SlideShare a Scribd company logo
1 of 6
Download to read offline
Front Line Defence – In
ADigital World
DATE
FRONT LINE
• As an online company we require the maximum amount of information on our clients, besides the usual
personal data. The information that we obtain via our front line IP provider helps us build a better
understanding of the potential client, in addition to the personal information submitted by the client.
Another benefit is the unique device number provided; this device is recorded within their vast database
allowing subscribers to view this database to observe the device history.
• The unique information presented to us from our provider is: Device type, Real IP address, Country,
Region, City and Service Provider. Other information is evidence placed on the device by other
Subscribers as well as ourselves; this can include True ID Theft and Credit Card Fraud among many
other types.
2
DATE
THE BREAKDOWN
• We are also able to set our own rules, with varying output responses e.g. Allow, Review and Deny
depending on a company’s appetite for risk. The below table show some of rules present, evidence
placed by us or other subscribers is shown below including the ratio seen within the applications sent for
Review:
3
Rules Aug-14
Country List 21%
Device ID is Unique 5%
Risky Device 4%
High Risk ISP 3%
High Risk IP 5%
MYJAR Evidence Exists 4%
Mobile Emulator Detected 1%
Potential Financial Difficulties 2%
Proxy in Use 1%
Subscriber Evidence 19%
Timezone vs Geolocation Mismatch 32%
Risky Transactions A 3%
Risky Transactions B 2%
DATE
THE FURTHER BREAKDOWN
• In addition to the above IP database we also use rules within our own database, this mainly looks at
velocity, related clients history and defined known risks. All accounts that fail any of our rule sets are
sent for review by our validation team and our fraud manager.
• There are varying types of fraud seen by us; however, the majority of the fraud seen can be broken
down into different standards of fraud and analysed. A breakdown of this for 2013 and YTD can be seen
below:
4
Fraud Definitions 2013 YTD
Application Fraud 11.50% 2.50%
Account Take-Over/Hijacking 0.50% 0.20%
Fraud Other 1.10% 0.70%
Identity Fraud 50.00% 34.30%
Misuse of Facility Fraud 11.60% 15.00%
Subscriber Evidence Fraud 20.30% 37.70%
Returned as Fraud from DC 5.10% 9.60%
DATE
FRAUD GANGS MO
• Crime gangs like to operate using stolen identities which can be obtained from the ‘dark web’, in tandem
with cloned/stolen cards. Their favoured MO as observed by us is using a dynamic IP or open public
network fraudulently applying for loans using a windows pc. As their patterns are usually consistent we
are usually able to have some impact on their operation however some naturally slip through.
5
Group Head of
Collections, Recoveries
and Fraud
STUART SYKES
6

More Related Content

What's hot

Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In EcommerceLarry_Moffatt
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsCBIZ, Inc.
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take OverLaurent Pacalin
 
Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020Practical Vision Network
 
Affiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the IndustryAffiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the IndustryAffiliate Summit
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and dataAnthonywheeler
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule GeneralTeo Leonard
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data BreachObserveIT
 

What's hot (15)

Security Against Fraud In Ecommerce
Security Against Fraud In EcommerceSecurity Against Fraud In Ecommerce
Security Against Fraud In Ecommerce
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security Incidents
 
eCommerce – Fraud
eCommerce – FraudeCommerce – Fraud
eCommerce – Fraud
 
Criminal Alert Notice (myPay)
Criminal Alert Notice (myPay)Criminal Alert Notice (myPay)
Criminal Alert Notice (myPay)
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020
 
A guide to Financial Crime Management
A guide to Financial Crime ManagementA guide to Financial Crime Management
A guide to Financial Crime Management
 
Affiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the IndustryAffiliate Fraud Trends & the Policies Needed in the Industry
Affiliate Fraud Trends & the Policies Needed in the Industry
 
Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003Fair and Accurate Credit Transactions Act of 2003
Fair and Accurate Credit Transactions Act of 2003
 
Threats to online security and data
Threats to online security and dataThreats to online security and data
Threats to online security and data
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
Red Flags Rule General
Red Flags Rule GeneralRed Flags Rule General
Red Flags Rule General
 
Fraud management optimisation
Fraud management optimisation Fraud management optimisation
Fraud management optimisation
 
Bridge Cyber Crime_March_JB
Bridge Cyber Crime_March_JBBridge Cyber Crime_March_JB
Bridge Cyber Crime_March_JB
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
 

