Fraud Fighers Chapter 1: Know Your Fraudster
Fraud Fighers Chapter 1: Know Your Fraudster
copy gray iconlinkedin graytwitter grey

Fraud Fighers Chapter 1: Know Your Fraudster

June 14, 2023

This chapter is part of the Fraud Fighters Manual, a collective set of stories from Fintech fraud fighters. Download your copy of the Fraud Fighters Manual here to read the full version.

Chapter 1: Know Your Fraudster

“The most important thing is to be aware of the types of fraud that exist and to be very vigilant about putting human effort into analysis and critical thought.” - Robert Reynolds, Pinwheel

Fraud and fraudsters come in many flavors. First party and third party. External and internal. Some are driven by opportunity—while others carefully plan their attack. But every type of fraudster relies upon a veil of deception. Once that deception is pierced, the threat is mitigated.

Know Your Customer (KYC) and Know Your Business (KYB) regulations provide guidelines through which organizations can better identify potential fraudsters and better protect themselves against the financial disruption of fraud. 

Fraud is Everywhere—and Difficult to Defend Against

Fraud is on the rise. According to PwC’s Global Economic Crime and Fraud Survey 2022, 51% of responding organizations reported experiencing fraud within the last two years, the highest level in 20 years. In its 2023 Fraud and Industry Trends, LexisNexis attributes rising fraud to various societal accelerants, including digital transformation, increased automation, and disruptive new technologies.

But organizations are not helpless. Behind every fraud, there’s a person. By understanding—and identifying—fraudsters, an organization can develop its first and most critical line of defense.

The average US Fintech loses $51 million to fraud every year.

In 2022, PYMNTS and Ingo Money surveyed 200 Fintech executives in the United States and discovered that the average Fintech company loses $51 million to fraud every year. The same report revealed that 47% of Fintechs believe that fraud is their most pressing challenge.

We interviewed Robert Reynolds to learn more about fraudsters, how they operate, and how they can be detected through advanced KYC/KYB processes. Robert Reynolds is the Head of Product at Pinwheel (pinwheelapi.com), a B2B company that helps facilitate connectivity between institutions and payroll systems. Pinwheel’s mission is to enable greater financial outcomes for end consumers by creating greater access to credit—and simplifying data-sharing patterns between consumers and financial institutions. 

Robert has spent 15 years focused on lending, Fintech, consumer lending, and banking-as-a-service. His fraud-related knowledge extends to unsecured business loans, auto loans, and credit loans across the US, UK, Australia, and Canada.

The Many Types of Modern Fraud

How do you defend yourself against an attack when you don’t know where it will come from—or who it will be? There are many types of fraud, perpetrated by many types of fraudsters. The modern organization faces global exposure and rising advancements in tech.

First-party vs. Second-party vs. Third-party Fraud

According to Robert, one of the most important things a company can do to identify bad actors “is to be aware of the types of fraud that exist.” Based on that knowledge, organizations can then develop dynamic policies to stop fraud in its tracks.

Fraud is frequently categorized as first-party or third-party, depending on how the fraudster presents their identity. In 2021, the Federal Trade Commission received close to 1.4 million reports of identity theft from customers. 

  • First-party fraud. A fraudster knowingly misrepresents themselves or their actions for material gain. A car salesman sells a car that they know will break down in a few days—and tells the customer that there’s nothing wrong with it. An executive writes a large check they know will bounce to secure a contract. Robert points out that “in a lending environment, it’s sometimes called friendly fraud as well.”
  • Third-party fraud. A fraudster uses someone else’s personal information for material gain. “It can manifest primarily digitally—in the form of information gleaned from the dark web or stolen information from phishing websites—but it can also manifest physically in the real world,” says Robert. An identity thief uses someone else’s information to procure a car loan, which is then never paid. Or they pretend to be an executive and write a large check to themselves.

With the right identity verification processes in place, organizations can detect fraudsters in all shapes and forms to prevent attacks from taking a serious toll.

The 7 Fraudster Archetypes

Fraudsters differ in origins and levels of premeditation. A fraudster could be a teenager idly trying out Social Security numbers they purchased online—or a well-planned group of malicious attackers for whom committing fraud is their day job.

There are likely hundreds of thousands of fraudsters out there. But they tend to fit into one of seven major categories.

1. The Thief

Environment: External

Premeditation: None

Fraud Type: First-party

The Thief is an impulsive individual generally conducting a reckless, one-off fraud. A young partier discovers a credit card on the dance floor and uses it to buy just a few drinks. An employee sees a coworker’s phone unlocked—and takes the opportunity to Cash App themself hundreds of dollars. 

Thieves act when the opportunity arises. But any time an opportunity does arise, the Thief might be there. They can be thwarted by most rudimentary identification checks.

2. The Con Artist

Environment: Internal or External

Premeditation: Moderate

Fraud Type: First-party

The Con Artist lies to get their way—whether they have privileged information or not. A person walks into a bank and insists that the ATM short-changed them, getting the teller to hand over money that they weren’t actually owed. A vendor says they haven’t been paid, even though they were. 

Con Artists exploit human nature by lying about their identity and situation. They are defeated through checks and balances. The proper systems and processes make it harder to manipulate an individual.

3. The Disguise Artist

Environment: External

Premeditation: Moderate

Fraud Type: Third-party

The Disguise Artist uses another person’s identity to give themselves access to resources. A cybercriminal sends out an email as a C-suite executive to have an executive assistant wire them money. A vendor forges paperwork stating that a former partner agreed to a contract that was never actually negotiated. 

Disguise Artists don’t usually have any familiarity with the individual whose identity they are stealing. Rather than having privileged information (such as a Social Security number), they use social engineering and confidence tricks. Identity verification and processes will quickly reveal their deception.

