Blog

FEATURED

Digital, Frictionless, and Mobile: Insights from the 2nd Annual Consumer Study (Infographic)

For the second year, IDology surveyed a representative sample of online American consumers to learn....

IDology Sixth Annual Fraud Report Reveals Lowering Customer Friction Is Now #1 Challenge to Fraud Prevention

For the first time since the inception of IDology’s Annual Fraud Report, balancing consumer friction....

Knowing Knowledge-Based Authentication

There are several means of proofing identities to comply with Anti-Money Laundering (AML) and Know....

Blog

Going Cashless: Insights from the 2nd Annual Consumer Study

Mobile payments, cashless apps, e-wallets, contactless shopping… there are a lot of terms used to....

Digital, Frictionless, and Mobile: Insights from the 2nd Annual Consumer Study (Infographic)

For the second year, IDology surveyed a representative sample of online American consumers to learn....

Successful, Dynamic KBA – Applying the Right Identity Verification Method at the Right Time

There are several means of proofing identities during digital interactions, and there is often not....

What We Learned At LendConnect 2019

LendConnect 2019 offered many valuable insights for online lenders, including exploring new opportunities for accelerating....

IDology Sixth Annual Fraud Report Reveals Lowering Customer Friction Is Now #1 Challenge to Fraud Prevention

For the first time since the inception of IDology’s Annual Fraud Report, balancing consumer friction....

Identity Verification in a Digital-First, Frictionless World: Insights from IDology’s 6th Annual Fraud Report

Each year, we survey businesses across industries (including banking, fintech, lending, and insurance) to learn....

Post-Breach Trust Between Businesses and Consumers

American trust has been shaken by a wave of high profile data and privacy breaches.....

The Breached Data Life Cycle is Shorter Than You Think

Compared to how they felt a year ago, 57% of American adults are more concerned....

The Need for Identity Verification to Protect Both Children and Adults

Identity fraud is often thought of as a problem that affects adults. Adults have valuable....

Data Breaches, in Addition to Shifting Tactics and Criminal Sophistication, Catalyst for Even More Synthetic Identity Fraud

Whether perpetrated by a one-man gang, or an organized crime syndicate, synthetic identity fraud schemes....

A New Era in Identity Verification, Privacy, and Trust

IDology recently surveyed US-based consumers to learn more about their perceptions of identity verification and....

Knowing Knowledge-Based Authentication

There are several means of proofing identities to comply with Anti-Money Laundering (AML) and Know....

Using Location, Location, Location to Spot and Stop Fraud

The IDology Fraud Team monitors transactions across our network on a day by day, hour....

Spread the Word – It’s World Password Day

It is World Password Day. Held on the first Thursday of May each year, this....

Law Enforcement and the Fight Against Synthetic Identity Fraud

For quite some time, we’ve focused our efforts on developing the tools and techniques to....

Identity Verification and Customer Experience: Your Biggest Brand Differentiators

According to research from consulting firm Walker, customer experience will overtake price and product as....

A New Era in Identity Verification and Fraud

The new year is well underway and tax season is in full swing. For those....

What’s Halting Mobile Banking Growth?

Eighty-seven percent of financial services respondents to IDology’s Fifth Annual Fraud Report plan to invest....

As Tax Season Heats Up, So Does The Need for Multi-Layered Identity Verification

With tax season approaching, it’s a good time to think about fraud prevention and identity....

Shifting Fraud Tactics and Synthetic Identity Fraud: A Shining Example of the Biggest Threat in Fraud Prevention

Today’s fraudster moves quickly, embraces innovation, is highly motivated, and understands the importance of collaboration....

Concurrently Fighting Friction and Fraud: New Insights from IDology’s 5th Annual Fraud Report

For the past five years, IDology has surveyed businesses across industries and reported on current....

Keeping Up with the Ever-Shifting Fraud Landscape: Findings from IDology’s 5th Annual Fraud Report

Each year, we survey businesses across industries to learn more about the fraud trends they experienced....

The Unintended Consequences of Better Fraud Prevention: Synthetic Identity Fraud

The law of unintended consequences states that our actions always have unanticipated effects – think....

Digital Identity Attributes: The Key to Success in a Complex Regulatory and Competitive Market

Online lenders, already under pressure to stay on top of a highly competitive market, now....

Is the Equifax Breach New News?

The recent Equifax breach of information from 143 million Americans is certainly concerning, but unfortunately,....

Fraud Prevention and Customer Experience

In this three part video series, IDology’s CEO, John Dancu, discusses some of the factors....

One-Time Passcodes for Two-Factor Mobile Authentication: A Fast or Slow Death?

It started with credit cards. Then came debit cards, online bill payment, and most recently, apps....

