Balancing Fraud Prevention and Customer Experience

We sat down with Bala Kumar, CPO of Jumio, to discuss balancing the customer and fraud prevention.

1) Data shows that 80% of customers feel the experience a company offers is as important as its products and services. Why has this become the case in the last decade?

In today’s digital world, customer experience (CX) is more important for brands than ever before because it shapes the way customers view your business. Over the last decade, CX has become a critical business priority, driving growth and revenue at companies across the world. CX touchpoints have the power to build customer loyalty or make consumers seek out competing products or services to find a better experience. Especially during the COVID-19 shutdowns, digital CX was all companies could rely on to drive traffic since brick-and-mortar operations were all closed.

2) What are some examples of common pitfalls that brands face when it comes to achieving better CX, while also thwarting fraudsters?

While security is critical in today’s digital world, it’s common for brands to add too many different security steps for customers to log in to their accounts in order to make a purchase. As you can imagine, this can cause the customer to get frustrated and abandon their cart. On the flip side, if an app or website doesn’t have secure enough identity verification processes, customers will be concerned their personal data isn’t safe and avoid making purchases or other transactions with that business. It’s critical to find a balance where the business delivers a smooth experience and the customer also feels protected.

3) Why do tighter security measures tend to negatively impact customer experience (CX)?

Historically, when more friction is added to the account login process, it becomes more secure because of the additional steps verifying the user before they can access an app or web service. Each different step — entering your PIN, answering security questions — could prevent a fraudster from gaining access to your account, but for you, it’s just another hoop to jump through that takes more of your valuable time. Today, each consumer has so many various passwords to remember for each app or service, we end up wasting a significant amount of time resetting our passwords every time we forget one, which negatively impacts CX.

4) Tell us about the role of modern identity verification technology, such as biometric authentication, for mitigating fraudulent transactions.

When companies adopt biometric authentication (such as facial or fingerprint recognition) to replace traditional passwords, knowledge-based authentication and SMS-based two-factor authentication, they can authenticate users without adding even more verification steps. With biometrics in place, it's much more difficult for fraudsters to impersonate real customers. For the user, biometric authentication is as simple as taking a selfie. Advanced face recognition and selfie technology quickly and securely authenticates users and unlocks their digital identities in real time while certified liveness detection protects against spoofing and deepfake attempts.

5) What advice do you have for companies trying to find the balance between strong fraud prevention and providing customers with a frictionless experience?

If your organization can leverage biometrics and authenticate customer government-issued IDs in real-time for all transactions, it's possible to achieve both tight security and a better overall CX. This can be done with the identity verification technology mentioned above to confirm the user is who they say they are. With that said, fraud is always evolving, and fraudsters are constantly refining their techniques to spoof advanced digital identity verification solutions. That’s why it’s so critical to invest in advanced ID verification technology, ensure all AI models are constantly being improved and involve human experts where necessary to effectively detect ID manipulations.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.