4. The Impersonator

Environment: Internal or External

Premeditation: Moderate

Fraud Type: Third-party

The Impersonator misrepresents who they are for profit—and they usually have a plan. A parent with a bad credit score uses their child’s identification to open a credit account. A business owner forges their partner’s signature on documents to take out loans. 

An Impersonator goes a step further than the Disguise Artist by using actual personally identifiable information to pretend to be someone. Thus, it’s not enough to simply verify that an “identity” is real; to protect against an Impersonator, you must also verify that the person is who they say they are. This is particularly difficult in the case of family fraud, as relatives are frequently able to take on an identity quite easily.

When fraud comes from inside the household.

“Family fraud is when you have someone who is very close to the victim and can easily represent their identity, misrepresenting the state of their interest or needs,” says Robert. “And that could be a spouse, caregiver, or another family member.”

5. The Opportunist

Environment: Internal

Premeditation: None

Fraud Type: First-party

The Opportunist exploits ad hoc processes or system vulnerabilities. A retail investor realizes that a stock trading app is giving them free stocks every day, instead of once, and continuously exploits the error. A vendor sends fewer inventory items in a shipment after noticing they haven’t been counted. 

An Opportunist does not misrepresent who they are—and they don’t set out to commit fraud or even thievery. Rather, they take advantage of exploits that already exist to get away with small things that they should not. To identify Opportunists, not only does identity need to be tracked, but also behavior.

6. Organized Criminals

Environment: External

Premeditation: High

Fraud Type: Varies

The Organized Criminal is working with a professional team. An organized cyber-criminal gang conducts a DDoS attack on a cryptocurrency exchange with the goal of gaining access to the system. A ring of multiple identity thieves represents itself as a business to a bank, walking away with a sizable loan. 

Organized Criminals have resources. They are extremely dangerous but comparatively rare. They have the tools and processes to conduct significant damage—but they can be defeated by the same identity-driven protocols as other types of fraudsters.

7. The Shady Business

Environment: External

Premeditation: High

Fraud Type: Varies

The Shady Business is a business knowingly operating outside of regulatory compliance or even the law. A company pushes forward with a project that will incur major environmental compliance issues. A business deals with individuals that it knows are committing fraud or forgery. 

Shady Businesses bring risk to banks and other financial institutions. Organizations have to vet and monitor their business relationships in addition to their customer relationships to avoid financial and legal consequences.

Know Your Customer (KYC) and Know Your Business (KYB) Strategies

Once you know your fraudsters, it’s time to detect them—through identity verification and due diligence. KYC/KYB regulations form the framework of the necessary standards and processes.

Know Your Customer

KYC is a regulatory requirement for financial institutions. Fintech companies, banks, and credit unions must identify individuals before taking them on as customers. KYC strategies protect against the Disguise Artist, Impersonator, and Organized Criminals. 

Compared to KYB, KYC is fairly easy to implement. Under KYC, you must:

  • Collect (and protect) personally identifiable information (PII).
  • Process the information internally.
  • Confirm that the information is valid and accurate.

Robert highlights the importance of constantly revising KYC strategies, particularly when dealing with third-party fraud. “You’re effectively fighting against an enemy with unlimited time and unlimited resources,” he says. “The idea that they’re not going to change their strategies in response to your tactics is somewhat foolhardy. You need dedication to updating and changing.” 

For most customers, identity verification processes are easy to manage and well-tolerated. For financial institutions, solutions are available to manage and streamline the verification process end to end.

Know Your Business

KYB refers to the process of verifying any vendors or business entities that the organization does business with. KYB strategies are harder to implement because they require a higher level of due diligence. As Robert points out, “in the case of KYB, where you’re verifying the legitimacy of a company to assess the risk of doing business with them, that’s more acutely associated with the actual legitimacy of the business. In that sense, just meeting the bare minimum of the legal requirement is not going to be nearly enough to actually prevent and mitigate fraud.”

Under KYB, organizations must collect and process large volumes of data. They must investigate and confirm the company’s financial, legal, and regulatory compliance information—and they must complete background checks on major stakeholders. In short, “KYB success relies very, very heavily on governance and process control to ensure compliance,” Robert says. 

KYB strategies protect financial institutions from large-scale fraud, such as those conducted by Organized Criminals or the Shady Business. Critically, KYB prevents a financial institution from doing business with a company that could be otherwise involved in breaking the law.

Frictionless Fraudster Management

All fraudsters have something in common: they are lying. A fraudster misrepresents who they are, what they want, or what they can provide. Confirm all the facts to understand the end game of the fraudster—and to prevent them from getting what they want.

Today, it’s not enough to simply meet the standards of KYC/KYB regulations. Companies must use all available data to identify the most clever fraud instances.

Advanced KYC/KYB Strategies

Robert points out that “if you want no fraud, you’ll have no volume run through your business.” Reducing fraud frequently means adding friction—and adding friction reduces volume. But there are complex KYC/KYB practices that operate behind the scenes, effectively identifying the hallmarks of fraud before the fraud is realized and friction created. 

For KYC, companies can use contextual and behavioral clues to identify potential fraud. Is a new device being used? Is the user in a new location? Is the email address new? Is the phone number verified? These are clues passively collected without interruption to the customer.

“This requires true human intervention, like evaluating and categorizing fraud into different categories and coming to good definitions,” Robert explains. “And being diligent about sampling enough of your consumer data to not just trust the definitions you have in place but staying vigilant and trying to observe new types of fraud.”

