isn’t. Continuing my cake metaphor, by following the right steps and including the right ingredients, businesses can detect and prevent fraud. Third-party fraud detection and prevention involves two distinct steps. Analytics: Driven by extensive data that captures the ways in which people present their identity—plus artificial intelligence and machine learning—good analytics can detect inconsistencies, and patterns of usage that are out of character for the person, or similar to past instances of known fraud. Verification: The advantage of dealing with third-party fraud is the availability of a victim that will confirm when fraud is happening. The verification step refers to the process of making contact with the identity owner to obtain that confirmation and may involve identity resolution. It does require some thought and discipline to make sure that the contact information used leads to the identity owner—and not to the fraudster. In a series of articles, we’ll be exploring first-party fraud, synthetic identity fraud, and account takeover fraud and how a layered fraud management solution can help keep your business and customers safe and manage third-party fraud detection, first-party fraud, synthetic identity fraud, and account takeover fraud prevention. Let us know if you’d like to learn more about how Experian is using our identity expertise, data, and analytics to create robust fraud prevention solutions. Contact us 1 Experian Ascend Sandbox 2 2023 U.S. Identity and Fraud Report, Experian.
As the sophistication of fraudulent schemes increases, so must the sophistication of your fraud detection analytics. This is especially important in an uncertain economic environment that breeds opportunities for fraud. It's no longer enough to rely on old techniques that worked in the past. Instead, you need to be plugged into machine learning, artificial intelligence (AI) and real-time monitoring to stay ahead of criminal attempts. Your customers have come to expect cutting-edge security, and fraud analytics is the best way to meet — and surpass — those expectations. Leveraging these analytics can help your business better understand fraud techniques, uncover hidden insights and make more strategic decisions. What is fraud analytics? Fraud analytics refers to the idea of preventing fraud through sophisticated data analysis that utilizes tools like machine learning, data mining and predictive AI.1 These services can analyze patterns and monitor for anomalies that signal fraud attempts.2 While at first glance this may sound like a lot of work, it's necessary in today's technologically savvy culture. Fraud attempts are becoming more sophisticated, and your fraud detection services must do the same to keep up. Why is fraud analytics so important? According to the Experian® 2023 US Identity and Fraud Report, fraud is a growing issue that businesses cannot ignore, especially in an environment where economic uncertainty provides a breeding ground for fraudsters. Last year alone, consumers lost $8.8 billion — an increase of 30 percent over the previous year. Understandably, nearly two-thirds of consumers are at least somewhat concerned about online security. Their worries range from authorized push payment scams (such as phishing emails) to online privacy, identity theft and stolen credit cards. Unfortunately, while 75 percent of surveyed businesses feel confident in protecting against fraud, only 45 percent understand how fraud impacts their business. There's a lot of unearned confidence out there that can leave businesses vulnerable to attack, especially with nearly 70 percent of businesses admitting an increase in fraud loss in recent years. The types of fraud that businesses most frequently encounter include: Authorized push payment fraud: Phishing emails and other schemes that persuade consumers to deposit funds into fraudulent accounts. Transactional payment fraud: When fraudulent actors steal credit card or bank account information, for example, to make unauthorized payments. Account takeover: When a fraudster gains access to an account that doesn't belong to them and changes login details to make unauthorized transactions. First-party fraud: When an account holder uses their own account to commit fraud, like misrepresenting their income to get a lower loan rate. Identity theft: Any time a person's private information is used to steal their identity. Synthetic identity theft: When someone combines real and fake personal data to create an identity that's used to commit fraud. How can fraud analytics be used to help your business? More than 85% of consumers expect businesses to respond to their security and fraud concerns. A good portion of them (67 percent) are even ready to share their personal data with trusted sources to help make that happen. This means that investing in risk and fraud analytics is not only vital for keeping your business and customer data secure, but it will score points with your consumers as well. So how can your business utilize fraud analytics? Machine learning is a great place to start. Rather than relying on outdated rules-based analytic models, machine learning can vastly increase your speed in identifying fraud attempts. This means that when a new fraudulent trend emerges, your machine learning software can pinpoint it fast and flag your security team. Machine learning also lets you automatically analyze large data sets across your entire customer portfolio, improving customer experiences and your response time. In general, the best way for your business to use fraud analytics is by utilizing a multi-layered approach, such as the robust fraud management solutions offered by Experian. Instead of a one-size-fits-all solution, Experian lets you customize a framework of physical and digital data security that matches your business needs. This framework includes a cloud-based platform, machine