{"id":11384,"date":"2023-03-23T10:00:23","date_gmt":"2023-03-23T10:00:23","guid":{"rendered":"https:\/\/www.contactbabel.com\/?p=11384"},"modified":"2023-03-24T11:53:48","modified_gmt":"2023-03-24T11:53:48","slug":"what-are-some-of-the-customer-identity-verification-processes-that-contact-centres-are-best-advised-to-put-in-place-for-fraud-reduction","status":"publish","type":"post","link":"https:\/\/www.contactbabel.com\/staging\/?p=11384","title":{"rendered":"What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">An increasing number of <\/span><a href=\"https:\/\/www.contactbabel.com\/us-cx-dmg-2\/\"><span style=\"font-weight: 400;\">customer experience<\/span><\/a><span style=\"font-weight: 400;\"> journeys in the 2020s begin with some form of identity verification process. Such customer security processes are about two factors: whether the person reaching out to the contact centre is who they say they are, and whether that person is allowed to do what they are trying to do.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Until just a few years ago, many businesses relied on trusting that the customer was who they claimed to be \u2013 to this end, the contact centre might have only asked for a name and address.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since then, however, identity verification processes have come to be seen as critically important. As a consequence, for most calls that are not initial enquiries, the contact centre will now need to verify the caller\u2019s claimed identity by requesting further information that only the real customer would normally know. This is known as knowledge-based authentication, or KBA.\u00a0<\/span><\/p>\n<p><b>Amid heightened identity-theft risks, traditional challenge\/response approaches may no longer be enough\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The above might have seemed a sturdy enough approach to identity verification by many call centres, at least until recently. But is it enough in an era in which we hear of more and more instances of fraudsters being able to access customers\u2019 personal information, such as mother\u2019s maiden name, date of birth and even payment card details, as can be stolen from websites?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Indeed, research has found that fraudsters answer knowledge-based questions correctly a large majority of the time \u2013 a sure indication that many organisations need to further optimise their identity verification processes in ways that look beyond the traditional challenge\/response method.\u00a0<\/span><\/p>\n<p><b>What solutions are available to call centres looking to improve their identity verification?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Identity verification processes used by today\u2019s contact centres are typically based on one or more authentication factors that fall into the following generally accepted categories:\u00a0<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Something the customer knows \u2013 e.g., their password, PIN, or other memorable information\u00a0<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Something the customer is \u2013 a biometric such as a fingerprint, voiceprint or facial recognition<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Something the customer has \u2013 a tangible object such as a PIN-generating key fob, the three-digit or four-digit code on payment cards, or a registered phone to which an SMS or another authentication code can be sent\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Combining these factors allows for the creation of a more complex, and potentially more secure two-factor or three-factor (2FA\/3FA) authentication process. However, it can also often be quite inconvenient and time-consuming for customers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It might therefore be beneficial for the customer experience if there is an ability to rely on previously enrolled voice features, or to have the calling device, location, and other factors assessed pre-call. This would free up the customer from having to remember various pieces of information, or to carry around a code-generating device.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The threat landscape is changing rapidly, and contact centres need to evolve their approaches just as quickly to keep pace with it. To this end, your organisation might look more seriously at such potential methods as voice verification systems and \u2018phoneprinting\u2019, the latter otherwise known as call signalling analysis.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A voice verification system uses spoken words to generate a \u2018voiceprint\u2019, with each subsequent call able to be compared to a previously enrolled voiceprint to verify the customer\u2019s identity. Call signalling analysis, meanwhile, is the process by which the metadata surrounding a call can be looked at. This enables the identification of potentially fraudulent and suspicious calls that the business can then choose to handle differently.