For KYB, companies have to be more discerning. They need to use third-party solutions to ensure that the business isn’t just active—but that it’s trustworthy. And like advanced KYC policies, the best KYB strategies use behavioral modeling and real-time detection. Are unusual behavioral patterns occurring under the account? Is the account asking for something it has never asked for before?

The behavioral hallmarks of fraud.

“I know what a good customer looks like, how they act, how much time they spend doing things, how often, and in which ways they communicate with me,” says Robert. “And I think one of the hardest things for fraudsters to determine is what that profile of a normal consumer looks like and to mirror it.” 

Key Takeaways:

  • There are many types of fraudsters, with varying degrees of organization and competency.
  • On both a customer and business level, your goal is to catch bad actors while letting good actors through—as seamlessly as possible. 
  • Using advanced KYC and KYB strategies like behavioral modeling and real-time detection paired with continuous human intervention are critical steps for success.

It is one thing to be aware of the various types of fraud and the fraudster archetypes involved. 

But the challenge comes in dissecting and then piecing together who someone truly is and whether they are who they say they are. Find out what happens in the next chapter by downloading your copy of the Fraud Fighters Manual here.

linkedin gray logotwitter gray logo
Insights

Fraud Fighers Chapter 1: Know Your Fraudster

Insights

Fraud Fighers Chapter 1: Know Your Fraudster

Challenge

checkmark icon
Solution

Ready to discover what Pinwheel can do for you?

Get Started ➔

This chapter is part of the Fraud Fighters Manual, a collective set of stories from Fintech fraud fighters. Download your copy of the Fraud Fighters Manual here to read the full version.

Chapter 1: Know Your Fraudster

“The most important thing is to be aware of the types of fraud that exist and to be very vigilant about putting human effort into analysis and critical thought.” - Robert Reynolds, Pinwheel

Fraud and fraudsters come in many flavors. First party and third party. External and internal. Some are driven by opportunity—while others carefully plan their attack. But every type of fraudster relies upon a veil of deception. Once that deception is pierced, the threat is mitigated.

Know Your Customer (KYC) and Know Your Business (KYB) regulations provide guidelines through which organizations can better identify potential fraudsters and better protect themselves against the financial disruption of fraud. 

Fraud is Everywhere—and Difficult to Defend Against

Fraud is on the rise. According to PwC’s Global Economic Crime and Fraud Survey 2022, 51% of responding organizations reported experiencing fraud within the last two years, the highest level in 20 years. In its 2023 Fraud and Industry Trends, LexisNexis attributes rising fraud to various societal accelerants, including digital transformation, increased automation, and disruptive new technologies.

But organizations are not helpless. Behind every fraud, there’s a person. By understanding—and identifying—fraudsters, an organization can develop its first and most critical line of defense.

The average US Fintech loses $51 million to fraud every year.

In 2022, PYMNTS and Ingo Money surveyed 200 Fintech executives in the United States and discovered that the average Fintech company loses $51 million to fraud every year. The same report revealed that 47% of Fintechs believe that fraud is their most pressing challenge.

We interviewed Robert Reynolds to learn more about fraudsters, how they operate, and how they can be detected through advanced KYC/KYB processes. Robert Reynolds is the Head of Product at Pinwheel (pinwheelapi.com), a B2B company that helps facilitate connectivity between institutions and payroll systems. Pinwheel’s mission is to enable greater financial outcomes for end consumers by creating greater access to credit—and simplifying data-sharing patterns between consumers and financial institutions. 

Robert has spent 15 years focused on lending, Fintech, consumer lending, and banking-as-a-service. His fraud-related knowledge extends to unsecured business loans, auto loans, and credit loans across the US, UK, Australia, and Canada.

The Many Types of Modern Fraud

How do you defend yourself against an attack when you don’t know where it will come from—or who it will be? There are many types of fraud, perpetrated by many types of fraudsters. The modern organization faces global exposure and rising advancements in tech.

First-party vs. Second-party vs. Third-party Fraud

According to Robert, one of the most important things a company can do to identify bad actors “is to be aware of the types of fraud that exist.” Based on that knowledge, organizations can then develop dynamic policies to stop fraud in its tracks.

Fraud is frequently categorized as first-party or third-party, depending on how the fraudster presents their identity. In 2021, the Federal Trade Commission received close to 1.4 million reports of identity theft from customers. 

  • First-party fraud. A fraudster knowingly misrepresents themselves or their actions for material gain. A car salesman sells a car that they know will break down in a few days—and tells the customer that there’s nothing wrong with it. An executive writes a large check they know will bounce to secure a contract. Robert points out that “in a lending environment, it’s sometimes called friendly fraud as well.”
  • Third-party fraud. A fraudster uses someone else’s personal information for material gain. “It can manifest primarily digitally—in the form of information gleaned from the dark web or stolen information from phishing websites—but it can also manifest physically in the real world,” says Robert. An identity thief uses someone else’s information to procure a car loan, which is then never paid. Or they pretend to be an executive and write a large check to themselves.

With the right identity verification processes in place, organizations can detect fraudsters in all shapes and forms to prevent attacks from taking a serious toll.

The 7 Fraudster Archetypes

Fraudsters differ in origins and levels of premeditation. A fraudster could be a teenager idly trying out Social Security numbers they purchased online—or a well-planned group of malicious attackers for whom committing fraud is their day job.

There are likely hundreds of thousands of fraudsters out there. But they tend to fit into one of seven major categories.

1. The Thief

Environment: External

Premeditation: None

Fraud Type: First-party

The Thief is an impulsive individual generally conducting a reckless, one-off fraud. A young partier discovers a credit card on the dance floor and uses it to buy just a few drinks. An employee sees a coworker’s phone unlocked—and takes the opportunity to Cash App themself hundreds of dollars. 

