Identity and Fraud Focus

Cell Side: Mobilizing the Smart Phone Banking Experience

Mobile Banking

With banks digging deep in their pockets for additional smart phone banking funds, here are five takeaways on consumer mobile banking demands.

Selling Mortgage Loans? Time to Brush Up on the New Laws

The Dodd-Frank Act continues to grow. Among its provisions and amendments are new compliance requirements for mortgage lenders.

Under the Dodd-Frank Act, mortgage loans now require stricter qualifications from lenders prior to approval to meet compliance standards.

Medical Identity Theft on the Rise

thumb_Healthcare

Medical identity theft and fraud are rising as more private patient data is put online without adequate security measures. Not only are patients being billed for treatments they never received, medical records are being altered in ways that can have life-threatening consequences. In the most recent survey conducted by the Identity Theft Resource Center, medical identity [Read More…]

Attacking Identity Theft and Fraud with Analytics

identity theft

According to a recent study there was a increase of more than 500,000 fraud victims to 13.1 million people in 2013, the second highest number since the study began. Analytics that separate the real person from the fraudster using someone else’s name help provide maximum protection against identity theft. Our sources of credit, collections, and other private [Read More…]

The Affordable Care Act: Preparing for 2015

ACA Alert

January 1, 2015 is an important date for the Affordable Care Act. This is not only when large employers must begin providing healthcare coverage to eligible employees, but it’s also when organizations must start tracking all the necessary data to fulfill section 6055 and 6056 reporting requirements. While many employers believe they do not have [Read More…]

Move Past Secrets to Real Identity Verification

Account Takeover Protection for Online and Mobile Banking

Prior to the burst of social media sharing, little known facts about our lives were widely used for authentication before we were permitted access to sensitive information. For example, if someone called a retail bank to check a balance or question a DDA fee, she would provide identifying information for herself and her account, and [Read More…]