Blog

dynamic KBA

Successful, Dynamic KBA – Applying the Right Identity Verification Method at the Right Time

There are several means of proofing identities during digital interactions, and there is often not....

Knowing Knowledge-Based Authentication

There are several means of proofing identities to comply with Anti-Money Laundering (AML) and Know....

How Secure Are Static KBA Security Questions?

We have all had to answer them: What is your mother’s maiden name? What is....

What Is Influencing Identity Verification Changes in Underwriting?

In merchant acquisition, the underwriting process is particular, but it is also necessary in order....

Protect Your Customers from Rising Identity Theft Threats

Identity theft, as defined by Wikipedia as “a form of stealing someone’s identity in which someone pretends....

The Expanding Under and Unbanked Market – How to Verify Thin Files

What is a thin file? A thin file is basically just that – the “file”....

Most Effective Use of Identity Verification in a Call Center Environment

Identity verification solutions are just as important in a call-center environment as they are online.....

Identification Verification on Steroids – the Business Challenges Addressed

Are your customers who they say they are? That is the fundamental question asked by....

How do Risk Managers Utilize Identity Verification?

Organizations have long followed a variety of risk management practices in order to keep costs....

IN THE NEWS

5 LESSONS ABOUT CONSUMER IDENTITY IN THE MOBILE ERA

By Michael Moseser for PaymentsSource

June 12, 2019

NEW RESEARCH

study cover image

SECOND ANNUAL CONSUMER DIGITAL IDENTITY STUDY