Thieves act when the opportunity arises. But any time an opportunity does arise, the Thief might be there. They can be thwarted by most rudimentary identification checks.

2. The Con Artist

Environment: Internal or External

Premeditation: Moderate

Fraud Type: First-party

The Con Artist lies to get their way—whether they have privileged information or not. A person walks into a bank and insists that the ATM short-changed them, getting the teller to hand over money that they weren’t actually owed. A vendor says they haven’t been paid, even though they were. 

Con Artists exploit human nature by lying about their identity and situation. They are defeated through checks and balances. The proper systems and processes make it harder to manipulate an individual.

3. The Disguise Artist

Environment: External

Premeditation: Moderate

Fraud Type: Third-party

The Disguise Artist uses another person’s identity to give themselves access to resources. A cybercriminal sends out an email as a C-suite executive to have an executive assistant wire them money. A vendor forges paperwork stating that a former partner agreed to a contract that was never actually negotiated. 

Disguise Artists don’t usually have any familiarity with the individual whose identity they are stealing. Rather than having privileged information (such as a Social Security number), they use social engineering and confidence tricks. Identity verification and processes will quickly reveal their deception.

4. The Impersonator

Environment: Internal or External

Premeditation: Moderate

Fraud Type: Third-party

The Impersonator misrepresents who they are for profit—and they usually have a plan. A parent with a bad credit score uses their child’s identification to open a credit account. A business owner forges their partner’s signature on documents to take out loans. 

An Impersonator goes a step further than the Disguise Artist by using actual personally identifiable information to pretend to be someone. Thus, it’s not enough to simply verify that an “identity” is real; to protect against an Impersonator, you must also verify that the person is who they say they are. This is particularly difficult in the case of family fraud, as relatives are frequently able to take on an identity quite easily.

When fraud comes from inside the household.

“Family fraud is when you have someone who is very close to the victim and can easily represent their identity, misrepresenting the state of their interest or needs,” says Robert. “And that could be a spouse, caregiver, or another family member.”

5. The Opportunist

Environment: Internal

Premeditation: None

Fraud Type: First-party

The Opportunist exploits ad hoc processes or system vulnerabilities. A retail investor realizes that a stock trading app is giving them free stocks every day, instead of once, and continuously exploits the error. A vendor sends fewer inventory items in a shipment after noticing they haven’t been counted. 

An Opportunist does not misrepresent who they are—and they don’t set out to commit fraud or even thievery. Rather, they take advantage of exploits that already exist to get away with small things that they should not. To identify Opportunists, not only does identity need to be tracked, but also behavior.

6. Organized Criminals

Environment: External

Premeditation: High

Fraud Type: Varies

The Organized Criminal is working with a professional team. An organized cyber-criminal gang conducts a DDoS attack on a cryptocurrency exchange with the goal of gaining access to the system. A ring of multiple identity thieves represents itself as a business to a bank, walking away with a sizable loan. 

Organized Criminals have resources. They are extremely dangerous but comparatively rare. They have the tools and processes to conduct significant damage—but they can be defeated by the same identity-driven protocols as other types of fraudsters.

7. The Shady Business

Environment: External

Premeditation: High

Fraud Type: Varies

The Shady Business is a business knowingly operating outside of regulatory compliance or even the law. A company pushes forward with a project that will incur major environmental compliance issues. A business deals with individuals that it knows are committing fraud or forgery. 

Shady Businesses bring risk to banks and other financial institutions. Organizations have to vet and monitor their business relationships in addition to their customer relationships to avoid financial and legal consequences.

Know Your Customer (KYC) and Know Your Business (KYB) Strategies

Once you know your fraudsters, it’s time to detect them—through identity verification and due diligence. KYC/KYB regulations form the framework of the necessary standards and processes.

Know Your Customer

KYC is a regulatory requirement for financial institutions. Fintech companies, banks, and credit unions must identify individuals before taking them on as customers. KYC strategies protect against the Disguise Artist, Impersonator, and Organized Criminals. 

Compared to KYB, KYC is fairly easy to implement. Under KYC, you must:

  • Collect (and protect) personally identifiable information (PII).
  • Process the information internally.
  • Confirm that the information is valid and accurate.

Robert highlights the importance of constantly revising KYC strategies, particularly when dealing with third-party fraud. “You’re effectively fighting against an enemy with unlimited time and unlimited resources,” he says. “The idea that they’re not going to change their strategies in response to your tactics is somewhat foolhardy. You need dedication to updating and changing.” 

For most customers, identity verification processes are easy to manage and well-tolerated. For financial institutions, solutions are available to manage and streamline the verification process end to end.

Know Your Business

KYB refers to the process of verifying any vendors or business entities that the organization does business with. KYB strategies are harder to implement because they require a higher level of due diligence. As Robert points out, “in the case of KYB, where you’re verifying the legitimacy of a company to assess the risk of doing business with them, that’s more acutely associated with the actual legitimacy of the business. In that sense, just meeting the bare minimum of the legal requirement is not going to be nearly enough to actually prevent and mitigate fraud.”

Under KYB, organizations must collect and process large volumes of data. They must investigate and confirm the company’s financial, legal, and regulatory compliance information—and they must complete background checks on major stakeholders. In short, “KYB success relies very, very heavily on governance and process control to ensure compliance,” Robert says. 

KYB strategies protect financial institutions from large-scale fraud, such as those conducted by Organized Criminals or the Shady Business. Critically, KYB prevents a financial institution from doing business with a company that could be otherwise involved in breaking the law.

Frictionless Fraudster Management

All fraudsters have something in common: they are lying. A fraudster misrepresents who they are, what they want, or what they can provide. Confirm all the facts to understand the end game of the fraudster—and to prevent them from getting what they want.

