PINDROP BLOG

Category: Social Engineering

February 11, 2020
Excellent Customer Experience | The Gift We Are All Looking for on Valentine’s Day
In a world where technology continues to evolve, most companies are currently experiencing a digital transformation. However, companies aren’t made up of just one channel of operation – and it may be hard to determine priority. Over the years, we have noticed that the call center is often pushed to the back burner, making it…
Read More →
January 17, 2020
The Importance of Customer Experience Within the Growing Conversational Economy
As companies move to compete on customer experience as a strategic imperative, it has become a top priority for a large percentage of enterprises. We see customer experience as the next revenue battleground. By the year 2020, customer experience will overtake price and product as the key brand differentiator.  By 2022, digital businesses with great…
Read More →
November 21, 2019
Learning to Think Like a Fraudster | The Fraud Bible
Have you ever wondered where – and how – fraudsters learn how to do what they do best? A new publication, The Fraud Bible, is here to answer all your questions – and unfortunately share the means of becoming a criminal. From a consumer mindset, this bible will offer insight into the ways fraudsters take…
Read More →
July 9, 2019
The Story of a Top 10 Insurance Company
In the insurance industry, many insurers run into problems with data privacy and account takeover. Fraudsters often target independent accounts from insurance agents, because that exposure can lead to the additional exposure of hundreds of consumer accounts. In this particular case, the fraudsters were exposed to $32M. The organization discovered that the fraudsters targeting their…
Read More →
May 31, 2019
Deepfakes | What You Need To Know
Let’s start off with something simple: what is a deepfake? Deepfakes can include anything from audio to video content that appear to look and sound like real footage. However, the difference is – it’s completely fake. The origin of the term deepfake comes from a pair of deep learning, the technology that makes it possible,…
Read More →
May 29, 2019
Authentication Myths | Reaching Critical Mass – Quick & Easy
Reaching critical mass for enrollment can be defined as having enrolled a large portion of your customer base to justify the purchase price of the authentication solution in question. Traditional voice biometric software requires a customer to enroll actively, meaning they have to intently participate in saying a phrase or have the agent start to…
Read More →
May 13, 2019
Authentication Myths | Knowledge Based Authentication Works
To be fair, there was a point in time where knowledge based authentication questions (KBAs) were an effective form of identification. But that time is gone. It’s likely that more personal information about each and every one of us is available on the web than anytime before in history, and the growing amount of cybersecurity…
Read More →
March 8, 2019
Natural Communication | The Latest Consumer Interface
From the first computers, which quickly made their way to being a major force of communication, to the advent of smartphones, consumers have always been at the forefront of changes and arrivals of interfaces and popular technology. Computers were characterized by the creation of passwords and PINs to keep track of accounts, logins, and access…
Read More →
October 17, 2018
Privacy and Permissions | Google+
With Google making headlines about the privacy of apps and the breaking news of the Facebook data breach earlier this year, it has become clear that the apps on our phones are now holding, and disseminating, large amounts of data and are doing so most of the time. More often than not, we as consumers…
Read More →
October 3, 2018
The Future of Voice, Fraud, and the Impact to CX | A Recap
Voice is growing out of the call center, out of your telephone and is growing into the next interface. In previous years, we have released fraud reports revolving around the call center, but with the expansion of voice, and the fraud that follows, we have shifted our perspective to voice intelligence – after all, voice…
Read More →