New Frontiers in Authentication

In this three part video series, IDology CEO John Dancu discusses some of the factors....

The Current State of Identity Verification

In this three part video series, IDology CEO John Dancu discusses some of the factors that....

Fraud Calling: The Rise in Contact Center Fraud

Contact centers are often neglected in the fight against fraud, making them a prime target....

Staying Ahead of Fraud in the New Era of Digital Authentication

As mobile commerce sales climb to an expected $626 billion in 2018 we are witnessing....

Keeping Identity Verification Simple

The rules of engagement in today’s digital economy are simple – make it easy for....

Whose Digital Identity Is It Anyway?

In this engaging presentation from the Innovation Project 2017, CEO John Dancu discusses how it....

Is SMS Secure?

Many organizations rely on SMS to send consumers one-time passwords (OTPs) as a step in....

How Secure Is SMS-Based Two-Factor Authentication?

With growing concerns about fraud, and an increased number of interactions with consumers via mobile....

TCPA Compliance and Mobile Numbers: What You Need to Know

The Telephone Consumer Protection Act (TCPA) was passed in 1991 in an effort to reduce....

Optimizing Customer Onboarding for Mobile through ID Capture

According to a Pew Research Center report, 46% of smartphone owners say their smartphone is....

Books for Keeps: IDology’s Latest Philanthropy Initiative

Giving back to the community is an essential part of the IDology culture. This includes....

Recent Ruling Highlights Importance of TCPA Compliance

Call centers that rely heavily on outbound calling have a new challenge with the Telephone....

2015 Healthcare Industry in Review: Large-Scale Data Breaches Cause 98 Percent of Leaked Health Records

Unfortunately, for medical organizations and their patients, the healthcare industry was in the news a....

CEO Series: IDology’s 2015 Fraud Report Highlights

We know that collaboration is one of the most integral parts of stopping fraud. That’s....

FTC: Nearly 50 Percent Rise in Identity Theft Due to Tax Refund Fraud

It’s that time of year – tax time. This week, the Federal Trade Commission (FTC)....

What’s in a Number? (Infographic)

As more customers turn to their smartphones to conduct business, organizations are now turning to....

Recon & Social Engineering Lead Call Center Fraud Schemes

Suspected fraud in the call center environment is growing, according to IDology’s 2015 Fraud Report.....

2016 Forecast: Healthcare Data Breaches Will Rise

2015 was a bad year for healthcare data breaches. Unfortunately, it’s only going to get....

How Have Data Breaches Impacted Your Industry?

Every time a data breach occurs, organizations and consumers around the world feel the effects.....

Phishing and Information Theft Are Becoming More Widespread

Communication via email is commonplace in today’s digital world. Because of this, fraudsters have been....

Mobile Activity Primed for Growth – but So Is Fraud

The holiday season is a busy time for consumers and merchants alike. People are purchasing....

2015 Fraud Report Trends (Infographic)

Fraud is not going away – at least not anytime soon. That’s why we want....

Shifting Fraud Tactics Continue to Remain a Challenge

As organizations become more sophisticated as well as collaborative in their fraud prevention programs, fraudsters....

How to Obtain Identity Assurance

Conducting business with customers over the phone or online poses unique challenges when it comes....

What Perfect Identities and Loan Application Decisioning Have in Common

Recently, data breaches have been widespread making countless identities available for sale on black markets....

The Email Evolution (Infographic)

Right now, you are able to send text and photo messages, videos, and more, all....

What Are the Top Mobile Fraud Tactics?

Today, hackers and fraudsters are working to take over customer accounts by any means possible.....

Adaptive Identity Risk Scoring

Organizations know that identity verification is an important process needed for preventing fraud, especially in....

Email Address Analytics and Fraud Prevention

Taking a multi-layered approach to identity verification and fraud prevention helps organizations eliminate fraud and....

Building Your Fraud Prevention Playbook

It’s football season, which means that teams around the country are busy perfecting their game....

Seven Interesting Facts You Probably Didn’t Know about the Dark Web (Infographic)

You may be familiar with the Dark Web from what you’ve read in the news....

What Can Organizations Do to Prevent CNP Fraud?

Fall 2015 will mark a significant event for businesses and financial institutions in the United....

Account Takeovers & Online Fraud Expected to Rise

No matter what organizations do to enhance security measures, fraudsters will continue to lurk in....

Emerging Areas of Mobile Fraud

Business and user adoption rates of mobile technology and commerce are growing exponentially. While more....

The Impact of Fullz on Businesses

Operating a business in the customer-not-present (CNP) environment presents unique challenges. It is recognized that....

How Has Fraud Evolved?

Over the past few decades there has been a shift in how criminals target organizations....

