Blog

knowledge based authentication

With International Business Comes International Complications

In today’s growing global economy, an organization’s customer base is no longer simply regional or....

The Expanding Under and Unbanked Market – How to Verify Thin Files

What is a thin file? A thin file is basically just that – the “file”....

Most Effective Use of Identity Verification in a Call Center Environment

Identity verification solutions are just as important in a call-center environment as they are online.....

Identification Verification on Steroids – the Business Challenges Addressed

Are your customers who they say they are? That is the fundamental question asked by....

How do Risk Managers Utilize Identity Verification?

Organizations have long followed a variety of risk management practices in order to keep costs....

Large Enterprise Organizations Need Identity Verification

Well… of course, right? These sizeable businesses in most cases are structured to comply with....

Knowledge based Authentication Mitigates Fraud in Mobile Payments

What’s the magic number for knowledge based authentication (KBA) in the mobile payments industry? According....

Will the new FFIEC guidelines do away with Shared Secrets?

Let’s hope so. For awhile this blog has relayed the dangers of using shared secret....

The Next Generation in Knowledge Based Authentication. It Begins.

Yes, you may not realize it yet but the news we announced this a.m. really....