Today, it’s not enough to simply meet the standards of KYC/KYB regulations. Companies must use all available data to identify the most clever fraud instances.

Advanced KYC/KYB Strategies

Robert points out that “if you want no fraud, you’ll have no volume run through your business.” Reducing fraud frequently means adding friction—and adding friction reduces volume. But there are complex KYC/KYB practices that operate behind the scenes, effectively identifying the hallmarks of fraud before the fraud is realized and friction created. 

For KYC, companies can use contextual and behavioral clues to identify potential fraud. Is a new device being used? Is the user in a new location? Is the email address new? Is the phone number verified? These are clues passively collected without interruption to the customer.

“This requires true human intervention, like evaluating and categorizing fraud into different categories and coming to good definitions,” Robert explains. “And being diligent about sampling enough of your consumer data to not just trust the definitions you have in place but staying vigilant and trying to observe new types of fraud.”

For KYB, companies have to be more discerning. They need to use third-party solutions to ensure that the business isn’t just active—but that it’s trustworthy. And like advanced KYC policies, the best KYB strategies use behavioral modeling and real-time detection. Are unusual behavioral patterns occurring under the account? Is the account asking for something it has never asked for before?

The behavioral hallmarks of fraud.

“I know what a good customer looks like, how they act, how much time they spend doing things, how often, and in which ways they communicate with me,” says Robert. “And I think one of the hardest things for fraudsters to determine is what that profile of a normal consumer looks like and to mirror it.” 

Key Takeaways:

  • There are many types of fraudsters, with varying degrees of organization and competency.
  • On both a customer and business level, your goal is to catch bad actors while letting good actors through—as seamlessly as possible. 
  • Using advanced KYC and KYB strategies like behavioral modeling and real-time detection paired with continuous human intervention are critical steps for success.

It is one thing to be aware of the various types of fraud and the fraudster archetypes involved. 

But the challenge comes in dissecting and then piecing together who someone truly is and whether they are who they say they are. Find out what happens in the next chapter by downloading your copy of the Fraud Fighters Manual here.

Always stay up to date

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
View our Privacy Policy   ➔

Up next

Pinwheel Pulse: 2024 Year in Review

Pinwheel Pulse: 2024 Year in Review

From groundbreaking product developments to new partnerships, 2024 has been a banner year for Pinwheel, our partners, and our customers.

Read more  ➔
Why credit unions have a neighborhood advantage

Why credit unions have a neighborhood advantage

n an era dominated by digital innovation, physical branches remain relevant—and even essential. While many national financial institutions are doubling down on digital channels and closing branches, 60% of new accounts are still being opened in person. This underscores a critical competitive differentiator for credit unions, who maintain a unique home town advantage.

Read more  ➔
The Product Pulse

The Product Pulse

Pinwheel Pulse is where we share recent highlights on our journey to building solutions that drive primacy and unlock the potential of payroll connectivity.

Read more  ➔
Introducing Bill Navigator

Introducing Bill Navigator

A new and powerful tool for banks to leverage in their battle for primacy.

Read more  ➔
PreMatch results are In

PreMatch results are In

We began beta testing our groundbreaking new solution for authorizing payroll accounts in Q1 2024. And we’re thrilled to share that the industry’s only 100% credential-less solution that automatically identifies users’ payroll accounts is living up to the hype.

Read more  ➔
How we achieve the industry’s best conversion rates

How we achieve the industry’s best conversion rates

Pinwheel Prime’s intelligent waterfall covers 100% of U.S. payroll scenarios and delivers 30% more successful conversions than any other provider in the industry.

Read more  ➔
Automated direct deposit is powering the next generation of growth for credit unions

Automated direct deposit is powering the next generation of growth for credit unions

Neo-banks like Cash App and Chime have mastered the art of digital onboarding, leveraging automated direct deposit features as a key driver of customer acquisition and long-term engagement. By investing in payroll integrations that deliver a seamless direct deposit enrollment option during onboarding, these fintech giants have grown their actively funded user base at hyper speeds.

Read more  ➔
Nassau Financial Credit Union Selects Pinwheel As Direct Deposit Switch Partner

Nassau Financial Credit Union Selects Pinwheel As Direct Deposit Switch Partner

Nassau Financial’s mission is to improve the financial well-being of each member in the communities we serve, reflecting the credit union philosophy of "People helping people."

Read more  ➔
Perpay increases direct deposit conversion rate for eligible users by 2.19x with Pinwheel PreMatch

Perpay increases direct deposit conversion rate for eligible users by 2.19x with Pinwheel PreMatch

Implementation of the Pinwheel Prematch feature took Perpay only 3 weeks, after which they saw an immediate performance uplift. For Perpay customers eligible for PreMatch, they saw a 2.19x increase to switch success rate, and an 11% overall switch conversion improvement.

Read more  ➔
Success rate for EECU’s deposit change feature improves by over 50% after switching to Pinwheel PreMatch

Success rate for EECU’s deposit change feature improves by over 50% after switching to Pinwheel PreMatch

Read more  ➔
SafeLink expands access to frictionless experiences

SafeLink expands access to frictionless experiences

In the ever-evolving landscape of banking and fintech, winning the primary banking relationship has never been more difficult. In our recent white paper, Primacy in personalized banking: a moving target, we reveal new consumer insights that emphasize the importance of offering seamless digital experiences to win and keep customers. 

Read more  ➔
Primacy in personalized banking: A moving target

Primacy in personalized banking: A moving target

Learn about changes to consumer behavior that have affected financial institutions' ability to achieve and defend primacy.