learning for streamlined data analytics, biometrics and other robust identity-authentication tools, real-time alerts and end-to-end integration. How Experian can help Experian's platform of fraud prevention solutions and advanced data analytics allows you to be at the forefront of fraud detection. The platform includes options such as: Account takeover prevention. Account takeovers can go unnoticed without strong fraud detection. Experian's account takeover prevention tools automatically flag and monitor unusual activities, increase efficiency and can be quickly modified to adapt to the latest technologies. Bust-out fraud prevention. Experian utilizes proactive monitoring and early detection via machine learning to prevent bust-out fraud. Access to premium credit data helps enhance detection. Commercial entity fraud prevention. Experian's Sentinel fraud solutions blend consumer and business datasets to create predictive insights on business legitimacy and credit abuse likelihood. First-party fraud prevention. Experian's first-party fraud prevention tools review millions of transactions to detect patterns, using machine learning to monitor credit data and observations. Global data breach protection. Experian also offers data breach protection services, helping you use turnkey solutions to build a program of customer notifications and identity protection. Identity protection. Experian offers identity protection tools that deliver a consistent brand experience across touchpoints and devices. Risk-based authentication. Minimize risk with Experian's adaptive risk-based authentication tools. These tools use front- and back-end authentication to optimize cost, risk management and customer experience. Synthetic identity fraud protection. Synthetic identity fraud protection guards against the fastest-growing financial crimes. Automated detection rules evaluate behavior and isolate traits to reduce false positives. Third-party fraud prevention. Experian utilizes third-party prevention analytics to identify potential identity theft and keep your customers secure. Your business's fraud analytics system needs to increase in sophistication faster than fraudsters are fine-tuning their own approaches. Experian's robust analytics solutions utilize extensive consumer and commercial data that can be customized to your business's unique security needs. Experian can help secure your business from fraud Experian is committed to helping you optimize your fraud analytics. Find out today how our fraud management solutions can help you. Learn more 1 Pressley, J.P. "Why Banks Are Using Advanced Analytics for Faster Fraud Detection," BizTech, July 25, 2023. https://biztechmagazine.com/article/2023/07/why-banks-are-using-advanced-analytics-faster-fraud-detection 2 Coe, Martin and Melton, Olivia. "Fraud Basics," Fraud Magazine, March/April 2022. https://www.fraud-magazine.com/article.aspx?id=4295017143
With an ever-present need for efficiency, security, and seamless citizen services, many agencies are looking at the benefits of a data-driven government. Last year, the federal government kicked off a unified effort to enable data-driven decision making. The goal at that level – and across all agencies – is to serve citizens more efficiently and effectively. By embracing the power of data and analytics, agencies of all sizes can set themselves up to better serve their citizens. What is a data-driven government? Agencies collect citizen data from a variety of service-based sources, including the Postal Service, Census Bureau, social welfare departments, and agencies that issue government IDs. When properly leveraged, this data holds many possibilities. However, many agencies face challenges when it comes to efficient collection, sharing, usage, integrity, and accessibility. Due to the amount of data collected and the potential lack of consistency in the collection and storage techniques, the data may not be usable. Without proper management and analysis, there’s little government agencies can do with their data to improve their processes. A data-driven government has well-managed data and uses that data to drive their decisions as they relate to citizen requests for benefits, tax collection, elections, and more. What are the benefits of data-driven decision making? Data management and government data analytics enable agencies to react quickly to citizen demands and concerns and proactively anticipate an issue before it becomes a crisis. With the right tools, agencies can gain a holistic view of their citizens, communicate effectively internally, provide digitally-driven services and improve overall efficiency through government-wide data integration and management. These changes have a wide range of benefits, including reduction of cost, fraud, waste and abuse, the automation of manual processes, and better service delivery. Why is a data-driven strategy required? In addition to the benefits listed above, a data-driven strategy also helps agencies align with published NIST guidelines and the need to monitor, evaluate, and maintain digital identity systems. Proper use of data-driven digital identity strategies will enhance equity and the usability of the solutions agencies provide to their citizens. Building an effective data-driven strategy The right strategy starts with ensuring that all departments about the need for proper data management and analytics and the guidelines that will govern it, such as maintaining up-to-date data, removing silos, and leveraging the right tools. The next step is finding the right partner. An effective partner can help agencies develop and maintain data management systems and implement the right tools and analytics – things like machine learning in government – to help each agency function efficiently and safeguard the data of its citizens. To learn how Experian can help your agency improve its use of data, visit us or request a call. Visit us