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Artificial intelligence (AI) and machine learning have also come into their own in recent years, being incorporated into the most sophisticated fraud detection solutions to identify fraudulent transactions and analyse cases where legitimate users fail the authentication attempt. This can feed into improvements of both security and the customer experience.\u00a0<\/span><\/p>\n<p><b>Would you like to gain further insights into how your contact centre can optimise customer experience and security?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Ultimately, a contact centre will be able to achieve the strongest security by putting in place multifactor authentication around voice biometrics, device authentication, shared information about fraudsters, and customer behaviour such as keypress analysis and call patterns.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our 2023 \u201cContact Centre Decision-Makers\u2019 Guides\u201d are now available to download for both <\/span><a href=\"https:\/\/www.contactbabel.com\/the-uk-contact-centre-decision-makers-guide\/\"><span style=\"font-weight: 400;\">UK<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.contactbabel.com\/the-us-contact-center-decision-makers-guide\/\"><span style=\"font-weight: 400;\">US-based<\/span><\/a><span style=\"font-weight: 400;\"> organisations. The \u201cFraud Reduction and PCI Compliance\u201d chapters within this could contain invaluable lessons for your business\u2019s efforts to enhance security arrangements and the all-round customer experience.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An increasing number of customer experience journeys in the 2020s begin with some form of identity verification process. Such customer security processes are about two factors: whether the person reaching out to the contact centre is who they say they are, and whether that person is allowed to do what they are trying to do.\u00a0 [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-11384","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction? - ContactBabel<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction? - ContactBabel\" \/>\n<meta property=\"og:description\" content=\"An increasing number of customer experience journeys in the 2020s begin with some form of identity verification process. Such customer security processes are about two factors: whether the person reaching out to the contact centre is who they say they are, and whether that person is allowed to do what they are trying to do.\u00a0 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.contactbabel.com\/staging\/?p=11384\" \/>\n<meta property=\"og:site_name\" content=\"ContactBabel\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-23T10:00:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-24T11:53:48+00:00\" \/>\n<meta name=\"author\" content=\"Steve Morrell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Morrell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/?p=11384#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/?p=11384\"},\"author\":{\"name\":\"Steve Morrell\",\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/#\\\/schema\\\/person\\\/640ee7c81fffe7769557c53dbd8d2678\"},\"headline\":\"What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction?\",\"datePublished\":\"2023-03-23T10:00:23+00:00\",\"dateModified\":\"2023-03-24T11:53:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/?p=11384\"},\"wordCount\":745,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/#organization\"},\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/?p=11384#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/?p=11384\",\"url\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/?p=11384\",\"name\":\"What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction? - ContactBabel\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/#website\"},\"datePublished\":\"2023-03-23T10:00:23+00:00\",\"dateModified\":\"2023-03-24T11:53:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/?p=11384#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/?p=11384\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/?p=11384#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/#website\",\"url\":\"https:\\\/\\\/www.contactbabel.com\\\/\",\"name\":\"ContactBabel\",\"description\":\"Contact Centre Research\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.contactbabel.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/#organization\",\"name\":\"ContactBabel\",\"url\":\"https:\\\/\\\/www.contactbabel.