Information Security
For Credit Managers
We help customers…
Onboard customers quickly
Online credit applications
Automated credit decisioning
Ensure timely payment
Debtor Risk Insights
Automated Collections
Debtor Management solution for Small Businesses
Make informed decisions and minimise risk
Credit Risk Insights Credit Reports (AU & International) Third party financial risk assessments AML/CTF Compliance Reports
Keep up-to-date with customer changes and risks
Monitoring & Alerts Portfolio Health Check
Custom RiskScore
Our Unique Data
We set ourselves apart by providing unique data not accessible anywhere else. In total, you will have access to over 50 public and private data sources to inform your risk decisions better.
1
2
3 Credit Applications Fraud Protecting your company’s reputation
Information Security
Acquisition - Credit Application
Some important questions to ask yourself:
• What are we doing with the data?
• Why do we want this data?
• Is there a different way?
Acquisition – Identity Documentation
Key questions to ask:
• Why do I need this information?
• How long should I keep this information?
• Are there certain parts I can destroy immediately?
Fraud - Costs
My margins are too small. I can’t afford this.
• Alternatives such as email and SMS verification
• Video recording
• Zoom/Team call verification
Acquisition - Credit Cards
Key questions to ask:
• Why do I need this information?
• How long should I keep this information?
Acquisition – Financial Documents
Move away from bank statements
• Consumer Data Rights
• Financial Risk Assessments
Acquisition – Processes
Technology changes isn’t the only option!
• Cash on Delivery
• Segment your customers
• Change processes
Review your internal processes to see if there are other ways to limit data collecting data
Protecting your company’s reputation
RULE #1
Storage
Know where data is being stored
• Classify data
• Audit Trails
• Vendor Security Check
Usage
Which employees have access?
• Audit Trails
• Least Privileged Access
• Prevent bulk downloads
Deletion
Delete delete delete
• Remove PII
• Review usefulness
• Review Vendor Policies
Impact
• Average data breach cost AUD$6 million
• Fines > $50 million
• Employee devices are the weakest link
Cyber incident breakdown