Blog

authentication

The Constantly Evolving Battle Against Fraud

There is no doubt – the battle against fraud is constant and evolving. Fraud can....

The Tax Deadline is Looming…and Tax Scams Rising. Protect Yourself Today.

The deadline to file your taxes is fast approaching which means the fraudsters are on....

The Expanding Under and Unbanked Market – How to Verify Thin Files

What is a thin file? A thin file is basically just that – the “file”....

Most Effective Use of Identity Verification in a Call Center Environment

Identity verification solutions are just as important in a call-center environment as they are online.....

Identification Verification on Steroids – the Business Challenges Addressed

Are your customers who they say they are? That is the fundamental question asked by....

How do Risk Managers Utilize Identity Verification?

Organizations have long followed a variety of risk management practices in order to keep costs....

Large Enterprise Organizations Need Identity Verification

Well… of course, right? These sizeable businesses in most cases are structured to comply with....

Will the new FFIEC guidelines do away with Shared Secrets?

Let’s hope so. For awhile this blog has relayed the dangers of using shared secret....

The Next Generation in Knowledge Based Authentication. It Begins.

Yes, you may not realize it yet but the news we announced this a.m. really....