Balancing Fraud Prevention and Customer Experience

We sat down with Bala Kumar, CPO of Jumio, to discuss balancing the customer and fraud prevention.

1) Data shows that 80% of customers feel the experience a company offers is as important as its products and services. Why has this become the case in the last decade?

In today’s digital world, customer experience (CX) is more important for brands than ever before because it shapes the way customers view your business. Over the last decade, CX has become a critical business priority, driving growth and revenue at companies across the world. CX touchpoints have the power to build customer loyalty or make consumers seek out competing products or services to find a better experience. Especially during the COVID-19 shutdowns, digital CX was all companies could rely on to drive traffic since brick-and-mortar operations were all closed.

2) What are some examples of common pitfalls that brands face when it comes to achieving better CX, while also thwarting fraudsters?

While security is critical in today’s digital world, it’s common for brands to add too many different security steps for customers to log in to their accounts in order to make a purchase. As you can imagine, this can cause the customer to get frustrated and abandon their cart. On the flip side, if an app or website doesn’t have secure enough identity verification processes, customers will be concerned their personal data isn’t safe and avoid making purchases or other transactions with that business. It’s critical to find a balance where the business delivers a smooth experience and the customer also feels protected.

3) Why do tighter security measures tend to negatively impact customer experience (CX)?

Historically, when more friction is added to the account login process, it becomes more secure because of the additional steps verifying the user before they can access an app or web service. Each different step — entering your PIN, answering security questions — could prevent a fraudster from gaining access to your account, but for you, it’s just another hoop to jump through that takes more of your valuable time. Today, each consumer has so many various passwords to remember for each app or service, we end up wasting a significant amount of time resetting our passwords every time we forget one, which negatively impacts CX.

4) Tell us about the role of modern identity verification technology, such as biometric authentication, for mitigating fraudulent transactions.

When companies adopt biometric authentication (such as facial or fingerprint recognition) to replace traditional passwords, knowledge-based authentication and SMS-based two-factor authentication, they can authenticate users without adding even more verification steps. With biometrics in place, it's much more difficult for fraudsters to impersonate real customers. For the user, biometric authentication is as simple as taking a selfie. Advanced face recognition and selfie technology quickly and securely authenticates users and unlocks their digital identities in real time while certified liveness detection protects against spoofing and deepfake attempts.

5) What advice do you have for companies trying to find the balance between strong fraud prevention and providing customers with a frictionless experience?

If your organization can leverage biometrics and authenticate customer government-issued IDs in real-time for all transactions, it's possible to achieve both tight security and a better overall CX. This can be done with the identity verification technology mentioned above to confirm the user is who they say they are. With that said, fraud is always evolving, and fraudsters are constantly refining their techniques to spoof advanced digital identity verification solutions. That’s why it’s so critical to invest in advanced ID verification technology, ensure all AI models are constantly being improved and involve human experts where necessary to effectively detect ID manipulations.

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.