In previous posts, I’ve explored the potential ramifications of the end of the Public Health Emergency (PHE) and how it will impact agency plans such as Medicaid eligibility redeterminations. Many states may have already prepared a risk-based approach to address the unwinding process. States need to balance these plans with onboarding new applicants and maintaining the service levels required by the Centers for Medicare & Medicaid Services (CMS). Regardless of the approach, states should look for efficiency in all aspects of the redeterminations process, including aligning pending work with other program recertifications and maximizing the use of available information and tools. What does the end of the PHE mean for state agencies? From the end of the PHE, state agencies will have 12 months to initiate all citizen eligibility renewals and a total of 14 months to complete them. States may begin the unwinding process 60 days prior to the month in which the PHE ends. Many states have already begun Medicaid eligibility redeterminations in an effort to meet this deadline. CMS has provided extensive guidance in their Planning for Resumption document, which state agencies can refer to for full details. Building a proper redeterminations plan Redeterminations plans should verify citizen information with all available information, including residency, age, income, and deceased status. These plans should also support the assessment of identity risk and have the ability to ensure continuous outreach with accurate mailing addresses, phone numbers for calls and texts, email addresses, and assessments of returned mail. CMS guidance encourages states to verify eligibility requirements by mail, email, and other communications channels while minimizing the amount of time and documentation required of beneficiaries. The benefit of standing up this structure? More effective day-forward solutions that can help agencies assess any new and ongoing benefits requests and maintain accurate eligibility lists. How can Experian help? Experian® has a range of products designed to help organizations verify contact information, such as phone numbers and mailing addresses, as well as income and employment. Our exclusive income and employment data can be leveraged incrementally in non-automated verification methods so that individuals not found by other services can be processed quickly via batch processing — minimizing any impact to beneficiaries while improving overall program performance. Our address verification tools provide improved outreach to beneficiaries with the best and most accurate mailing addresses, leveraging the National Change of Address (NCOA) database, as well as phone number information. The phone number information includes a mobile phone indicator, enabling text message outreach. Additionally, Experian can provide email address provisioning to verify or provide email addresses, which creates another path for contact. All of this helps agencies develop better redeterminations plans to manage the end of the PHE, and better process future benefits requests. To learn more about how we can help, visit us or request a call.
What Is Identity Proofing? Identity proofing, authentication and management are becoming increasingly complex and essential aspects of running a successful enterprise. Organizations need to get identity right if they want to comply with regulatory requirements and combat fraud. It's also becoming table stakes for making your customers feel safe and recognized. Nearly 75 percent of consumers expect businesses to protect them online, and 70 percent say it's important for businesses they frequently deal with to identify them across visits.1 Identify proofing is the process organizations use to collect, validate and verify information about someone. There are two goals — to confirm that the identity is real (i.e., it's not a synthetic identity) and to confirm that the person presenting the identity is its true owner. The identity proofing process also relates to and may overlap with other aspects of identity management. Identity proofing vs identity authentication Identity proofing generally takes place during the acquisition or origination stages of the customer lifecycle — before someone creates an account or signs up for a service. Identity authentication is the ongoing process of re-checking someone's identity or verifying that they have the authorization to make a request, such as when they're logging into an account or trying to make a large transaction. READ: Leveraging Artificial Intelligence to Optimize Digital Identity Strategies How does identity proofing work? The National Institute of Standards and Technology (NIST) Special Publication 800-63-3, Digital Identity Guidelines, has an overview of the three stages of the identity proofing process: Resolution: The goal of the first step is to accurately identify the single, unique individual that the identity represents. Resolution is relatively easy when detailed identity information is provided. In the real world, collecting detailed data conflicts with the need to provide a good customer experience. Resolution still has to occur, but organizations have to resolve identities with the minimum amount of information. Validation: The validation step involves verifying that the person's information and documentation are legitimate, accurate and up to date. It potentially involves requesting additional evidence based on the level of assurance you need. Verification: The final step confirms that the claimed identity actually belongs to the person submitting the information. It may involve comparing physical documents or biometric data and liveness tests, such as a comparison of the driver's license to a selfie that the person uploads. The NIST guidelines are the standards that federal agencies must follow for their digital