Remove Cards Remove Knowledge Base Remove Security Remove social media
article thumbnail

10 Questions Banks Should Ask About Their Digital Account-Opening Capabilities

Perficient

When customers can apply for the Apple Card, for example , and receive approval and begin using it in minutes, patience with financial institutions that take longer will wear thin. Many banks continue to use knowledge-based authentication and out-of-wallet questions, which have challenges when customers have recently moved.

article thumbnail

Fiserv Rolls Out Enhanced Consumer Authentication Solutions

PYMNTS

22) that it has rolled out two enhanced consumer authentication solutions, step-up authentication and identity verification, to mitigate card fraud within call centers. In a press release , Fiserv said the two new solutions expand beyond knowledge-based consumer authentication that can be vulnerable to fraud.

Fraud 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Friendly Friction Builds Better Banking Experiences

PYMNTS

According to a recent study by Citibank , 31 percent of consumers use their mobile banking app more than any other — placing mobile banking behind only social media and weather for most frequented mobile destinations. Banks need to expose more of their security aspects to consumers so they can seem them in action.

Mobile 169
article thumbnail

FinovateSpring 2016 Live Blog – Day 2

William Mills

Credit cards offer rewards but over 60% of payments are made on debit cards. Demo: Sezzle app with knowledge based authentication to link bank accounts. It’s all done through the smartphone, with bank-level security. Chip card reader for when customers are shopping online to improve security.

Video 40
article thumbnail

Identify Proofing’s Break With Fraud’s Tradition

PYMNTS

With no face to match to the name and no data beyond the traditional Social Security numbers, dates of birth and passwords, is it any wonder that account security is a tough battle to fight — especially against foes who have leveraged data breaches into literal gold mines?

article thumbnail

Confirming Identity, An Art And Science

PYMNTS

The reason Yahoo was targeted, said Geiman, was because bad guys wanted to get the answer to knowledge-based questions. Thus, security of data becomes top of mind within a firm. “If There is also suspicion of just how secure some data might be, such as someone’s mother’s maiden name. It is a scary thing to you.”.

Data 101
article thumbnail

Killing Strategy: The Disruption Of Management Consulting

CB Insights

From one perspective, the position of management consulting as an industry has never seemed more secure. You don’t need to work with a Bain or a BCG to talk to someone with in-depth knowledge about supply chain management. According to estimates, McKinsey makes about $8.8B Each one is still growing. ” —Michael Porter. .”