Healthcare Data Breaches – Computer Hacking or Something Even More Worrying?

Rows of files in a medical office

Data breaches that occur in any industry can have widespread ramifications for consumers. However, when it comes to breaches in the healthcare industry, the consequences can be even more severe. In addition to gaining access to a patient’s personal identifiable information that can be used to open financial accounts or file fraudulent tax returns, fraudsters […]

Infographic: The Evolving Patient Portal, with Increased Adoption Brings Increased Risk


Medical identity theft is a growing problem. Medical related identity theft accounted for 43% of all identity fraud committed in the US in 2013. And unfortunately, that number is anticipated to rise. With recent headlines containing news of healthcare data breaches, it is clear that healthcare organizations need to employ robust solutions in order to […]

IDology Leadership Video: The Collaborative Fraud Network

Preventing fraud is no longer a secondary objective for companies. As criminals shift tactics in order to gain access to financial accounts and services, companies are realizing their increasing responsibility to fight fraud and protect consumer privacy. And unfortunately, fraudsters know no geographic boundaries and focus on multiple organizations, making it harder for individual companies […]

Is a Username and Password Enough?

Username & Password

It seems like every few weeks a new story comes out about a large-scale business or financial institution being hit by a cyber-attack that exposes the private information of its customers. While some of these organizations have their security infrastructure hacked, others are infiltrated by gaining access to an account owner’s credentials, such as an […]

The Customer Authentication Experience: Friction? What Friction?

Customer Authentication

When consumers interact with your business, they expect to have a good overall experience. Customers should be able to easily access your products and services, perform transactions, manage payments, and view account details without having to jump through a ton of hoops. If a customer has to work too hard to do business with you, […]

Know Your Customer Rules – How Much Do You Already Know?

Know Your Customer KYC Rules

When conducting business online or over the phone, it is a top priority for companies to be able to confirm that a customer is who she or he claims to be. Otherwise, criminals are able to create and/or access accounts, purchase products, or gain control of valuable data. That is why it is so important […]

The Growing Use of Mobile Malware

Mobile Malware

As more and more consumers turn to mobile devices to perform online transactions and share sensitive personal data, an increasing amount of fraudsters are embracing malware as a way of targeting them. CSO Online reports that between 2012 and 2013, the number of mobile malware and high-risk apps more than doubled to 1.4 million. And, […]

What Is Influencing Identity Verification Changes in Underwriting?

Debit Cards.

In merchant acquisition, the underwriting process is particular, but it is also necessary in order for organizations to approve new merchant account applications with confidence. Companies must verify the legitimacy of an applicant and evaluate specified financial information before a new account can be activated. Traditionally, this process has relied heavily on manual techniques, which […]

Medical Records Selling for Big Bucks on the Dark Web

Electronic Medical Records

Fraudsters have been targeting financial institutions and organizations for years. However, as more and more healthcare organizations begin to embrace electronic medical records and interactive patient communication, these criminals have begun to shift focus. An indicator of this can be found in IDology’s annual Fraud Report results. In the 2013 report, only 33% of healthcare […]

Tor and Why Fraudsters Exploit It

ID Verification

With each passing day, fraudsters are working to develop fresh ways to target businesses and their customers. As attempted fraud continues to arise in the digital marketplace, website applications and mobile solutions must enable comprehensive identity verification and fraud prevention tools to ensure that a customer is legitimate and not a fraudster using his or […]