SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Prevent
Loan Application Fraud
HOW TO:
I. The Challenges & Opportunties
in KYC for Online Lenders
II. 8 Identity Verification Tests to Prevent Loan
Application Fraud
III. 4 Strategies to Prevent Lending Fraud with Account
Origination Protection
In this presentation, we’ll explain:
Challenges
Know Your
Customer
(KYC)
Opportunities
The methodology for assessing an
identity online is less secure than
most in-person interactions, and
documents can be easily forged
online.
Increasing scrutiny increases
drop-off rates of applications, which
can then negatively impact the
performance of your business
model.
However, when performed
correctly, activities during the KYC
process can also help you flag
serious issues like identity theft,
and help you protect your business
from fraud.
The key is to strike a balance
between mitigating risk, and
adding friction that causes
customer abandonment.
8 Identity Verification Tests
to Prevent Loan Application Fraud
1. Identity Document Verification
The following Know Your Customer (KYC) security checks are the most commonly
applied tests used on the IdentityMind platform to better verify a potential
borrower’s identity during the onboarding process:
This is accomplished by analyzing a picture of the image of the
document, and verifying its authenticity. Taking the picture can be
included as part of the onboarding process with the device camera,
on either a PC or Mobile device. This is more reliable than
requesting an already uploaded picture, because a fraudster may
have already stolen such photos from the victim.
This slideshare is a summary of an in-depth guide on our blog.
To see the full post, click here.
8 Identity Verification Tests
to Prevent Loan Application Fraud
2. Identity Data Validation
This is the verification of a match between the submitted information such as
name, address, phone, Social Security Number (SSN), tax ID and date of birth
against public and private databases. It is possible to extract this data from an
authorized document, and compare that extracted data against the provided
information, as well as public and private databases.
8 Identity Verification Tests
to Prevent Loan Application Fraud
3. Bank Account Ownership
The goal of this test is to verify a
client actually has access to the
bank account presented during the
onboarding process. This validation
can be done by having the client
provide the bank’s credential details,
or via micro-deposits to the account.
8 Identity Verification Tests
to Prevent Loan Application Fraud
4. “Out of Wallet” Questions
In “Out of Wallet” Questions- which can also be
referred to as, “Knowledge Based Authentication”
- the system matches an identity based on
submitted information, and provides questions
that should only be answered correctly by that
person. These questions are presented in a
multiple choice format, and the user must choose
the right answer. Common examples of these
questions include previous address, names of
relatives, place of birth, vehicle information etc.
?
5. Identity Risk Scoring
8 Identity Verification Tests
to Prevent Loan Application Fraud
This test compares submitted information with databases of stolen attributes and
heuristics, providing you with a risk score based on the likelihood of the given
identity being forged using compromised information.
8 Identity Verification Tests
to Prevent Loan Application Fraud
6. Out of Band Phone Verification
Out of Band verification allows you to assess in real-time whether the presented
phone number is indeed in the possession of the identity being evaluated. In some
geographies, you can even verify whether the phone number and subscriber data
match.
7. Social Media Analysis (feature in-roadmap)
Social Media analysis examines social network information to identify risk
conditions that may indicate the identity in question is fake, or presents enough
risk indicators to require further vetting. This is especially useful if the onboarding
process is tied to social network accounts.
8 Identity Verification Tests
to Prevent Loan Application Fraud
!
8. Video Conversation (feature in-roadmap)
In some countries, you are required to have a personal conversation with the
potential client. This can be accomplished by embedding a video chat plugin to
perform a video conference with the potential client.
8 Identity Verification Tests
to Prevent Loan Application Fraud
Beyond Identity Verification -
4 Strategies to Prevent Lending Fraud
The last section showed how KYC tests can play a role in fraud prevention in
addition to fulfilling AML compliance requirements. This next secion explains the
other pieces to an effective fraud prevention program.
The following strategies- gathered from real use cases with our clients- describe
some of the ways you can prevent loan application fraud during the onboarding
process using our platform:
1 2 3 4
4 Strategies to Prevent
Lending Fraud
1. Leverage Industry Data
Fraudsters tend to reuse stolen identity data
across businesses in the same industry. If a
fraudster is able to acquire a loan from one
lender, they will attempt to acquire a loan using
the same information at a different online
lender.
The IdentityMind platform shares fraudulent
data in real-time, alerting you when fraudsters
recognized by other online lenders are applying
for a loan at your institution. The relevance of
industry data has been demonstrated
repeatedly as fraudsters focus on a particular
industry.
4 Strategies to Prevent
Lending Fraud
2. Leverage Your Own Data
We enable clients to seed the IDM system with historical
data, including your watch lists, black lists and rejected
users.
Our system automatically adds the attributes of rejected
applications to a watch list, and alerts you when they appear
as part of a new application. This allows you to easily identify
recurrent users trying to hide their previous attempts.
The system highlights these “watched” attributes even when
hidden under several layers of transactions (what we call
“degrees of separation”). Similarly, and perhaps more
important, is when this reveals new applications connected
to entities on your black list.
!
!
4 Strategies to Prevent
Lending Fraud
3. Common Attributes Outside Identity Data
One of our clients configured a rule that flagged new loan
applications attached to bank accounts already
associated with another identity.
This rule detected fraudsters who had passed all identity
verification security tests, and had even verified
“ownership” of the bank account.
These fraudsters had used different devices, but the
same bank account. The loan applications were then
rejected, and the fraudsters attempted another
application using a different bank account. However
those attributes were already tainted from the previous
process, and they were repeatedly denied for new loans.
4 Strategies to Prevent
Lending Fraud
4. Geolocation Risk Analysis
Our clients benefit from our expertise in eCommerce
fraud prevention, specifically with risk analysis based
on geography, distance between the location of the
potential customer and their billing information, and
more.
Location is assessed for all users regardless whether
they are accessing your website from a computer or
mobile phone. Our platform can connect to Mobile
Network Operators and assess the location of the
subscriber, take latitude and longitude from the device
itself, or rely on the true IP address of the computer,
removing proxies in between.
!
Final Thoughts
The combination of KYC and fraud frevention techniques during account origination
are a much better solution than just one or the other. The more diverse your
protection is, the better the overall results.
Click below to learn about how our new ONBOARD program is
helping online lenders reduce fraud losses AND streamlining their
onboarding process.