Read more  ➔
Industry leaders talk consumer bank switching behaviors

Industry leaders talk consumer bank switching behaviors

Are you curious about the latest behavioral trends in consumer banking? Do you want to know how top financial institutions are adapting to meet evolving customer needs? 

Read more  ➔
What drives primacy with today’s consumer?

What drives primacy with today’s consumer?

Discover what consumers believe is needed for bank account primacy, and what really motivates them to switch.

Read more  ➔
Why  are consumers on the move?

Why are consumers on the move?

See what's driving the acceleration of bank switching across generations.

Read more  ➔
The branch of the future

The branch of the future

With most banks focusing investments on digital and reducing branch networks, 60% of new accounts are still being opened in branch. For decades, bank branches have been a cornerstone of everyday life in America’s cities and towns. But these days, branches are getting harder and harder to come by. By the end of 2023, the number of bank branches in the U.S.

Read more  ➔
Giving credit where it’s due

Giving credit where it’s due

Are credit scores missing the point?Despite the lip service in banking pledging fairness and equity, systemic issues can allow discrimination in extending credit to surface in unexpected ways. One glaring example is the industry’s struggle to underwrite those who have non-traditional career histories or those who make their living through self employment or the gig economy. Whether they need to produce two years’ worth of tax returns or a specific credit score, many financially secure Americans still struggle to present the “right” paperwork. As a result, banks cannot deliver an optimal experience for:

Read more  ➔
Trust and Verify

Trust and Verify

Read more  ➔
Citizens & Pinwheel talk primacy

Citizens & Pinwheel talk primacy

A conversation with Chris Powell, EVP & Head of Deposits, Citizens Bank and Kurtis Lin, Co-Founder & CEO, Pinwheel. Last month, Pinwheel hosted a webinar with the Consumer Bankers Association to explore our latest research on The Power of Primacy conducted in partnership with The Digital Banking Report. In a discussion moderated by Pinwheel CMO, Crystal Gopman, Chris Powell, EVP and Head of Deposits at Citizens Bank and Pinwheel CEO, Kurtis Lin, delved deep into the challenges banks are facing today as they compete for share of wealth with the modern consumer. 

Read more  ➔
Be the Amazon of banks  

Be the Amazon of banks  

The next time you’re browsing on your phone, add this idea to your cart: Does your bank need to engage customers less like an overworked teller and more like Amazon?In a climate of exploding technology and regulatory scrutiny, the BAI Banking Outlook: 2024 Trends survey identified the customer digital experience as a top priority for this year, citing technology integration and intuitive platforms as the pathways to engagement that’s personal, frictionless – and even somewhat fun. But as you know, fraud mitigation and other protocols can introduce drag and result in user drop-off. “Somewhat unfairly, customers measure their bank’s digital delivery of services against the practices of world-class online retailers,” the survey concludes. 

Read more  ➔
Enhancing digital trust: Inside Pinwheel's commitment to security

Enhancing digital trust: Inside Pinwheel's commitment to security

Ensuring Digital Security in the rapidly evolving digital world, the importance of security cannot be overstated. As the Chief Information Security Officer at Pinwheel, I'm at the forefront of our battle against digital threats. Our mission is clear: to safeguard our clients' data with the most robust security measures available. This dedication is embodied in our two flagship products: Pinwheel Core and Pinwheel Prime.

Read more  ➔
Who’s making money moves in 2024?

Who’s making money moves in 2024?

Are your new customer acquisition goals higher than ever in 2024? Yes? Then, you’re on trend. Late last year, the BAI surveyed 102 financial services organizations to gain insights for the coming year. The findings of the study, the BAI 2024 Banking Outlook, placed customer acquisition in the top two priorities—just behind deposit growth—for bankers. Coming in third? You can probably guess. Enhanced digital banking experiences. And we’re here for it. 

Read more  ➔
New study confirms direct deposit unlocks primacy

New study confirms direct deposit unlocks primacy

The report highlights a significant disconnect between banks' customer acquisition strategies and consumer behavior. While banks continue to invest heavily in account opening incentives, such as cash bonuses and promotional offers, these efforts often fall short of their intended goal. To the dismay of banks, although they spend high acquisition costs to attract new customers, many of these accounts remain dormant.

Read more  ➔
Consumer bank switching behavior demystified

Consumer bank switching behavior demystified

My january piece on the offer wars got me thinking: what actually motivates consumers to switch banks? Are rich account opening incentives turning heads, or is our industry missing the mark? To answer this question, we partnered with Savanta research to understand the inner dialogue of a consumer contemplating a new banking relationship.

Read more  ➔
The metrics you care about the most are now available in real-time

The metrics you care about the most are now available in real-time

Pinwheel was founded to unlock powerful income data for financial institutions, so that they can better serve their users with more personalized products, driving long term relationships that are proven to deliver better financial outcomes. Introducing the Dashboard Activity Page for Real-Time Engagement Insights.

Read more  ➔
New Jack Henry partnership makes it easier for community banks to take advantage of Pinwheel

New Jack Henry partnership makes it easier for community banks to take advantage of Pinwheel

We are thrilled to announce Pinwheel's new strategic partnership with Jack Henry, a leading financial technology company, which gives their customers a fast path to implementation for the industry's top performing Direct Deposit Switching solution. This collaboration is set to revolutionize the digital direct deposit setup experience for accountholders at community and regional financial institutions.

Read more  ➔
 Pinwheel's CMO discusses bank competition for primacy in 2024

Pinwheel's CMO discusses bank competition for primacy in 2024

Banks rival top brands like Coke and P&G as the highest spending advertisers in the world. And bank marketing teams - channeling their best Cardi B energy - literally make money move with hundreds of millions of dollars at their disposal to hit annual growth goals. While the accounts keep rolling in, there’s a frantic scramble as institutions fumble in their attempts to convert active customers and meaningful engagement through aggressive, unsustainable offers. 