Dark Web 101

In light of recent high-scale data breaches, the term “Dark Web” has been receiving plenty....

SMiShing: Coming to a Phone Near You

By now, most consumers are aware of quite a few of the methods that cyber....

Trends in Call Center Fraud

Operating a business that works in a customer-not-present environment has its challenges, especially when it....

The Mobile Commerce Environment (Infographic)

When you think of smartphones and the mobile environment, you may think about phone calls,....

The Role of Malware in Account Takeovers

With the evolution of mobile technology, customers can now manage their accounts and access products....

Atlanta Habitat for Humanity: IDology’s Latest Philanthropy Initiative

Giving back to the community is an essential part of the IDology culture. Because of....

Anatomy of an Online Account Takeover

Customers and companies that operate in an online environment are prime targets for fraudsters. With....

CARD.com: An Identity Verification & Fraud Prevention Program Case Study

Improving the customer approval process is key, whether your business operates in a financial, retail....

Three Tools Everyone in the Mobile Industry Should Be Using

It’s no secret that the mobile marketplace is gaining popularity. From consumers snapping photos of....

Mobile Is Here to Stay – and Here’s Why: Millennials

Work. Restaurants. Client meetings. Checkout lines. Even dates. What do all of these have in....

How Secure Are Static KBA Security Questions?

We have all had to answer them: What is your mother’s maiden name? What is....

The Challenges & Benefits of a Trusted Mobile Identity (Infographic)

The amount of activity on the mobile marketplace has grown exponentially over the last decade,....

What do Mobile Spoofing and Data Breaches Have in Common?

Cybercriminals are increasingly exploiting the latest technologies in their efforts to gain access to products,....

The Shoebox Project: IDology’s Latest Philanthropy Initiative

IDology’s latest philanthropy initiative focused on helping the many homeless women and children in the....

Healthcare Data Breaches – Computer Hacking or Something Even More Worrying?

Data breaches that occur in any industry can have widespread ramifications for consumers. However, when....

The Evolving Patient Portal, with Increased Adoption Brings Increased Risk (Infographic)

Medical identity theft is a growing problem. Medical related identity theft accounted for 43% of....

Is a Username and Password Enough?

It seems like every few weeks a new story comes out about a large-scale business....

The Customer Authentication Experience: Friction? What Friction?

When consumers interact with your business, they expect to have a good overall experience. Customers....

Know Your Customer Rules – How Much Do You Already Know?

When conducting business online or over the phone, it is a top priority for companies....

The Growing Use of Mobile Malware

As more and more consumers turn to mobile devices to perform online transactions and share....

What Is Influencing Identity Verification Changes in Underwriting?

In merchant acquisition, the underwriting process is particular, but it is also necessary in order....

Medical Records Selling for Big Bucks on the Dark Web

Fraudsters have been targeting financial institutions and organizations for years. However, as more and more....

Tor and Why Fraudsters Exploit It

With each passing day, fraudsters are working to develop fresh ways to target businesses and....

The Dark Web: What is it and Why Does it Matter? (Infographic)

Consumer information is becoming increasingly compromised. But where does all of that data go once....

How EMV Is Changing Payments and Fraud

EMV payment capability, which has yet to be employed by organizations in the U.S. but....

Deterring Identity Fraud with Improved Identity Verification Methods

Deterring identity fraud can be challenging, which is why many organizations turn to robust identity....

IDology Adopts a Family in Need this Holiday Season

It started with a wish to give a local family in need a memorable holiday....

Card-Not-Present (CNP) Fraud (Infographic)

Card-Not-Present (CNP) fraud involves the unauthorized use of credit, debit and/or corresponding personal identifiable information....

Impacts of Identity Risk on Governments

Government agencies, like any organization that offers services to consumers, must continuously employ robust identity....

Advancing Customer Acquisition: Reducing Friction While Combating Fraud

As your organization grows, the ability to acquire and retain new customers is essential. However,....

Enhancing Knowledge Based Authentication with Customer Data

Fraudsters continue to develop new techniques designed to gain access to products and services utilizing....

2014 Fraud Report Trends (Infographic)

With fraudsters using more and more sophisticated methods every day, what steps do organizations need....

2014 Fraud Report and Growing Identity Verification Needs

As we near the end of 2014, it’s time to take a look at your....

DIY Identity Risk Scoring (Infographic)

We all understand the importance of identity verification and fraud prevention when it comes to....

Is the Person Using John Smith’s Data Actually John Smith?

Fraud prevention plays a critical role in an organization’s overall success. Moreover, businesses are increasingly....

Does Your Healthcare Exchange Need a Check-Up? Keeping Patient Information Secure Within Health Information Exchanges

The Office of the National Coordinator for Health Information Technology has deemed September 15-19 as....

