More Data, Less Fraud

Fraud is increasing on online and mobile channels as EMV adoption limits point-of-sale fraud. Implementing appropriate verification and authentication protections helps minimize fraud losses and improve customer experience. Listen to this interview with fraud expert Andy Smith to learn about how to: Improve fraud detection by sharing information across businesses Limit true-name and synthetic ID [Read More…]

Fraud Protection and User Friction – Balancing Opposing Forces in the Online Experience

The phrase “frictionless customer experience” is getting a lot of play these days, as many more fraud prevention controls are applied to sensitive, online processes that consumers encounter – particularly regarding things like financial transactions, employment applications or personal information discovery. The controls, from complex passwords to extra verification or multi-phase authentication steps), tend to [Read More…]

How the Government Is Leveraging Data to Verify Identities

Several members of the Identity and Fraud Solutions team recently attended the Global Identity Summit in Tampa. Rich Huffman, vice president of identity and fraud product management, spoke on a panel about how government entities are leveraging data when verifying identities to increase security and decrease fraud. The federal government identifies millions of people every [Read More…]

National HealthIT Week: Protecting PHI

Protecting protected health information (PHI) requires vigilance in today’s environment of increased sharing of personal information online. National HealthIT Week (Oct 5-9) highlights the importance of health IT—specifically electronic health records (EHRs) which improve the quality of healthcare delivery, increase patient safety, decrease medical errors, and strengthen the interaction between patients and healthcare providers. Protecting [Read More…]

Identity Discovery: The Global Identity Summit

The key to success in discovery of an identity is understanding how disparate data elements combine to form a conclusive identity. A remote (online or mobile) application for access or services could be from the true person or a stolen or fictitious identity. Good identity verification uses a broad range of data elements to verify the [Read More…]

Allaying concerns about fraud from third-party vendors

Companies have spent a great deal of time and money protecting their core systems and infrastructure from cyber attacks — hardening their perimeters and moving to risk-based authentication for moderate to high risk resources. The collaborative environment of modern companies also means that there are quite a few “extranets”, which allow for information sharing with partners, third-party vendors, and [Read More…]

Authentication and Permissions: Proxy Access

Should people share their web site credentials with their spouses? How about their Significant Others? According to a study on internet usage by the Pew Research Center, “Fully 67% of internet users in a marriage or committed relationship have shared an online password with their partner or spouse.” Whether or not access resulting from such credential [Read More…]