Read more  ➔
Hear from Pinwheel’s Chief revenue officer on growing profitably in 2024

Hear from Pinwheel’s Chief revenue officer on growing profitably in 2024

As the Chief Revenue Officer at Pinwheel, I speak to executives from the world’s top banks every day and I see first hand how rapidly the financial services industry is changing. With approximately 94% of the U.S. population holding bank accounts and a staggering 13 million new accounts opened in 2022, the competitive quest for primacy, or being the primary account for a customer, is more intense than ever. That’s why digital advertising spend is on track to close out 2023 by surpassing $30 billion.

Read more  ➔
Introducing the next generation of Automated Direct Deposit Switching

Introducing the next generation of Automated Direct Deposit Switching

Introducing our first-of-its-kind, reimagined automated direct deposit switching experience, expected to at least double end-to-end conversion.

Read more  ➔
Know Your Fraudster Q&A with Robert Reynolds

Know Your Fraudster Q&A with Robert Reynolds

Read more  ➔
Fraud Fighers Chapter 1: Know Your Fraudster

Fraud Fighers Chapter 1: Know Your Fraudster

Read more  ➔
This is how banks close the loop with branch guests: Introducing Pinwheel Smart Branch

This is how banks close the loop with branch guests: Introducing Pinwheel Smart Branch

Read more  ➔
Meet Pinwheel Smart Branch

Meet Pinwheel Smart Branch

Learn about how Smart Branch enables a new generation of integrated omnichannel campaigns.

Read more  ➔
Introducing Pinwheel Deposit Switch 2.0, a revolutionary upgrade that maximizes coverage and conversion for every US worker

Introducing Pinwheel Deposit Switch 2.0, a revolutionary upgrade that maximizes coverage and conversion for every US worker

Deposit Switch 2.0 allows every US worker to update their direct deposit settings regardless of where their direct deposit comes from.

Read more  ➔
Key factors to consider before implementing a payroll connectivity API

Key factors to consider before implementing a payroll connectivity API

Before integrating a payroll connectivity API, you should evaluate it based on coverage, conversion, implementation, security, and compliance.

Read more  ➔
Lendly improves its loan servicing with Pinwheel’s support

Lendly improves its loan servicing with Pinwheel’s support

Read more  ➔
Enhance credit line management with income data

Enhance credit line management with income data

Read more  ➔
See your customers’ earnings weeks into the future with projected earnings

See your customers’ earnings weeks into the future with projected earnings

Read more  ➔
Demo Video: Pinwheel’s direct deposit switching solution

Demo Video: Pinwheel’s direct deposit switching solution

Read more  ➔
How Pinwheel helped Perpay increase conversion by 29%

How Pinwheel helped Perpay increase conversion by 29%

Read more  ➔
How to reduce default risk with consumer-permissioned data

How to reduce default risk with consumer-permissioned data

Read more  ➔
Digital lending technologies and trends that are shaping the industry

Digital lending technologies and trends that are shaping the industry

Read more  ➔
4 technologies that improve fraud detection in banking

4 technologies that improve fraud detection in banking

Read more  ➔
Why automated income verification is a must-have feature for lenders

Why automated income verification is a must-have feature for lenders

Read more  ➔
December product release: 10% increase in conversion, enhanced security and access to pay frequency data

December product release: 10% increase in conversion, enhanced security and access to pay frequency data

Read more  ➔
A conversation with our Chief Information Security Officer

A conversation with our Chief Information Security Officer

Read more  ➔
Former CFPB Deputy Director Raj Date Joins Pinwheel as an Advisor

Former CFPB Deputy Director Raj Date Joins Pinwheel as an Advisor

Read more  ➔
Cash flow underwriting: Benefits & how to access cash flow data

Cash flow underwriting: Benefits & how to access cash flow data

Read more  ➔
Beyond the Credit Score: Propelling consumer finance into the future with income data

Beyond the Credit Score: Propelling consumer finance into the future with income data

Read more  ➔
Why banks need a payroll connectivity API that prioritizes information security

Why banks need a payroll connectivity API that prioritizes information security

Read more  ➔
How alternative credit data can benefit lenders

How alternative credit data can benefit lenders

Read more  ➔
Tech Spotlight: Implementing your first feature flag

Tech Spotlight: Implementing your first feature flag

Read more  ➔
Pinwheel Welcomes New Advisor, Ethan Yeh, to Advance Pinwheel’s Data Science Strategy

Pinwheel Welcomes New Advisor, Ethan Yeh, to Advance Pinwheel’s Data Science Strategy

Read more  ➔
Tech spotlight: Securing access control across internal services

Tech spotlight: Securing access control across internal services

Read more  ➔
Leading wealth management firm partners with Pinwheel to take its wealth-building solutions to the next level

Leading wealth management firm partners with Pinwheel to take its wealth-building solutions to the next level

Read more  ➔
The anatomy and potential of payroll data: Transforming complex data into insights

The anatomy and potential of payroll data: Transforming complex data into insights

Read more  ➔
Beyond the credit score: Propelling consumer finance into the future with income data

Beyond the credit score: Propelling consumer finance into the future with income data

Read more  ➔
Ayokunle (Ayo) Omojola joins Pinwheel’s Board of Directors

Ayokunle (Ayo) Omojola joins Pinwheel’s Board of Directors

Read more  ➔
Conquering conversion: Engineering practices developed to help customers

Conquering conversion: Engineering practices developed to help customers

Read more  ➔
Boost your direct deposit strategy with earned wage access

Boost your direct deposit strategy with earned wage access

A 12-page guide to leveraging earned wage access (EWA) to incentivize direct deposit switching.