Contenu connexe

Tendances

Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeArianto Muditomo
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
Presentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in IndiaPresentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in IndiaRammohanpnb
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safetyBISWAJITGHORAI2
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering PresentationAudrius Sapola
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 
Anti Money Laundering Framework
Anti Money Laundering FrameworkAnti Money Laundering Framework
Anti Money Laundering Frameworknikatmalik
 
Customer Due Diligence Part 1 slides.pptx
Customer Due Diligence Part 1 slides.pptxCustomer Due Diligence Part 1 slides.pptx
Customer Due Diligence Part 1 slides.pptxSiniTizhe
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraudmiteshppt
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managersrickycfe
 

Tendances (20)

Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Presentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in IndiaPresentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in India
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safety
 
Anti Money Laundering Presentation
Anti Money Laundering PresentationAnti Money Laundering Presentation
Anti Money Laundering Presentation
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Credit Card Fraud
Credit Card Fraud Credit Card Fraud
Credit Card Fraud
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Anti Money Laundering Framework
Anti Money Laundering FrameworkAnti Money Laundering Framework
Anti Money Laundering Framework
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Customer Due Diligence Part 1 slides.pptx
Customer Due Diligence Part 1 slides.pptxCustomer Due Diligence Part 1 slides.pptx
Customer Due Diligence Part 1 slides.pptx
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Fraud Awareness For Managers
Fraud Awareness For ManagersFraud Awareness For Managers
Fraud Awareness For Managers
 
e-banking
e-bankinge-banking
e-banking
 
Credit card frauds
Credit card fraudsCredit card frauds
Credit card frauds
 

En vedette

Denhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_SpamDenhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_SpamPaul Denhup
 
Hidden Decision Trees to Score Transactions
Hidden Decision Trees to Score TransactionsHidden Decision Trees to Score Transactions
Hidden Decision Trees to Score Transactionsvincentg64
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationScott Mongeau
 
