ICMI is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Advertisement

Use Tech to Improve the Authentication Process

comfortable“These aren’t the droids you’re looking for.” – Obi-Wan Kenobi

 When I first contemplated writing about the importance of identity verification, this iconic scene from Star Wars: A New Hope came to mind. Just like Obi-Wan Kenobi fooled storm troopers with his Jedi mind trick, fraudsters often call into contact centers and try to impersonate unknowing customers to gain access to their account information.

A few months ago I called a company to order a new card. The representative on the phone was delightful; they spoke professionally, used courteous language and fulfilled my card request. There was only one problem: the authentication process was tedious and invasive. The representative asked me a series of questions, making me recall sensitive, personal information and old transactions I’d already dismissed from my memory.

Don't get me wrong, although the authentication process felt clunky, I was very grateful to have the representative confirm that I am who I said I am, and that someone who is not me didn’t gain access to my information. I would have been flustered and possibly angry if, when I called that day, my request was completed without any type of verification of my identity.

Authentication has to happen with every caller, every time, but callers often communicate to contact center representatives that they feel interrogated by the method of authentication because the questions can feel sensitive in nature. While accurately authenticating a caller is the most critical function of a contact center representative, the way contact centers go about this process can make or break an excellent over-the-phone interaction. We are no longer just authenticating a voice on the other end of the phone line; we are truly entering the stage of validating people as a whole.

What are the consequences of outdated authentication practices?

The conversation that occurs if a caller fails over the phone authentication can be a challenge. They are likely to become disgruntled that they cannot complete the business they called in for, and contact center representatives can become frustrated that they must turn someone away before completing the request. Having to talk to a caller about their failed authentication is one of the most stressful conversations a representative experiences.

There are benefits for both the contact center professional and the consumer for utilizing digital identity technology in place of question and answer authentication interviews. With the introduction of enhanced authentication technology, contact centers have the opportunity to put the caller in control of their personal information. The power shifts in the caller's favor and they are in control of the identity verification part of their interaction.

How tech can help

To stay relevant to our customers and our industry, we must not become static. It’s essential that we don’t get stuck in the old practices; just because something has always "worked" doesn't mean that it's still the best way to do the thing. The time is now for contact centers to be curious and to think creatively, to find ways to be innovative without sacrificing customer service.

By choosing to research and invest in fintechs, contact center leaders can begin to push the boundaries of technology. By enhancing over the phone interactions, we are further establishing lasting positive, digitally robust experiences that will encourage callers to continue taking advantage of the amazing services we offer them.


Topics: Customer Experience, Customer Journey Mapping, Compliance And Security