Read more  ➔
Driving Customer Delight: From implementation and beyond

Driving Customer Delight: From implementation and beyond

Read more  ➔
Pinwheel Supports Open Finance Data Security Standard

Pinwheel Supports Open Finance Data Security Standard

Read more  ➔
How we design Pinwheel to solve real customer problems

How we design Pinwheel to solve real customer problems

Read more  ➔
What is consumer-permissioned data and what are its benefits?

What is consumer-permissioned data and what are its benefits?

Read more  ➔
How payroll data connectivity can help financial service providers in tumultuous market conditions

How payroll data connectivity can help financial service providers in tumultuous market conditions

Read more  ➔
Pinwheel now supports document uploads to supplement payroll data

Pinwheel now supports document uploads to supplement payroll data

Read more  ➔
Brian Karimi-Pashaki joins Pinwheel as Partnerships Lead

Brian Karimi-Pashaki joins Pinwheel as Partnerships Lead

Read more  ➔
Optimizing for conversion with smarter employer mappings

Optimizing for conversion with smarter employer mappings

Read more  ➔
What are super apps and how will they impact financial services?

What are super apps and how will they impact financial services?

Read more  ➔
Increase conversions and maximize share of wallet with Pinwheel's new UX update

Increase conversions and maximize share of wallet with Pinwheel's new UX update

Read more  ➔
Pinwheel announces support for taxes

Pinwheel announces support for taxes

Read more  ➔
Ryan Nier Joins Pinwheel as the Company’s first General Counsel

Ryan Nier Joins Pinwheel as the Company’s first General Counsel

Read more  ➔
The future of enabling earned wage access

The future of enabling earned wage access

Read more  ➔
The ultimate guide to automated direct deposit switching

The ultimate guide to automated direct deposit switching

Read more  ➔
Deliver earned wage access faster with Pinwheel Earnings Stream

Deliver earned wage access faster with Pinwheel Earnings Stream

Pinwheel Earnings Stream provides the necessary data and intelligence to reliably offer earned wage access (EWA) at scale.

Read more  ➔
Digital transformation in banking in 2022: What it means, trends & examples

Digital transformation in banking in 2022: What it means, trends & examples

Read more  ➔
June product release: Expanded connectivity to employers, a custom experience with Link API and more

June product release: Expanded connectivity to employers, a custom experience with Link API and more

Read more  ➔
Pinwheelie Spotlight: LaRena Iocco, Software Engineer

Pinwheelie Spotlight: LaRena Iocco, Software Engineer

Read more  ➔
How Perpay removed friction from its customer journey using Pinwheel

How Perpay removed friction from its customer journey using Pinwheel

Read more  ➔
Build fully custom experiences with Pinwheel’s Link API

Build fully custom experiences with Pinwheel’s Link API

Read more  ➔
Pinwheel expands connectivity to 1.5M employers

Pinwheel expands connectivity to 1.5M employers

Read more  ➔
Robert Reynolds joins Pinwheel as Head of Product

Robert Reynolds joins Pinwheel as Head of Product

Read more  ➔
Pinwheel obtains highest security certification in the industry

Pinwheel obtains highest security certification in the industry

Read more  ➔
Lauren Crossett becomes Pinwheel’s first Chief Revenue Officer

Lauren Crossett becomes Pinwheel’s first Chief Revenue Officer

Read more  ➔
Everything you should know about the role of APIs in banking

Everything you should know about the role of APIs in banking

Read more  ➔
Open finance: What is it and how does it impact financial services?

Open finance: What is it and how does it impact financial services?

Read more  ➔
How automated direct deposit switching benefits traditional banks

How automated direct deposit switching benefits traditional banks

Read more  ➔
Pinwheel Secure: Authentication optimized for market-leading conversion

Pinwheel Secure: Authentication optimized for market-leading conversion

Read more  ➔
Pinwheelie Spotlight: Elena Churilova, Software Engineer, Integrations

Pinwheelie Spotlight: Elena Churilova, Software Engineer, Integrations

Read more  ➔
May product release: Localization and downloadable pay stubs

May product release: Localization and downloadable pay stubs

Read more  ➔
How a payroll API can level up lenders and renters

How a payroll API can level up lenders and renters

Read more  ➔
The power of payroll APIs in consumer finance

The power of payroll APIs in consumer finance

Read more  ➔
Data Talks: Pinwheel’s Fortune 1000 coverage and top employer trends

Data Talks: Pinwheel’s Fortune 1000 coverage and top employer trends

Read more  ➔
April product release: Enabling connectivity to time and attendance data for 25M US workers

April product release: Enabling connectivity to time and attendance data for 25M US workers

Read more  ➔
Tech spotlight: Increasing engineering momentum at a systems level

Tech spotlight: Increasing engineering momentum at a systems level

Read more  ➔
How crypto exchanges can turn direct deposits into a fiat onramp

How crypto exchanges can turn direct deposits into a fiat onramp

Read more  ➔
March product release: Time and attendance coverage and Pinwheel's new online home

March product release: Time and attendance coverage and Pinwheel's new online home

Read more  ➔
Pinwheelie spotlight: Arianna Gelwicks, Tech Recruiting

Pinwheelie spotlight: Arianna Gelwicks, Tech Recruiting

Read more  ➔
What is payroll data and how it benefits proptech companies

What is payroll data and how it benefits proptech companies

Read more  ➔
Earned wage access: What is it and why does it matter?

Earned wage access: What is it and why does it matter?

Read more  ➔