There Are No Shortcuts in Security

The safety and security of consumer data is one of the top priorities for every....

Three Ways to Grow Your Business and Why Customer Protection Is Essential (Infographic)

In business, an organization’s main focus must be on developing a comprehensive strategy to achieve....

Striking a Balance between Security and Convenience

Business managers recognize that allowing customers to quickly and easily set up a new account....

Online Education & Training: The History of Distance Learning (Infographic)

Distance learning continues to grow in popularity as more and more students enroll in higher....

What Happens to an Identity Once It’s Been Stolen? (Infographic)

With advances in technology being made each day, it is important for consumers and businesses....

Know Your Customer (KYC) (Infographic)

In an effort to prevent identity theft and mitigate risk, the United States government stepped....

Reducing Cheating and Financial Aid Fraud in Distance Learning

In a recent study by Babson Research (1), the number of students taking an online....

Knowledge Based Authentication: The Difference between Static, Dynamic & Enhanced KBA (Infographic)

Knowledge based authentication, also known as KBA, is a type of authentication which looks to....

Consumers Concerned about Information Privacy and the Importance of Developing a Mindset Around Security

Over the last 15 years we have seen how our lives have gradually shifted to....

The Future of Payment: New Ways to Pay (Infographic)

Nearly gone are the days when you’d reach into your purse or take out your....

Health Information Exchange Security

Think about the last time you visited the doctor, or dentist. How did you make....

2014 Dirty Dozen Tax Scams Released. How Are You Protecting Consumers?

Since last year’s tax filing season which saw a considerable amount of fraud, the IRS....

The History of Online Gambling (Infographic)

Online gambling and gaming in the United States exists in a very complex environment, where....

IDology Customer Satisfaction Survey (Infographic)

IDology is acknowledged in the industry for not only our solutions, but more importantly, for....

Keep Innovating – It’s the Key to Stopping Fraud

“Innovation is the specific instrument of entrepreneurship…the act that endows resources with a new capacity....

Age Verification: The Importance of Protecting Children (Infographic)

Why is Age Verification Important? In our highly connected society, it is possible for consumers....

Bitcoin Infographic: What is Bitcoin?

Although Bitcoin has been around for a few years, the market has flown fairly under....

Infographic: The Evolution of Global Identity Verification

The use of the internet has become prevalent around the world.  And, while going online....

IDology’s Angel Tree Drive Helps Spread the Holiday Cheer!

This holiday season, the folks at IDology participated in an Angel Tree program through the....

Infographic: Protecting Your Customers From Identity Theft

In today’s highly connected and digital world, the possibility of your customers becoming victim to....

If Santa Claus Knows Who Your Customers Are, Shouldn’t You?

We all know how the song goes… “He sees you when you’re sleeping. He knows....

The Masses Have Spoken, Crowdfunding is Here to Stay.

What is one of the hardest aspects of starting a new company or venture?  As....

As Online Gaming Continues to Grow…What You Should Know

Online Gaming has been around for some time and it’s been known by many names....

Worldwide Fraud Losses Up 14.6% According to The Nilson Report

Operating in a customer-not-present environment can be risky business. And, doing so without the proper....

Will Biometric Technology Such as Touch ID in the New Apple iPhone Replace KBA?

As you probably heard, last week Apple released their new and improved iPhone – the....

Understanding NIST Standards When Dealing with Electronic Authentication

The National Institute of Standards and Technology (NIST) is not only one of the nation’s....

Infographic: The Evolution of Manual Document Review

The reverberations triggered by rapid advancements in technology have left very little unaffected. Manual documentation....

Healthcare Insurance Fraud – How Could the Affordable Care Act Impact You and Your Business?

On October 1, the Federal Government will launch the Health Care Exchange Marketplace, the vessel....

Infographic: Trends in Fraud

Fraud? Oh no…couldn’t happen to me! Is that how you or your organization approaches potential....

Check your Hardware – New Ways Fraudsters Steal Your Information

An article recently came out in the Atlanta Journal-Constitution covering a man who was involved....

Our 2013 Fraud Survey & Analysis

IDology is happy to announce that we have released our 2013 Fraud Report! The report,....

Protect Your Customers from Rising Identity Theft Threats

Identity theft, as defined by Wikipedia as “a form of stealing someone’s identity in which someone pretends....

Identity proofing

While businesses still regard the saying that the “customer is always right”, today’s organizations that....

With International Business Comes International Complications

In today’s growing global economy, an organization’s customer base is no longer simply regional or....

Customer Identification Program (CIP)

After September 11th, in an Act of Congress called the USA PATRIOT Act, the United....

