Authentication Myths | Reaching Critical Mass – Quick & Easy
Reaching critical mass for enrollment can be defined as having enrolled a large portion of your customer base to justify the purchase price of the
Reaching critical mass for enrollment can be defined as having enrolled a large portion of your customer base to justify the purchase price of the
Voice is growing out of the call center, out of your telephone and is growing into the next interface. In previous years, we have released
With convenience on the mind of most consumers, peer to peer payment apps are making it easy to transfer money to friends, family, or acquaintances.
As technology advances, fraudsters use different, constantly evolving techniques that include exploiting the phone channel. With increasingly sophisticated attacks, fraudsters maneuver around authentication and security
By Shawn Hall, Director of Fraud Prevention & Strategy The anti-fraud and authentication industry has seen some major happenings in 2017. Overall, we saw an
With $14 billion lost annually to phone fraud, the call center remains a common target to fraudsters. Legacy authentication methods including caller identification, knowledge based
Martin Dodd, Managing Director, Connect, Lloyds Banking Group With the spotlight remaining on the evolving threat of online fraud, phone fraud is an area that
Aite Group, an independent research and advisory firm focused on business, technology, and regulatory issues, interviewed 25 executives at 18 of the top 40 largest
1. What are the key challenges of authenticating callers into the call center and IVR channels? Traditional contact center anti-fraud and authentication methods no longer