Contact Us

Heading to HLTH this month? Come by booth #203 to meet the Payfone Healthcare team and learn how our digital trust solutions can transform your member/patient experience and supercharge engagement.

Who?: The Payfone Healthcare team & you
What?: Key digital transformation use cases such as password-less login, identity authentication for telehealth services, online portal registration, and call center authentication
Where?: Booth #203 at HLTH at the MGM Grand in Las Vegas
When?: October 27-30
Why?: Learn from Payfone’s digital identity “sherpas” who can guide your digital authentication and verification strategies to enhance member/patient experiences and engagement while protecting privacy. See how Payfone’s patented Trust Score can significantly increase your percentage of members/patients that can interact with you frictionlessly, and try our demo to get your own Trust Score.

Click here to set up a one-on-one meeting with us at HLTH >

SIM swap attacks continue to make headlines, with Twitter CEO Jack Dorsey becoming one of the most famous victims to date when his mobile phone number was taken over last month. Similar scams are rapidly increasing in frequency, impacting high-profile CEOs, Hollywood celebrities, cryptocurrency communities, and everyday people, as criminals take advantage of security loopholes and the vulnerabilities of 2FA (two-factor authentication) to hijack social media accounts or steal money and cryptocurrency by taking over victims’ mobile phone numbers.

This week, we announced that we are taking a stand and extending our SIM swap detection algorithms to even more consumers to protect them from a fast-growing fraud scheme that easily breaks 2FA, costing them millions in lost dollars and personal data.

Read the Full Press Release Here

The call center is one of the most challenging channels when it comes to balancing security with customer experience. Fraud methods that target the call center – such as ANI-spoofing and account takeover attacks – are on the rise, with 51 percent of financial service professionals believing that phone channels see the greatest number of ATO attempts.* At the same time, we all know how unpleasant it can be to deal with security processes such as knowledge-based authentication and PIN codes when dialing into a call center, and quick and easy user enrollment remains a top priority for 91 percent of call center industry leaders.*

The good news is that there is hope for brands looking to use technology to solve these issues. Payfone’s Call Center solution uses a sophisticated, multi-layer approach to authenticating call center calls and the identity of callers to prevent ANI-spoofing and ATOs while also delivering a frictionless experience to >90% of callers. Enterprises can alleviate security concerns by leveraging the Payfone Trust Score™ and call authentication for real-time porting and SIM swap intelligence and to prove possession of the phone dialing into the call center. The Fonebook can then be used to identify callers for an increased ANI-match rate that eliminates the need for KBA questions and contains callers in the IVR so that they can quickly service themselves instead of requiring human intervention.

Curious to see what other features make Payfone’s Call Center solution so comprehensive and to see how your current solution stacks up? Download our Call Center Authentication Checklist below for the most critical differentiators to look for in a solution.

*Source: PYMNTS

 

Get the Call Center Authentication Checklist



In Q1 2019, some mobile network operators (MNOs) decided to stop making certain data available for inquiry to third-party identity authentication providers. This decision created concern regarding a possible gap in identity verification coverage. But was it actually a blessing in disguise? Join Payfone CEO Rodger Desai at Fraud Force 2019 on September 19th as he breaks down what companies can do to approach the situation as an opportunity to address the challenges presented by MNO data, and to implement solutions that offer higher coverage, increased privacy, and reduced operational complexity. This session will include an actionable checklist of things that enterprises can get started with today to bolster their identity authentication plans for the future. See you in Portland!

See the full Fraud Force agenda >

Read Aite Group’s report on how diversified signals proved superior to MNO data alone >

TSYS unveiled a breakthrough authentication product today that delivers unprecedented real-time verification of customer identities to help companies combat synthetic and account takeover fraud. Called the TSYS Authentication Platform, the new offering leverages Payfone’s Trust Platform and Trust Score to verify that a customer is who he or she claims to be, which will enable enterprises to provide a frictionless customer experience while reducing application, transaction and account takeover fraud.

The TSYS Authentication Platform is available in Europe now and is expected to launch in North America in 2020.

For more information, see the full press release here >

All companies want better privacy, security and ease-of-use for their customers, but it’s often difficult to weed through the marketing hyperbole and get to the bottom of what makes one identity authentication method better than another. NIST, the National Institute of Standards & Technology offers a practical, third-party way to overcome the confusion with clear-cut cybersecurity and privacy standards and best practices for enterprises in the U.S. to adopt.

NIST 800-63B “Authentication & Lifecycle Management”, is a government publication based on a collaboration with industry experts which sorts authentication options into good, better, best categories, assigning “assurance levels”. The publication includes descriptions of AAL1 (the lowest authentication assurance level); AAL2, a multi-factor authenticator or a combination of single-factor authenticators; and AAL3, the highest level, which must include a hardware crypto-device. Click here for a summary of NIST’s assurance levels in plain language and learn how you can get a complimentary consultation to definitively see what level of assurance your current or prospective identity authentication methods meet.

Get Your Complimentary NIST Assessment >

With nearly 111 million consumers using services like Airbnb, Uber and Freelancer.com daily, the sharing economy is booming more than ever before. And if you consider the sensitivity of the information, goods, services, and funds being exchanged, it should go without saying that the secure identity authentication and verification of users accessing these platforms is critical. But as a new report from PYMNTS shows, many sharing economy platforms are still using surprisingly weak identity verification and authentication methods that put consumers’ digital identities and data at risk.