Know Your Customer (KYC) Rules

Identity theft is the single fastest growing crime in the United States of America. Unsurprisingly,....

Identity Authentication

In Today’s fast-paced 21st-century world, identity is an increasingly fragmented and ambiguous concept. Identity theft....

Age Verification – Why Simply Verifying Age is No Longer Enough

It’s no secret – cases of identity theft and fraud continue to make headlines every....

The Constantly Evolving Battle Against Fraud

There is no doubt – the battle against fraud is constant and evolving. Fraud can....

Frequently Asked Questions About Identity Verification

What is identity verification? Also called “identity proofing” or “vetting an ID,” identity verification is....

The Tax Deadline is Looming…and Tax Scams Rising. Protect Yourself Today.

The deadline to file your taxes is fast approaching which means the fraudsters are on....

Meeting Compliance with Advanced Identity Processes

Meeting compliance regulations… What does that really mean?  Well, compliance can have different meanings depending....

The Expanding Under and Unbanked Market – How to Verify Thin Files

What is a thin file? A thin file is basically just that – the “file”....

Most Effective Use of Identity Verification in a Call Center Environment

Identity verification solutions are just as important in a call-center environment as they are online.....

Identification Verification on Steroids – the Business Challenges Addressed

Are your customers who they say they are? That is the fundamental question asked by....

How do Risk Managers Utilize Identity Verification?

Organizations have long followed a variety of risk management practices in order to keep costs....

Large Enterprise Organizations Need Identity Verification

Well… of course, right? These sizeable businesses in most cases are structured to comply with....

Underbanked Financial Services Market – 68 Million people; $78 Billion Opportunity

Awhile back we wrote a whitepaper covering the under and unbanked market.  At the time,....

Beware: The Cyber Fraud Games Are Officially Underway…

A few months ago the Department of Homeland Security started warning us about the activity....

Knowledge based Authentication Mitigates Fraud in Mobile Payments

What’s the magic number for knowledge based authentication (KBA) in the mobile payments industry?  According....

How Wineries Can Solve an Age Old Problem Online

In the news this past week was a story about a research study where underage....

Identify Yourself as an Organ Donor On Facebook

I’m a minority. I’m among the 43% of the population registered as an organ donor.....

Top 6 Things We Learned at the Prepaid Expo

The Prepaid Expo wrapped up yesterday and what a show!  From the sound of it,....

Highlights for Day 2 at the Prepaid Expo

As promised, we have more big news related to the Prepaid Expo #ppexpo going on....

Compliance March Madness: PrePaid Card Expo Hits Vegas

The 7th annual prepaid card exposition opens up today.  Let the understanding compliance regulations madness....

Seeing REDfin in Action

One common misconception about identity verification is that only retailers need it.  I guess this....

Tic-Tax-Dough

By now, the W2s and 1099 reports for 2011 are all out.   With April 15th....

Age Verification Front & Center in 2012

It’s been some time since we’ve talked about age verification, but I assure you it’s....

Data Privacy Everywhere…

If there are 2 words that have permeated every online business in every industry, they’d....

How to prevent a data breach and save your organization more than $156B

A recent study of data breaches during the last six years shows some staggering figures....

The Triple Threat for Fraud: Stalking, Social Networking & Shared Secrets

Banks might not need as much convincing that challenge questions based on shared secrets aren’t....

An Out-of-Wallet Rose by Any Other Name…

I want to help clear up some confusion in the market about the updated FFIEC....

Finally…FFIEC Guidelines Update Is Issued

After almost 6 months the long anticipated FFIEC guidelines update has been issued. And as....

You Know You Were Born in 2011…if your social security number is completely random.

As of June 25, 2011, the Social Security Administration is changing the way it issues....

Phishing Season Has Begun…

People not involved in the security industry may not realize the impact of the Epsilon....

Why Your Smartphone Camera Poses A Picture Perfect Risk to your Kids Safety…

Uploading a picture to the Internet of your child at a sporting event, on vacation....

Phishing, Smishing. ..Are Fraud Awareness Campaigns Now Passé?

As we gear up for the Payments show (#payments2011) next week in Austin (stop by....

Will the new FFIEC guidelines do away with Shared Secrets?

Let’s hope so.  For awhile this blog has relayed the dangers of using shared secret....

Insight from PrePaid Expo 2011

I’m fresh back from the PrePaid Expo.   Let me tell you, the prepaid market is....

Google Steps Up Its Authentication Practices

The recent roll out of Google’s 2-step authentication to the general public means a higher....

The Next Generation in Knowledge Based Authentication. It Begins.

Yes, you may not realize it yet but the news we announced this a.m. really....

2011 Resolution: Better Password Management

In an effort to start the New Year off right and be more organized, I....