Similar to Alternative Finance & Payments stream - Stuart Sykes slides

TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshureTrustIDnow
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityJoan Weber
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update WebinarcVidya Networks
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...Visa
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers BDO_Consulting
 
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzThe Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzFitCEO, Inc. (FCI)
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6annwhyjay
 
Eighty20 open data standards for financial inclusion
Eighty20 open data standards for financial inclusionEighty20 open data standards for financial inclusion
Eighty20 open data standards for financial inclusionJessica Robey
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationEric Reehl
 
Product Case Competition.pdf
Product Case Competition.pdfProduct Case Competition.pdf
Product Case Competition.pdfhimanshu102850
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdfWilson Kao
 
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzDark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzFitCEO, Inc. (FCI)
 
How to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankHow to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankThomas Lee
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPARyan Foster
 
Protecting Against Payment Fraud in SAP S/4HANA
Protecting Against Payment Fraud in SAP S/4HANAProtecting Against Payment Fraud in SAP S/4HANA
Protecting Against Payment Fraud in SAP S/4HANAKyriba Corporation
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
ClearDil - Service.pdf
ClearDil - Service.pdfClearDil - Service.pdf
ClearDil - Service.pdfClear Dil
 

Similar to Alternative Finance & Payments stream - Stuart Sykes slides (20)

TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshure
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Fraud Management Industry Update Webinar
Fraud Management Industry Update WebinarFraud Management Industry Update Webinar
Fraud Management Industry Update Webinar
 
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
CyberSource MRC Survey - Top 9 Fraud Attacks and Winning Mitigating Strategie...
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzThe Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
 
Eighty20 open data standards for financial inclusion
Eighty20 open data standards for financial inclusionEighty20 open data standards for financial inclusion
Eighty20 open data standards for financial inclusion
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
Product Case Competition.pdf
Product Case Competition.pdfProduct Case Competition.pdf
Product Case Competition.pdf
 
Treasury in a Time of Crisis
Treasury in a Time of CrisisTreasury in a Time of Crisis
Treasury in a Time of Crisis
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
Security and governance
Security and governanceSecurity and governance
Security and governance
 
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzDark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
 
How to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail BankHow to Use a Cyber Loss Model within a Retail Bank
How to Use a Cyber Loss Model within a Retail Bank
 
Top Questions Asked About the CCPA
Top Questions Asked About the CCPATop Questions Asked About the CCPA
Top Questions Asked About the CCPA
 
Protecting Against Payment Fraud in SAP S/4HANA
Protecting Against Payment Fraud in SAP S/4HANAProtecting Against Payment Fraud in SAP S/4HANA
Protecting Against Payment Fraud in SAP S/4HANA
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
ClearDil - Service.pdf
ClearDil - Service.pdfClearDil - Service.pdf
ClearDil - Service.pdf
 

More from Callcredit123

Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit123
 
Callcredit's Fraud Summit 2016 - Anti-money laundering stream
Callcredit's Fraud Summit 2016 - Anti-money laundering streamCallcredit's Fraud Summit 2016 - Anti-money laundering stream
Callcredit's Fraud Summit 2016 - Anti-money laundering streamCallcredit123
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit123
 
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit123
 
Public Sector stream - Paul Wilding slides
Public Sector stream - Paul Wilding slidesPublic Sector stream - Paul Wilding slides
Public Sector stream - Paul Wilding slidesCallcredit123
 
Public Sector stream - Rachael Tiffin slides
Public Sector stream - Rachael Tiffin slidesPublic Sector stream - Rachael Tiffin slides
Public Sector stream - Rachael Tiffin slidesCallcredit123
 
Insurance stream - Richard Davies slides
Insurance stream - Richard Davies slidesInsurance stream - Richard Davies slides
Insurance stream - Richard Davies slidesCallcredit123
 

More from Callcredit123 (7)

Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Callcredit's Fraud Summit 2016 - Anti-money laundering stream
Callcredit's Fraud Summit 2016 - Anti-money laundering streamCallcredit's Fraud Summit 2016 - Anti-money laundering stream
Callcredit's Fraud Summit 2016 - Anti-money laundering stream
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
Callcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary sessionCallcredit's Fraud Summit 2016 - Plenary session
Callcredit's Fraud Summit 2016 - Plenary session
 