identity services, and industry often uses the same guidelines as a framework for their identity and access processes. The current NIST guidelines — Revision 3 — were updated in 2017 and have three identity assurance levels (or IALs). IAL 1: Doesn't require identity proofing to create an account. For example, you may be able to sign up for an online game or newsletter without submitting any identification. IAL 2: Requires users to submit identifying information and evidence either in-person or remotely. For example, when you need to upload a picture of your driver's license and a selfie to create an account or confirm a transaction. It also requires address confirmation and may include (but doesn't require) biometric checks, such as a fingerprint or face scan. IAL 3: Requires in-person or supervised remote identity verification, address verification and biometric checks. There is a proposal to update the NIST guidelines, and the NIST is requesting comments on the proposed Revision 4 through March 24, 2023. The updates aim to advance equity, give consumers additional choices, deter fraud and build on the lessons learned from previous revisions and real-world implementation. It also has four identity assurance levels, starting with IAL0, which is when there's no requirement for identity proofing. Service providers that offer identity proofing, verification and management services can get certified if they conform to the current NIST guidelines. For example, Experian's identity proofing solutions are NIST 800-63-3 IAL2 certified by Kantara Initiative. Building an effective identity proofing strategy By requiring identity proofing before account opening, organizations can help detect and deter identity fraud and other crimes. And although the NIST offers guidelines, you can use different online identity verification methods to implement an effective digital identity proofing and management system. These may include: Document verification plus biometric data: The consumer uploads a copy of an identification document, such as a driver's license, and takes a selfie or records a live video of their face. Database validations: The proofing solution verifies the shared identifying information, such as a name, date of birth, address and Social Security number against trusted databases, including credit bureau and government agency data. Knowledge-based authentication (KBA): The consumer answers knowledge-based questions, such as account information, to confirm their identity. It can be a helpful additional step, but they offer a low level of assurance, partially because data breaches have exposed many people's personal information. In part, the processes you'll use may depend on business policies, associated risks and industry regulations, such as know your customer (KYC) and anti-money laundering (AML) requirements. But organizations also have to balance security and ease of use. Each additional check or requirement you add to the identity proofing flow can help detect and prevent fraud, but the added friction they bring to your onboarding process can also leave customers frustrated — and even lead to customers abandoning the process altogether. WATCH: Webinar: Identity Evolved — Building consumer trust and engagement Finding the right amount of friction can require a layered, risk-based approach. And running different checks during identity proofing can help you gauge the risk involved. For example, comparing information about a device, such as its location and IP address, to the information on an application. Or sending a one-time password (OTP) to a mobile device and checking whether the phone number is registered to the applicant's name. With the proper systems in place, you can use high-risk signals to dynamically adjust the proofing flow and require additional identity documents and checks. At the same time, if you already have a high level of assurance about the person's identity, you can allow them to quickly move through a low-friction flow. Experian goes beyond identity proofing Experian builds on its decades of experience with identity management and access to multidimensional data sources to help organizations onboard, authenticate and manage customer identities. With a single API integration, Experian CrossCore® gives you access to a suite of identity proofing and fraud detection capabilities, including identity element verifications, risk analytics, device intelligence, document validation and biometrics. CrossCore Doc Capture offers end-to-end support for document and selfie verification, and you can use step-up OTP or KBV checks when appropriate. Learn more
The economic volatility of the last several years has left local, state, and even federal budgets tighter than usual, meaning agencies must collect every dollar owed and do it efficiently. So how do agencies continue to deliver the services citizens expect and have given their tax dollars to support? It starts with an efficient, effective collections strategy. The need for collections An important source of revenue for many government agencies is overdue obligations. These might include: Business, personal, and property taxesChild supportFinesCourt fees By collecting on these obligations – and doing so efficiently – agencies can better fund themselves to serve their citizens. Debt collections process While many agencies are, at least initially, responsible for their debt management efforts, there are many layers to the collections process. Step 1: The agency manages the collections process independently (manually or automatically). Step 2: The Bureau of Fiscal Service takes over servicing delinquent debts and work with the debtor to pay it, suspend it, or end collections efforts. Step 3: The debt may be sent to a Private Collection Agency (PCA). Better collections with better data To collect effectively, agencies need to prioritize and streamline