Possible Fraud Scam Alert: US Airlines Phishing Letter

Beware!  A new marketing or fraud scam has popped up recently by mail.   While sorting....

Santa came early at IDology and brought us a new blog design!

Faithful readers of the IDology blog will notice a few changes. First off, a new....

How to Prevent Fraud this Holiday Shopping Season

It’s hard to believe that Black Friday and Cyber Monday are less than a week....

Identity Verification Use Case: Organ Bank Donor Registrations

With the HITECH Act the healthcare industry is rapidly expanding into the digital age.  The....

Don’t take the Fraud Bait; Learning the Lingo

With all the data breaches, retail fraud incidents and talk of PCI compliance in the....

Fueling Fraud: Beware of Credit Card Skimming at the Gas Pump

How much do you really pay-at-the-pump?  If you are one of the unlucky 40,000 people....

5 Areas Healthcare Companies Must Evaluate When Selecting Technology Vendors

I came across an interesting breach analysis Chris Hourihan of HITRUST (Health information Trust Alliance)....

How Shared Secret Security Questions are Killing Customer Service…

Let me share a story of frustration with you. Back in July I visited the....

Identifying the Unbanked Market

Last week the Wall Street Journal examined a new pilot program the FDIC approved that....

What Happened in the Identity Verification Market This Summer

In Georgia, summer vacation is over.  It’s already back to school for the majority of....

Identity Blues for 70,000 People in Georgia

If the heat wave hasn’t gotten my fellow Georgian’s singing the blues this summer, the....

Identity & Privacy: Can Privacy Concerns Lead to Big Business?

By: John Dancu With a background in investment banking, I’m always interested to see where....

114,000 Apples Today for Hackers

Are you an early adopter of the iPad?  If so, beware.  Your email information might have....

5 Things A Business Should Do During Internet Safety Month

June is national Internet Safety Month.  Of course we should be mindful of Internet Safety....

Cool Trick.ly for Protecting Internet Privacy

Reading Seth Godin’s blog, his Sort of private post introduced me to a new service....

Facebook Baby Stepping Toward Identity Verification

Facebook announced it’s implementing new security tools (and procedures) intended to prevent unauthorized login to....

The Copier Stole My Identity – A New Fraud Prevention Strategy To Consider

I recently read a news story on digital photocopiers and the data secrets they hold....

Reason 400 Million and 1 for Identity Verification in Social Networks

By John Dancu The New York Times reports today that Facebook profiles, both fake and....

Consumer Privacy & Marketing: My Worlds Collide

As a marketer, I’m always looking for new ways to reach target audiences and promote....

The State of Technology In Georgia

Last week was Georgia’s Annual Technology Summit hosted by TAG (Technology Association of Georgia) where....

IDentity Statistics Update

This week I’m giving a presentation on fraud in the payments industry and how identity....

$800,000 Reasons Why Banks Need Stronger Authentication

By John Dancu PlainsCapital bank in Lubbock, Texas is suing its customer, Hillary Machinery Inc.,....

Social Networking and Identity Privacy

I’m sure no one will argue with me that the one thing that has heightened....

2010: Full Speed Ahead for ID Verification

Here we are a full month into 2010 and I’m just now finding the time....

Identify Yourself as an IDology Fan on Facebook!

Some of the regular blog visitors might have noticed our new Facebook block on the....

MIA Apologies for Identity Verification Posts

Sorry both John and I have been missing in action for a few weeks.  But....

The Yellow Brick Fraud Road

The news about Federal Reserve Chairman Ben Bernanke becoming a victim of ID theft resulting....

Identity Verification during Account Origination: When Will Social Networking Sites Ever Learn?

If I said it once, I’ve said it a 1000 times, Identity Verification of Adults....

Identity & Privacy

On the heels of the privacy workshop in Washington this past Monday (which regrettably I....

How We Are Heating Up the Lead Verification Industry this Summer

It’s official. As of today, we’ve announced our launch into the lead verification market. For....

Follow IDology on Twitter

We’ve officially joined the twitterverse or twittersphere, or whatever you prefer to call the land....

“Secret Questions” Give Dynamic KBA a Bad Wrap

One of the biggest misconceptions we are constantly addressing is the confusion between shared secret....

At RSA 2009

Spending the week in sunny San Fran for the annual RSA security conference.  A great....

15 Short Days Until Red Flag is Enforceable for Everyone

Wow, it’s hard to believe that 6  months has gone by since non-banking related creditors....

Online ID Verification Through the Mail? That’s Irony.

So I stumbled on some news from a European company called MyID.is and their Paypal....

Holy Identity Batman!

Interesting article in the Washington Post last week about joining Facebook when you have an....

