Page 170 - Cyber Defense eMagazine December 2022 Edition
P. 170

current fraud solutions is that their risk assessments rely on the aggregation of multiple rules based on
            digital identity data and user behavior across multiple individual interactions. For some organizations,
            these  rules  can  run  into  the  hundreds  and  thousands,  which  means  making  a  risk  decision  is  both
            complex and lengthy. Alongside this, there is an industry movement towards simplicity in systems due to
            lengthy, adhoc and often complicated decisioning processes which can fail during times of employee
            churn and talent shortages.

            Businesses need a simple way of aggregating complex data over time so that they can compare an
            existing action, or user journey, against previous patterns, but without overcomplicating this with multiple,
            extensive lists of rules.

            Creating ways of aggregating data across devices, locations, behaviors and user journey behavior would
            allow risk assessments to be made based on patterns, or signatures, rather than binary rules.

            This is particularly powerful across user journey behaviors. For example, businesses could track similar
            journey  signatures  for  something  like  Account  Takeover,  linking particular  credential  testing  and  bot
            attacks with downstream attacks on a user accounts, or fraudulent credit card payments.


            Trusted  behavior  patterns  can  essentially  be  “cohort-modelled”  to  reduce  the  number  of  legitimate
            customers that are stepped up, even if they’re new to a business and the system hasn’t had time to
            baseline them. Further, any anomalies can be spotted at multiple stages of a digital interaction and
            interventions  made  in  real  time,  on  a  per-user  basis.  It  all  makes  for  a  more  seamless  customer
            experience while keeping fraud losses and chargebacks to a minimum.



            Eliminating the siloes that fraudsters exploit

            By understanding the context of the entire user journey and harnessing aggregated digital “signatures”
            to simplify risk decisions, organizations can start to join together every step of a user’s digital journey,
            removing the siloes that fraudsters play in and better separating good and bad intent.

            And as part of this approach, real time intervention is key. Businesses want to block high-risk behavior
            before it impacts either their customers or their bottom line. They can’t afford to wait for the next release
            cycle  or  resource  availability.  Seeing  high-risk  behavior  and  either  stopping  a  transaction  dead,  or
            sending  it  for  further  review,  reduces  both  risk  and  the  opportunity  for  fraudsters  to  pivot  to  a  new
            vulnerability. In this way, they can enhance the user experience by making sure their best customers are
            recognized and rewarded with digital experiences they deserve.















            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         170
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   165   166   167   168   169   170   171   172   173   174   175