Resources STAY CONNECTED, STAY INFORMED, STAY AHEAD
Pindrop Pulse is a resource hub for everything from the basics of voice fraud and security, to advanced topics and discussions happening in the industry. Take your knowledge to the next level.
The Contact Center's Guide to Account Risk
August 9, 2021
Taking an account centric approach takes the fight against fraud to another “front”. Account risk allows you to see which accounts are at risk, building on the knowledge of fraudsters using the phone channel to extract information and take over accounts.
Read HereHow to Make KBA's Work for Your Contact Center
August 17, 2021
Regardless of the authentication needs of any particular call, the use of KBA to satisfy them will result in added time and cost that could be avoided by using Passive authentication methods instead.
Read HereSTIR / SHAKEN for Contact Centers
This report discusses how to plan and prepare for the widespread deployment of STIR/SHAKEN, account for known/unknown integration or performance limitations and develop a passive, customer-friendly authentication process.
Read HereAuthentication 103: Optimizing Authentication
Part 3 of 3
August 5, 2021 @ 1:00 pm - 1:30 pm EST
Jay Hart & Dave Dalebroux
AI for Identity and Security: A Playbook for Financial leaders
In this report we break down the complexity of the AI ecosystem from an authentication and fraud protection perspective.
DownloadLife Insurance Company - Trailblazing Customer Experience and Protection in Insurance
Since December 2019, the Company realized through Enhanced Authentication $1.2 million in operational cost savings -- more than double the initial goal
DownloadAuthentication 102: Securing Authentication
Part 2 of 3
July 29, 2021 @ 1:00 pm - 1:30 pm EST
Jay Hart & Dave Dalebroux
Authentication 101: The Basics of Call Center Authentication
Part 1 of 3
July 22, 2021 @ 1:00 pm - 1:30 pm EST
Jay Hart & Dave Dalebroux
Knowledge-Based Authentication (KBA) is on the Outs, But Remain Useful
August 1, 2021
It may be premature to fully cancel KBA but necessary to recognize that KBA’s role has been relegated from the featured authentication tool to a complementary method.
Read Here