Sex Offenders & Social Networking Wake Up Call

Well after the recent news about 90,000 sexual predators being removed from MySpace (before the....

Age Verification In the News…

It’s been a few weeks since the Internet Safety Technical Task Force released its Final....

IDology Expands on Its Member Statement to Internet Safety Technical Task Force’s Final Report…

On December 17, 2008 we submitted a supplemental Member Statement to the Internet Safety Technical....

Security Outweighs Cost When Purchasing Online

Last week VeriSign released results of a survey it commissioned regarding Internet security.  The findings....

How Mobile Payments Are Changing Parking Meters…

One of my favorite places in Atlanta to visit is the square in Downtown Decatur,....

Red Flag Deadline Gets 6 Month Reprieve

Well, the credit industry finally has some good news. The new ID Theft Red Flag....

How Dynamic KBA Could Have Stopped Palin’s Email from being Hacked

The news about Governor Palin’s Yahoo account being hacked presents an interesting use-case for a....

E-Verify System Doesn’t Stop ID Theft But KBA Can…

If you recall I blogged about the government’s crackdown on employers hiring illegal immigrants and....

Fraud Ring Busted

If you read the NY Times today you probably saw this story: 11 Charged in....

Stop the Identity Theft Insanity!

I’m still amazed by stories such as this about how ticketed drivers from Virginia and....

Calling All Age Verification and Internet Child Safety Technologies…

If you have a technology solution that can be used to address child Internet safety....

Catalyst Recap

I mentioned in an earlier post that I was at the Burton Catalyst Conference last....

Sunny Shines On Georgia Wine-rs

You might recall I blogged about a bill being introduced to the GA legislature over....

Age Verification Research

As an identity and age verification provider IDology continually monitors the market to stay up....

OK..lahoma Identity Theft?!

I stumbled on an interesting article today about data privacy, or really the lack thereof,....

RSA Conference Recap

I’m back from the RSA conference and how exhausting. Understandable considering there were 17,000 people....

A Good Perspective on Social Networking Identity Verification Issues

Zach Martin, editor of CR80 News recently published an article about the identity and age....

Internet Safety Technical Task Force Kicks Off

We had the kick-off meeting for the Internet Safety Technical Task Force this week. As....

Taking Internet Safety To Task…

It’s official! The Task Force to focus on identifying effective online safety tools and technologies,....

No Phishing At IDology

Customers and non-customers of a credit union recently received fraudulent emails as part of an....

Bust-ed Identity Thief Going to Jail

Check out this news and video clip from a San Diego news channel. It’s really....

MySpace Sees the Identity and Age Verification Light…

Today’s press release out of North Carolina Attorney General’s Office Roy Cooper is a big....

Weekend At Bernie’s: Real Life Fraud Attempt

Did you see this story? No, it’s not a joke or a scene from a....

Annual Fraud Report Hot Off the Press

I got the early edition of Cybersource’s 9th annual fraud report today. I haven’t had....

The Most Wonderful (time of the) Year for Online Retailers

The New York Times reports today that: When the receipts are tallied from this holiday,....

Internet Life Down Under Changing in ’08

Come January 20, the Aussie’s will be following new government mandates for Internet content which....

Protecting Your Identity During Black Friday and Cyber Monday

Barely giving us time for the turkey to digest, some stores are advertising that they....

Trolling the Identity Blogs

I do realize that my dedication to posting has been rather sporadic lately. What can....

MySpace Irony

I’m sure by now you’ve seen the news that the co-founder of MySpace has been....

Baby Steps Toward Identity 2.0

What a month. I’ve been back from DIDW for (almost) three weeks and I still....

San Fran or bust…

Digital ID World (DIDW) is next week in San Francisco and I’m really anxious to....

Misconceptions about Identity Proofing

It’s here! Our whitepaper pointing out the top 10 common misconceptions businesses have about identity....

Kudos to Second Life

I commend Second Life on their decision to offer a voluntary verification policy for their....

The United States of Attorneys Generals

The Wall Street Journal reported yesterday that the Attorneys Generals of all 50 States have....

Spotting a Fake ID with Identity Proofing

A reporter at the Arizona Republic recently wrote a great article about the booming fake....

Identity Verification Countdown

According to this article employers have 120 days to determine (and resolve) discrepancies over Social....

YouTube As A Crime Fighting Social Network

Did you hear about the laptop thief in New Zealand who was caught after somebody....

Punishments for Identity Fraud Crime

The AJC reports today that an Atlanta man has pled guilty for stealing $1.5 million....

Age & ID Verification + KBA = Better Protection on Social Networks

PC World wrote a more in-depth article last week regarding the Facebook news I blogged....

What are the Hot Spots for Fraud?