Public Sector stream - Paul Wilding slides
Public Sector stream - Paul Wilding slidesPublic Sector stream - Paul Wilding slides
Public Sector stream - Paul Wilding slides
 
Public Sector stream - Rachael Tiffin slides
Public Sector stream - Rachael Tiffin slidesPublic Sector stream - Rachael Tiffin slides
Public Sector stream - Rachael Tiffin slides
 
Insurance stream - Richard Davies slides
Insurance stream - Richard Davies slidesInsurance stream - Richard Davies slides
Insurance stream - Richard Davies slides
 

Recently uploaded

Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Sonam Pathan
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...shivangimorya083
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantagesjayjaymabutot13
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarHarsh Kumar
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionMuhammadHusnain82237
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyTyöeläkeyhtiö Elo
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithAdamYassin2
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Roomdivyansh0kumar0
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...makika9823
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 

Recently uploaded (20)

Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713Call Girls Near Me WhatsApp:+91-9833363713
Call Girls Near Me WhatsApp:+91-9833363713
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
 
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Financial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and DisadvantagesFinancial Leverage Definition, Advantages, and Disadvantages
Financial Leverage Definition, Advantages, and Disadvantages
 
The Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh KumarThe Triple Threat | Article on Global Resession | Harsh Kumar
The Triple Threat | Article on Global Resession | Harsh Kumar
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
Chapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th editionChapter 2.ppt of macroeconomics by mankiw 9th edition
Chapter 2.ppt of macroeconomics by mankiw 9th edition
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance CompanyInterimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
Interimreport1 January–31 March2024 Elo Mutual Pension Insurance Company
 
Classical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam SmithClassical Theory of Macroeconomics by Adam Smith
Classical Theory of Macroeconomics by Adam Smith
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
Independent Lucknow Call Girls 8923113531WhatsApp Lucknow Call Girls make you...
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 

Alternative Finance & Payments stream - Stuart Sykes slides

  • 1. Front Line Defence – In ADigital World
  • 2. DATE FRONT LINE • As an online company we require the maximum amount of information on our clients, besides the usual personal data. The information that we obtain via our front line IP provider helps us build a better understanding of the potential client, in addition to the personal information submitted by the client. Another benefit is the unique device number provided; this device is recorded within their vast database allowing subscribers to view this database to observe the device history. • The unique information presented to us from our provider is: Device type, Real IP address, Country, Region, City and Service Provider. Other information is evidence placed on the device by other Subscribers as well as ourselves; this can include True ID Theft and Credit Card Fraud among many other types. 2
  • 3. DATE THE BREAKDOWN • We are also able to set our own rules, with varying output responses e.g. Allow, Review and Deny depending on a company’s appetite for risk. The below table show some of rules present, evidence placed by us or other subscribers is shown below including the ratio seen within the applications sent for Review: 3 Rules Aug-14 Country List 21% Device ID is Unique 5% Risky Device 4% High Risk ISP 3% High Risk IP 5% MYJAR Evidence Exists 4% Mobile Emulator Detected 1% Potential Financial Difficulties 2% Proxy in Use 1% Subscriber Evidence 19% Timezone vs Geolocation Mismatch 32% Risky Transactions A 3% Risky Transactions B 2%
  • 4. DATE THE FURTHER BREAKDOWN • In addition to the above IP database we also use rules within our own database, this mainly looks at velocity, related clients history and defined known risks. All accounts that fail any of our rule sets are sent for review by our validation team and our fraud manager. • There are varying types of fraud seen by us; however, the majority of the fraud seen can be broken down into different standards of fraud and analysed. A breakdown of this for 2013 and YTD can be seen below: 4 Fraud Definitions 2013 YTD Application Fraud 11.50% 2.50% Account Take-Over/Hijacking 0.50% 0.20% Fraud Other 1.10% 0.70% Identity Fraud 50.00% 34.30% Misuse of Facility Fraud 11.60% 15.00% Subscriber Evidence Fraud 20.30% 37.70% Returned as Fraud from DC 5.10% 9.60%
  • 5. DATE FRAUD GANGS MO • Crime gangs like to operate using stolen identities which can be obtained from the ‘dark web’, in tandem with cloned/stolen cards. Their favoured MO as observed by us is using a dynamic IP or open public network fraudulently applying for loans using a windows pc. As their patterns are usually consistent we are usually able to have some impact on their operation however some naturally slip through. 5
  • 6. Group Head of Collections, Recoveries and Fraud STUART SYKES 6