A simple thing like not identifying a caller in an IVR leads to additional costs downstream and additional customer satisfaction [issues] down the road, Smith says.According to Smith, most authentication failures result from systems that request information that is not readily available to the caller.