Fraud Detection Class Slides
Fraud Detection Class SlidesFraud Detection Class Slides
Fraud Detection Class SlidesMax De Marzi
 

En vedette (7)

Denhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_SpamDenhup Paul ILW_Wk2_Spam
Denhup Paul ILW_Wk2_Spam
 
Hidden Decision Trees to Score Transactions
Hidden Decision Trees to Score TransactionsHidden Decision Trees to Score Transactions
Hidden Decision Trees to Score Transactions
 
Falcon 012009
Falcon 012009Falcon 012009
Falcon 012009
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Fraud Detection Class Slides
Fraud Detection Class SlidesFraud Detection Class Slides
Fraud Detection Class Slides
 

Similaire à How To: Prevent Loan Application Fraud

Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
SCAM Detection in Credit Card Application
SCAM Detection in Credit Card ApplicationSCAM Detection in Credit Card Application
SCAM Detection in Credit Card Applicationijcnes
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptxdarrengracia
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdfMerchantech - Payment Processing Services
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentationYusuf Qadir
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...IJCSEA Journal
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...Elizabeth Dimit
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfIDMERIT IDMERIT
 

Similaire à How To: Prevent Loan Application Fraud (20)

Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
SCAM Detection in Credit Card Application
SCAM Detection in Credit Card ApplicationSCAM Detection in Credit Card Application
SCAM Detection in Credit Card Application
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pptx
 
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
10 Essential Strategies to Safeguard Your Business from Credit Card Fraud 1.pdf
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
 
IDTmemberGuide
IDTmemberGuideIDTmemberGuide
IDTmemberGuide
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
The Digital Identity Network -- A Holistic Approach to Managing Risk in a Glo...
 
The Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdfThe Essence of Online ID Verification for Enhanced User Authentication.pdf
The Essence of Online ID Verification for Enhanced User Authentication.pdf
 
FACTA Red Flags Rule Compliance
FACTA Red Flags Rule ComplianceFACTA Red Flags Rule Compliance
FACTA Red Flags Rule Compliance
 

Dernier

Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 

Dernier (20)

Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 

How To: Prevent Loan Application Fraud

  • 2. I. The Challenges & Opportunties in KYC for Online Lenders II. 8 Identity Verification Tests to Prevent Loan Application Fraud III. 4 Strategies to Prevent Lending Fraud with Account Origination Protection In this presentation, we’ll explain:
  • 3. Challenges Know Your Customer (KYC) Opportunities The methodology for assessing an identity online is less secure than most in-person interactions, and documents can be easily forged online. Increasing scrutiny increases drop-off rates of applications, which can then negatively impact the performance of your business model. However, when performed correctly, activities during the KYC process can also help you flag serious issues like identity theft, and help you protect your business from fraud. The key is to strike a balance between mitigating risk, and adding friction that causes customer abandonment.
  • 4. 8 Identity Verification Tests to Prevent Loan Application Fraud 1. Identity Document Verification The following Know Your Customer (KYC) security checks are the most commonly applied tests used on the IdentityMind platform to better verify a potential borrower’s identity during the onboarding process: This is accomplished by analyzing a picture of the image of the document, and verifying its authenticity. Taking the picture can be included as part of the onboarding process with the device camera, on either a PC or Mobile device. This is more reliable than requesting an already uploaded picture, because a fraudster may have already stolen such photos from the victim. This slideshare is a summary of an in-depth guide on our blog. To see the full post, click here.
  • 5. 8 Identity Verification Tests to Prevent Loan Application Fraud 2. Identity Data Validation This is the verification of a match between the submitted information such as name, address, phone, Social Security Number (SSN), tax ID and date of birth against public and private databases. It is possible to extract this data from an authorized document, and compare that extracted data against the provided information, as well as public and private databases.
  • 6. 8 Identity Verification Tests to Prevent Loan Application Fraud 3. Bank Account Ownership The goal of this test is to verify a client actually has access to the bank account presented during the onboarding process. This validation can be done by having the client provide the bank’s credential details, or via micro-deposits to the account.
  • 7. 8 Identity Verification Tests to Prevent Loan Application Fraud 4. “Out of Wallet” Questions In “Out of Wallet” Questions- which can also be referred to as, “Knowledge Based Authentication” - the system matches an identity based on submitted information, and provides questions that should only be answered correctly by that person. These questions are presented in a multiple choice format, and the user must choose the right answer. Common examples of these questions include previous address, names of relatives, place of birth, vehicle information etc. ?
  • 8. 5. Identity Risk Scoring 8 Identity Verification Tests to Prevent Loan Application Fraud This test compares submitted information with databases of stolen attributes and heuristics, providing you with a risk score based on the likelihood of the given identity being forged using compromised information.
  • 9. 8 Identity Verification Tests to Prevent Loan Application Fraud 6. Out of Band Phone Verification Out of Band verification allows you to assess in real-time whether the presented phone number is indeed in the possession of the identity being evaluated. In some geographies, you can even verify whether the phone number and subscriber data match.
  • 10. 7. Social Media Analysis (feature in-roadmap) Social Media analysis examines social network information to identify risk conditions that may indicate the identity in question is fake, or presents enough risk indicators to require further vetting. This is especially useful if the onboarding process is tied to social network accounts. 8 Identity Verification Tests to Prevent Loan Application Fraud !
  • 11. 8. Video Conversation (feature in-roadmap) In some countries, you are required to have a personal conversation with the potential client. This can be accomplished by embedding a video chat plugin to perform a video conference with the potential client. 8 Identity Verification Tests to Prevent Loan Application Fraud
  • 12. Beyond Identity Verification - 4 Strategies to Prevent Lending Fraud The last section showed how KYC tests can play a role in fraud prevention in addition to fulfilling AML compliance requirements. This next secion explains the other pieces to an effective fraud prevention program. The following strategies- gathered from real use cases with our clients- describe some of the ways you can prevent loan application fraud during the onboarding process using our platform: 1 2 3 4
  • 13. 4 Strategies to Prevent Lending Fraud 1. Leverage Industry Data Fraudsters tend to reuse stolen identity data across businesses in the same industry. If a fraudster is able to acquire a loan from one lender, they will attempt to acquire a loan using the same information at a different online lender. The IdentityMind platform shares fraudulent data in real-time, alerting you when fraudsters recognized by other online lenders are applying for a loan at your institution. The relevance of industry data has been demonstrated repeatedly as fraudsters focus on a particular industry.
  • 14. 4 Strategies to Prevent Lending Fraud 2. Leverage Your Own Data We enable clients to seed the IDM system with historical data, including your watch lists, black lists and rejected users. Our system automatically adds the attributes of rejected applications to a watch list, and alerts you when they appear as part of a new application. This allows you to easily identify recurrent users trying to hide their previous attempts. The system highlights these “watched” attributes even when hidden under several layers of transactions (what we call “degrees of separation”). Similarly, and perhaps more important, is when this reveals new applications connected to entities on your black list. ! !
  • 15. 4 Strategies to Prevent Lending Fraud 3. Common Attributes Outside Identity Data One of our clients configured a rule that flagged new loan applications attached to bank accounts already associated with another identity. This rule detected fraudsters who had passed all identity verification security tests, and had even verified “ownership” of the bank account. These fraudsters had used different devices, but the same bank account. The loan applications were then rejected, and the fraudsters attempted another application using a different bank account. However those attributes were already tainted from the previous process, and they were repeatedly denied for new loans.
  • 16. 4 Strategies to Prevent Lending Fraud 4. Geolocation Risk Analysis Our clients benefit from our expertise in eCommerce fraud prevention, specifically with risk analysis based on geography, distance between the location of the potential customer and their billing information, and more. Location is assessed for all users regardless whether they are accessing your website from a computer or mobile phone. Our platform can connect to Mobile Network Operators and assess the location of the subscriber, take latitude and longitude from the device itself, or rely on the true IP address of the computer, removing proxies in between. !
  • 17. Final Thoughts The combination of KYC and fraud frevention techniques during account origination are a much better solution than just one or the other. The more diverse your protection is, the better the overall results. Click below to learn about how our new ONBOARD program is helping online lenders reduce fraud losses AND streamlining their onboarding process.