Our friends over at ID Analytics just released a fraud study titled U.S. Identity Fraud....

Blumenthal Shows a Different Facebook

Another social networking site is starting to take some heat from law enforcement in its....

Why Preventing Identity Theft Involves Company Culture

Some folks over at InfoWorld are really championing the prevent identity theft cause these days.....

Thank-you Chris Hansen

Atlanta‘s Star94 held an interview with NBC Dateline’s Chris Hansen yesterday morning which was really....

Risking Life and Identity To Serve Our Country

The personal details of over half a million US service personnel and their relatives may....

Identity Theft Summer Reading List

Those of you not reading Harry Potter this weekend might want to check out Terri....

Studying the Odds for Online Interpersonal Victimization of Youth

Amy Tiemann has a blog post on CNET titled Online Safety Needs to Go Beyond....

Hi-Ho, Hi-Ho; It’s off to jail he goes…

A sexual predator in Connecticut that used MySpace to meet his 12-15 year old female....

The Role of Data in Identity Proofing

I read an interesting commentary on Wired.com by Bruce Schneier about data reuse. He had....

Identity Theft: A “Monster”ous Crime

Identity theft is no laughing matter but I couldn’t help but chuckle today when I....

Media Spotlights’ On Identity

A few posts back I mentioned our partner Identity Rehab…well they’ve changed their name and....

KBA…Cool or Creepy?

Usually when I explain what KBA (knowledge-based authentication) is most people think it’s really cool.....

Googling Adult Content in Korea

Search industry giant Google announced that it will implement age verification for its services in....

Age Verification Score Card: Second Life 1, MySpace 0.

Eight state Attorneys General wrote a letter to MySpace demanding they turn over the names....

A Plan to Combat Identity Theft

The Presidential Federal Task Force on Identity Theft recently issued its strategic plan to combat....

Marketing Mayday!

Have you heard about the latest scam from the bad guys? It appears they too....

Where Have I Been?

Things here at IDology are operating at more than full speed this month that it....

2 Steps Forward, 1 Step Back

March has been an interesting month for age verification. First, the conversations for using age....

It Takes A Village…

If you’ve been following the age verification within social networking sites issue, it should come....

TAG: We’re It!

Yesterday I attended the Technology Association of Georgia’s Annual Summit. Based on the presentations I....

Georgian’s Start Wine’n

Ask any non-Georgian about what type of agriculture is offered in our State and I’m....

And It Begins…

Roy Cooper, the Attorney General from North Carolina announced yesterday that he is proposing State....

RSA Recap

So sunny San Fran turned out to be not so sunny this week. But the....

Catch Me If You Can 2.0

If you haven’t seen Wired Magazine’s article “I Was A Cybercrook for the FBI” yet,....

A Lawyer’s Point of View on Age Verification

I came across this great article from Anita Ramasatry a columnist at FindLaw.com and law....

Data Breach Hits Home (Stores)…

So the latest announcement concerning a customer data breach was issued yesterday by TJX the....

A+ for Content…

Happy New Year! 10 days into it and I’m already behind on my resolution to....

Hot off the MySpace Press

Just this week, MySpace issued news about deploying a technology solution to identify and block....

Brewing Interest in Age Verification…

I apologize for not having made a post in awhile but lately I’ve been really....

Assuming an Identity on MySpace…

I recently came across this blog post which discusses how easy it is to assume....

Frightening (Identity) Facts for Halloween

As we’ve all heard by now, identity theft is the fastest growing crime in the....

Danger Will Robinson! Danger!

I recently heard an alarming statistic. 44% of teenagers have different friends online than offline.....

Identity – Best Place to Work…

What an exciting time to be in identity! I’ve been traveling recently and meeting face....

The Real Cost of Age Verification Solutions

Recently news came out about social networking site Xanga being fined $1M by the FTC....

Knowledge Verification In Practice…

My last post has sparked more interest in knowledge verification and how it works exactly.....

What is Knowledge Verification?

So I came across some interesting commentary in the blogsphere regarding verification services sparked by....

Hats off to Zoeys Room

Thanks to all the recent media hoopla surrounding age verification and MySpace, we were able....

Good News!

Good news! I’m finally making some strides in my age verification education quest I discussed....

Age Verification and MySpace.com

I was reading the Wall Street Journal last Friday and came across an article on....

1-2-3 Jump!

Here we go – I’ve officially entered the professional blog world.  Our Marketing/Creative Type thought....

IN THE NEWS

5 LESSONS ABOUT CONSUMER IDENTITY IN THE MOBILE ERA

By Michael Moseser for PaymentsSource

June 12, 2019

NEW RESEARCH

study cover image

SECOND ANNUAL CONSUMER DIGITAL IDENTITY STUDY