debt assessment and collection, which starts with better data. First, better data – like the data provided via skip tracing – enables better management of data surrounding moves, name changes, changes in marital status, and more, all of which makes for better collections efforts. Second is prioritizing collections efforts to focus on those citizens with the best ability to repay, making the most of existing resources and leveraging automated tools where available. Third is keeping collections efforts compliant with all rules and regulations, which is made easier with the right partner. How Experian can help Experian assists organizations of all shapes and sizes to monitor, segment, and prioritize receivable accounts. We leverage timely and relevant information for greater insight into skip tracing, identify the best times for collections efforts, and monitor, measure, test, and refine strategies to maximize results. To learn more about how Experian can help your agency maximize your collections efforts, visit us or request a call. Learn more
The preference for digital is here to stay, with consumers reporting that they are online 25% more today than a year ago. The explosive growth in remote work and e-commerce results in more transactions, and opportunities for online fraud are occurring. This new reality means that organizations of all types will face more and newer types of fraud risks. External fraud generally results from deceptive activity intended to produce financial gain that is carried out by an individual, a group of people or an entire organization. Fraudsters may prey on any organization or individual, regardless of the size or nature of their activities. The tactics used are becoming increasingly sophisticated, requiring a multilayered defense strategy. Fraud mitigation involves using tools to reduce the frequency or severity of these risks, ultimately protecting the bottom line and the future of the organization. Fraud impacts the bottom line and so much more According to the Federal Trade Commission, consumers reported losing more than $5.8 billion to fraud in 2021, a 70% increase over 2020. Another report places the losses much higher, with credit card fraud alone representing an estimated $9.3 billion. These costs extend beyond the face value of the theft to include fees and interest incurred, fines and legal fees, labor and investigation costs and external recovery expenses. Aside from dollar losses and direct costs, fraud can also pose legal risks that lead to fines and other legal actions and diminish credibility with regulators. Word of deceptive activities can also create risk for the brand and reputation. These factors can, in turn, result in a loss of market confidence, making it difficult to retain clients and engage new business. Leveraging fraud mitigation best practices As the future unfolds, three things are fairly certain: 1) The future is likely to bring more technological advances and, thereby, new ways of working and creating. 2) Fraudsters will continue to look for ways to exploit those opportunities. 3) The future is here, today. Organizations that want to remain competitive in the digital economy should make fraud mitigation and prevention an integral part of their operational strategy. Assess the risk environment While enhancing revenue opportunities, the global digital economy has increased the complexity of risk management. Be aware of situations that require people to enforce fraud risk policies. While informed, experienced people are powerful resources, it is important to automate routine decisions where you can and leverage people on the most challenging cases. It is also critical to consider that not every fraud risk aligns directly to losses. Consider touchpoints where information can be exposed that will later be used to commit fraud. Information that crooks attempt to glean from idle chatter during a customer service call can be a source of unexpected vulnerability. These activities can benefit from greater transparency and automated oversight. Create a tactical plan to prevent and handle fraud Leverage analytics wherever possible to streamline decisions and choose the right level of friction that’s appropriate for the risk, and palatable for good customers. Consumers and small businesses have come to expect a customized and frictionless experience. Employee productivity, and ultimately revenue growth, requires the ability to operate with speed and informed confidence. A viable fraud mitigation strategy should incorporate these goals seamlessly with operational objectives. If not, prevention and mitigation controls may be sidelined to get legitimate business done, creating inroads for fraudsters. Look for a partner who can apply the right friction to situations depending on your risk appetite and use existing data (including your internal data and their own data resources) to better identify individual consumers. This identification process can actually smooth the way for known consumers while providing the right protection against fraudsters and giving consumers who are new to your organization a sense of safety and security when logging in for the first time. It's equally important that everyone in your organization is working together to prevent fraud. Establish and document best practices and controls, beginning with fostering a workplace culture in which fraud mitigation is part of everyone's job. Empower and train all staff to identify and report suspicious activity and ensure they know how to raise concerns. Consider implementing ways to encourage open and swift communication, such as anonymous or confidential reporting channels. Stay vigilant and tap into resources for managing risks It is likely impossible to think of every threat your organization might face. Instead, think of fraud mitigation as an ongoing process to identify and isolate any suspected fraud fast — before the activity can develop into a major threat to the bottom line — and manage any fallout. Incorporating technology and robust data collection can fortify governance best practices. Technology can also help you perform the due diligence faster, ensuring compliance with Know Your Customer (KYC) and other regulations. As necessary, work with risk assessment consultants to get an objective, experienced view. Learn more about fraud mitigation and fraud prevention services. Learn more