Identity Authentication Challenges for Sharing Economy Platforms

Based on their survey of 3,585 consumers in early 2019, PYMNTS made the following conclusions about the digital identity authentication and verification techniques being used by sharing economy platforms today:

  • Many sharing economy platforms seem to be sacrificing onboarding and login security for more seamless user experiences, putting users and their data at risk.
  • Many platforms also seem to be using outdated and vulnerable forms of identity authentication and verification (such as passwords) despite the fact that users prefer newer methods:
    • PYMNTS found that fingerprint scanning was the most popular method of authentication amongst users logging into sharing economy platforms. 76.4 percent of consumers who are asked to verify their identities by scanning their fingerprints when logging into existing sharing economy accounts report being “very” or “extremely” satisfied with their login process.
    • Only 9.2 percent of surveyed consumers say their sharing economy platforms authenticate them using fingerprint scanning.
  • The most common way sharing economy users say they are asked to authenticate their identities when logging into their accounts is through simple passwords (49.5 percent) and email addresses (35 percent).
  • This is problematic because not only are customer satisfaction rates lower when using password and email address authentication, but these methods also have known vulnerabilities considering that consumers’ personally identifiable information is easily accessible to fraudsters on social media and the dark web.

Based on PYMNTS’ data, it can be concluded that sharing economy platforms could solve these issues by employing the identity verification methods most preferred by their users (fingerprint scanning and personal questions) – but that would only be addressing one side of the experience vs. security coin. As numerous news articles show, fingerprint biometrics can be shockingly easy to hack and personal security questions have the same issues as passwords and email addresses – they’re notoriously simple to crack using information found or purchased on the dark web.

So what can sharing economy platforms do to both raise their users’ satisfaction levels and ensure that their data and identities are protected against fraud?

Identity Authentication Opportunities for Sharing Economy Platforms

Passive identity authentication, an emerging technology that is already in use at many of the world’s largest banks, healthcare companies, and technology enterprises, would allow sharing economy platforms to authenticate users frictionlessly through their mobile phones without any action necessary on the part of the user. When compared to fingerprint scanning or personal questions, passive authentication is even more seamless, and is substantially more secure as the only way a fraudster could crack this technology is if they were actually in possession of the target’s mobile device (which is not scalable).

Passive identity authentication, such as Payfone’s mobile authentication tools, would enable sharing economies to leverage the same level of security used by large banks while also extending the best possible experience to their userbase.

For more information on Payfone’s suite of passive authentication solutions, contact us here.

The rise of mobile technology and automated platforms has led to more advanced self-servicing and convenience for consumers. Ironically, many of those same technologies also lead to more call center interactions and human intervention when customers are unable to complete transactions on their own, which causes frustration (long call wait times, annoying security questions to verify identity, and then having to re-verify your identity each time you are transferred to another part of the call center), as well as higher expenses and a decline in customer satisfaction.

Payfone CEO Rodger Desai recently joined a panel of industry experts from Infobip, Citi, and Amazon Web Services at Medici’s inaugural Inner Circle event to share insights about what companies can do to differentiate themselves with safer, faster and easier customer experiences and stay relevant in the digital age.

See highlights from the discussion >

Growing instances of fraud in digital channels (“year-over-year online fraud losses are up 10% or more for 60% of FI risk executives surveyed” – Aite Group research, 2019) are forcing enterprises to design their customer experiences around preventing fraud rather than creating great customer experiences with fast and easy interactions. The fear of fraud overtaking the desire to deliver great user experiences creates a “Trust Gap” whereby most companies can only “pass” ~40% of customers during digital interactions (such as logging in to online or mobile accounts or calling into a call center) without subjecting them to cumbersome identity authentication processes such as security questions and SMS passcodes. The Trust Gap describes the discrepancy between the ~60% of interactions that brands typically treat with suspicion despite the fact that only 2-3% of transactions actually deserve further inspection.

Research indicates that many enterprises are actively working to overcome the Trust Gap to be able to extend the best possible user experiences to customers without sacrificing security. According to Aite Group, 86% of merchants surveyed and 88% of FI respondents indicated that improving the CX is the #1 key factor driving their investments in anti-fraud technology.

How can companies use the Trust Gap to their benefit to get a leg-up on the competition? Head to Forbes to read what our CEO, Rodger Desai, says about how trust will be the KPI that reshuffles the Fortune 500, and what enterprises can do to start capitalizing on this trend.

Read the full article on Forbes >

Our clients are able to extend great digital experiences to their customers who have high Trust Scores – but what about those consumers who have Trust Scores below 300, which may be an indicator of unusual behavior, synthetic identity fraud, or SIM swap and other attacks?

Adaptive Orchestration is a real-time measure of identity confidence for those consumers who cannot be immediately passed because their Trust Score is too low, or whose use case requires multi-factor authentication, thus requiring further investigation. With Adaptive Orchestration, additional methods such as ‘take a selfie’ can be used to inform the Trust Score in real time. This process may be used to further verify consumers with Trust Scores between 300-630 who may be legitimate but are showing unusual behavior.

The image above shows one example of how adaptive orchestration allows a consumer to take a selfie in real time and have it instantly matched with their US passport on file.

After a successful step-up authentication that passes the customer via Adaptive Orchestration, the Trust Score immediately adjusts to a level of 630 or above, and will persist to avoid the need to step-up the same customer in the future if no new indicators of unusual behavior are evident. All of this is seamlessly orchestrated across all channels via the Payfone Trust Platform.

To learn more about Adaptive Orchestration, contact us.