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/contact-babel-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/contact-babel-logo.jpg\",\"width\":900,\"height\":516,\"caption\":\"ContactBabel\"},\"image\":{\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.contactbabel.com\\\/#\\\/schema\\\/person\\\/640ee7c81fffe7769557c53dbd8d2678\",\"name\":\"Steve Morrell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/67de9ecbb5b59db3937bb48e75db528b628ab7faacdeb54b8f6bbc67fd3d150c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/67de9ecbb5b59db3937bb48e75db528b628ab7faacdeb54b8f6bbc67fd3d150c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/67de9ecbb5b59db3937bb48e75db528b628ab7faacdeb54b8f6bbc67fd3d150c?s=96&d=mm&r=g\",\"caption\":\"Steve Morrell\"},\"url\":\"https:\\\/\\\/www.contactbabel.com\\\/staging\\\/?author=20\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction? - ContactBabel","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction? - ContactBabel","og_description":"An increasing number of customer experience journeys in the 2020s begin with some form of identity verification process. Such customer security processes are about two factors: whether the person reaching out to the contact centre is who they say they are, and whether that person is allowed to do what they are trying to do.\u00a0 [&hellip;]","og_url":"https:\/\/www.contactbabel.com\/staging\/?p=11384","og_site_name":"ContactBabel","article_published_time":"2023-03-23T10:00:23+00:00","article_modified_time":"2023-03-24T11:53:48+00:00","author":"Steve Morrell","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve Morrell","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.contactbabel.com\/staging\/?p=11384#article","isPartOf":{"@id":"https:\/\/www.contactbabel.com\/staging\/?p=11384"},"author":{"name":"Steve Morrell","@id":"https:\/\/www.contactbabel.com\/#\/schema\/person\/640ee7c81fffe7769557c53dbd8d2678"},"headline":"What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction?","datePublished":"2023-03-23T10:00:23+00:00","dateModified":"2023-03-24T11:53:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.contactbabel.com\/staging\/?p=11384"},"wordCount":745,"commentCount":0,"publisher":{"@id":"https:\/\/www.contactbabel.com\/#organization"},"articleSection":["Uncategorized"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.contactbabel.com\/staging\/?p=11384#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.contactbabel.com\/staging\/?p=11384","url":"https:\/\/www.contactbabel.com\/staging\/?p=11384","name":"What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction? - ContactBabel","isPartOf":{"@id":"https:\/\/www.contactbabel.com\/#website"},"datePublished":"2023-03-23T10:00:23+00:00","dateModified":"2023-03-24T11:53:48+00:00","breadcrumb":{"@id":"https:\/\/www.contactbabel.com\/staging\/?p=11384#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.contactbabel.com\/staging\/?p=11384"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.contactbabel.com\/staging\/?p=11384#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.contactbabel.com\/staging\/"},{"@type":"ListItem","position":2,"name":"What are some of the customer identity verification processes that contact centres are best advised to put in place for fraud reduction?"}]},{"@type":"WebSite","@id":"https:\/\/www.contactbabel.com\/#website","url":"https:\/\/www.contactbabel.com\/","name":"ContactBabel","description":"Contact Centre Research","publisher":{"@id":"https:\/\/www.contactbabel.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.contactbabel.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.contactbabel.com\/#organization","name":"ContactBabel","url":"https:\/\/www.contactbabel.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.contactbabel.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.contactbabel.com\/staging\/wp-content\/uploads\/2020\/02\/contact-babel-logo.jpg","contentUrl":"https:\/\/www.contactbabel.com\/staging\/wp-content\/uploads\/2020\/02\/contact-babel-logo.jpg","width":900,"height":516,"caption":"ContactBabel"},"image":{"@id":"https:\/\/www.contactbabel.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.contactbabel.com\/#\/schema\/person\/640ee7c81fffe7769557c53dbd8d2678","name":"Steve Morrell","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/67de9ecbb5b59db3937bb48e75db528b628ab7faacdeb54b8f6bbc67fd3d150c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/67de9ecbb5b59db3937bb48e75db528b628ab7faacdeb54b8f6bbc67fd3d150c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/67de9ecbb5b59db3937bb48e75db528b628ab7faacdeb54b8f6bbc67fd3d150c?s=96&d=mm&r=g","caption":"Steve Morrell"},"url":"https:\/\/www.contactbabel.com\/staging\/?author=20"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.contactbabel.com\/staging\/index.php?rest_route=\/wp\/v2\/posts\/11384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.contactbabel.com\/staging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.contactbabel.com\/staging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.contactbabel.com\/staging\/index.php?rest_route=\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.contactbabel.com\/staging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11384"}],"version-history":[{"count":2,"href":"https:\/\/www.contactbabel.com\/staging\/index.php?rest_route=\/wp\/v2\/posts\/11384\/revisions"}],"predecessor-version":[{"id":11386,"href":"https:\/\/www.contactbabel.com\/staging\/index.php?rest_route=\/wp\/v2\/posts\/11384\/revisions\/11386"}],"wp:attachment":[{"href":"https:\/\/www.contactbabel.com\/staging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.contactbabel.com\/staging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.contactbabel.com\/staging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}