Earlier this year, I explored the potential impact of the end of the current Public Health Emergency (PHE). The U.S. federal government has been operating under a PHE for COVID-19 for more than 30 consecutive months since it was initially announced in January 2020. On July 15, 2022, this PHE was renewed for a tenth time. Following this latest extension, the Centers for Medicare & Medicaid Services (CMS) has released a roadmap for the end of the COVID-19 PHE. In a related blog, they reiterate the commitment to provide a 60-day notice prior to the end of the PHE, but urge states and healthcare providers to prepare for the end “as soon as possible.” With these upcoming changes in mind, I wanted to review key areas for providers to consider as they prepare for the end of the PHE. Enrollments continue to increase, putting state budgets at risk From the start of the PHE in February 2020 through April 2022, Medicaid/Children’s Health Insurance Plan (CHIP) enrollment has increased by more than 17M people and this is affecting every state. Nearly half of all states have experienced an increase of more than 25% during this time period, with some experiencing increases of more than 40%. Given an average Medicaid cost to states of more than $8.4K per capita, that translates to an increase of billions of dollars. Once the PHE expires, states will have 12 months to redetermine eligibility for continued enrollment in the program, or risk bearing 100% of the associated cost. Preparing for the end of the PHE To avoid unnecessary expenditures and ensure that citizens are receiving access to the correct services, states will have to conduct a holistic review of their Medicaid rolls to confirm eligibility. In CMS’s guidance for states to prepare for the end of the PHE, they recommend creating an automated process to handle this unprecedented review. With the right partner, agencies can perform redeterminations of their existing registration rolls, and prepare for future services requests. The right solution can allow citizens to easily apply for benefits, triggering the automatic, real-time pull of income and employment information so that the agency can verify eligibility. Experian is a trusted government partner that is ready to assist states with preparing and automating the process for redetermination of benefits. To learn more about how Experian can assist with citizen benefit redetermination and registration efforts, visit us or request a call. Learn more
Across all levels of government, we are seeing a surge in digital modernization — transforming the delivery of traditional services into a contactless, digital environment. Whether it is with the Social Security Administration’s digital modernization effort, the state of California’s Vision 2023, or even at the local level with counties modernizing digital access to records for their citizens. This comes at a time when identity fraud in government services is growing at an alarming rate, with an increase of over 2,900 percent related to government benefits or document fraud in 2020 according to the FTC. A key challenge for any agency planning digital modernization is balancing access with security. This is particularly critical in an environment where over 1 billion records were exposed over a recent five-year span. Given the U.S. population is currently about 330 million, that means each citizen had an average of three breach exposures. Therefore, identity proofing must be a critical part of any agency modernization effort. National Institute of Standards and Technology Special Publication (NIST SP) 800-63 revision 3 lays out a risk assessment to help organizations determine the appropriate level of security to apply based on six areas of impact. However, identity proofing a new citizen through digital channels requires significant friction at levels above Identity Assurance Level 1 (IAL1). The stringent requirement for a biometric match in this standard at IAL2 presents a real challenge to the balance mentioned above, which has led agencies to seek alternatives that both combat the risk of fraud and identity theft and are operationally sound. Experian has been supporting the private sector in this endeavor for years, helping them effectively manage identity theft and fraud concerns while allowing seamless access to services for the vast majority of their consumers. This risk-based approach through our CrossCore® platform and multitude of options to identify and combat fraud allows agencies to deliver the security and accessibility expected by their citizens. CrossCore allows agencies to verify and identify citizens using multiple data points: Traditional personally identifiable information (name, address, Social Security number, date of birth) Email Phone number Device identification Biometrics CrossCore can instantly take the risk information from these risk signals above and initiate additional verification where there is a higher risk of identity theft or fraud, including knowledge-based verification (KBV), one-time passcode (OTP) to a trusted phone number linked to the identity being presented, or even remotely verifying identity documents (e.g., driver’s license, passport, etc.) through our new CrossCore Doc Capture solution. Just recently, Experian helped a state lottery agency implement an efficient identity proofing system to enable digital redemption of winning tickets, saving both the government and the citizens time and money. Experian’s identity, verification, and fraud solutions can help government agencies of all sizes on their journey to digital modernization. To learn more about the options available to your agency, visit us or request a call. CrossCore Doc Capture
Previously, the Global Identity and Fraud Report called for businesses to meet consumer expectations for online recognition and security while improving the digital experience. Organizations have answered this call with investments and new initiatives, but the fraud risk persists and consumers are relying on businesses to protect them. In our latest report, we explore the issues associated with siloed recognition processes, consumer expectations and preferences, and effective risk strategies. We surveyed more than 6,000 consumers and 1,800 businesses worldwide about this connection for our 2022 Global Identity and Fraud Report. This year’s report dives into: How online security yields engagement and trust with today’s digital consumers The role of businesses in protecting online consumers, and the associated benefits The current opportunity for businesses to implement multiple identity and fraud solutions The role that orchestration and outsourcing play in helping companies prevent fraud To earn consumer trust and loyalty, organizations need to leverage automated solutions to identify and protect consumers across their online journeys while providing seamless recognition and low-friction fraud prevention with a robust and flexible fraud platform. To learn more about our findings and how to implement an effective solution, download Experian’s 2022 Global Identity and Fraud Report. Read the report Review your fraud strategy
Many financial institutions have made inclusion a strategic priority to expand their reach and help more U.S. consumers access affordable financial services. To drive deeper understanding, Experian commissioned Forrester to do new research to identify key focal points for firms and how they are moving the needle. The study found that more than two-thirds of institutions had a strategy created and implemented while one-quarter reported they are already up and running with their inclusion plans.1 Tapping into the underserved The research examines the importance of engaging new audiences such as those that are new to credit, lower-income, thin file, unbanked and underbanked as well as small businesses. To tap into these areas, the study outlines the need to develop new products and services, adopt willingness to change policies and processes, and use more data to drive better decisions and reach.2 Expanded data for improved risk decisioning The research underlines the use of alternative data and emerging technologies to expand reach to new audiences and assist many who have been underserved. In fact, sixty-two percent of financial institutions surveyed reported they currently use or are planning to use expanded data to improve risk profiling and credit decisions, with focus on: Banking data Cash flow data Employment verification data Asset, investments, and wealth management data Alternative financial services data Telcom and utility data3 Join us to learn more at our free webinar “Reaching New Heights Together with Financial Inclusion” where detailed research and related tools will be shared featuring Forrester’s principal analyst on Tuesday, May 24 from 10 – 11 a.m. PT. Register here for more information. Find more financial inclusion resources at www.experian.com/inclusionforward. Register for webinar Visit us 1 Based on Forrester research 2 Ibid. 3 Ibid.
Since January 27, 2020, the federal government has been operating under a Public Health Emergency (PHE) related to the COVID-19 pandemic. On January 14, 2022, this PHE was renewed for an eighth time. While we are currently in the midst of the omicron surge, some suggest that we may be nearing the beginning of the end of the pandemic — and thus the inevitable expiration of the PHE. Impacts of the PHE While the PHE remains in effect, states must maintain current Medicaid enrollees, regardless of changes to their eligibility status. A recent report showed Medicaid enrollment increased 16.8% from February 2020 to June 2021. This is counter to the previous trend, where enrollment declined from 2017 to 2019. Furthermore, the average per capita Medicaid cost to states is estimated at $5K–$10K (states share about one-third of the cost of Medicaid). The combination of the per capita expense and the increased number of enrollees during the pandemic translates to a significant impact on state budgets. Once the federal order expires, states will have 12 months to redetermine eligibility for continued enrollment in the program, or risk bearing 100% of the associated cost. Processing redetermination in a timely manner is critical for states to avoid unnecessary expenditures and to ensure that citizens are receiving access to the correct services. It’s imperative that states start planning for redetermination of benefits for continued Medicaid coverage as soon as possible to be prepared to take action at the inevitable conclusion of the PHE. Preparing for redeterminations At the end of the PHE, states will need a system to easily and confidently review their current Medicaid rolls to confirm eligibility. Implementing this system will likely involve working with a trusted partner who can provide tools and advantages such as: Portfolio analysis Real-time analysis Verification of income and employment Compliance adherence Affordability With the correct systems in place, states can act quickly once the PHE ends, saving unnecessary expenditures and providing better services to citizens in need. If your state agency would like to learn more about how Experian can assist with citizen benefit redetermination efforts, visit us or request a call. Learn more