ColRD: Create and share color inspiration with the world.

idology

http://www.idology.com | The most important thing to know about us is to understand what we do.…
image-dna: Identity Proofing Identity Proofing https://www.idology.com/identity-proofing | Identity proofing (also known as Identity Verification), or the means to verify and authenticate the identity of legitimate customers, has become more critical than ever. December 29th 2015
image-dna: 2015 Fraud Report Trends 2015 Fraud Report Trends https://www.idology.com/blog/2015_fraud_report_trends_infographic | Fraud is not going away – at least not anytime soon. That’s why we want to be proactive when it comes to fighting fraud. For the third year in a row, IDology launched our annual fraud report. We use valuable information and insight from our customers about what they’re seeing in hopes to educate others about the state of fraud, where it’s heading and new and shifting tactics. December 20th 2015
image-dna: USA PATRIOT Act Compliance USA PATRIOT Act Compliance https://www.idology.com/compliance-solutions/usa-patriot-act-compliance | According to USA PATRIOT Act Compliance regulations, financial service providers must carefully monitor transactions and implement a Customer Identification Program (CIP) in order verify a customer's identity and prevent fraud. December 17th 2015
image-dna: The Email Evolution The Email Evolution https://www.idology.com/infographic_email_evolution | Right now, you are able to send text and photo messages, videos, and more, all with the simple press of a button. But, do you know how far that has come and how email has advanced over the years as a communication method? There is no question – email has evolved greatly since its inception. Starting in 1965, the first emails were sent from one person to another using to computers that were less powerful than a digital watch you’d find today. In the 1970s, the practice evolved thanks to Ray Tomlinson and ARPANET, a connected system of computers, running the same software, that were able to communicate directly with one another. November 24th 2015
image-dna: Knowledge Based Authentication (KBA) - Out-of-Wallet Questions Knowledge Based Authentication (KBA) - Out-of-Wallet Questions https://www.idology.com/knowledge-based-authentication/knowledge-based-authentication-kba | Quickly being able to confirm someone is who they claim to be ultimately leads to faster purchase approvals, a better customer experience and quicker revenue for you. The key is to do this without increasing your costs or putting your customer’s identity at risk. November 20th 2015
image-dna: 7 Interesting Facts You Probably Didn’t Know about the Dark Web 7 Interesting Facts You Probably Didn’t Know about the Dark Web https://www.idology.com/infographic_7_interesting_facts_darkweb | You may be familiar with the Dark Web from what you’ve read in the news or even seen on TV shows like CSI Cyber, Mr. Robot, and others. However, there’s much more about the Dark Web that many organizations and their customers may not know. IDology recently launched a new infographic containing several interesting facts about the Dark Web. October 7th 2015
image-dna: The Dark Web Infographic: What is it and Why Does it Matter? The Dark Web Infographic: What is it and Why Does it Matter? https://www.idology.com/darkwebinfographic | Consumer information is becoming increasingly compromised. But where does all of that data go once it is stolen? In many cases, fraudsters turn to what is called the “Dark Web”, a collection of websites that grant users anonymity and can be used to trade and sell data that has been fraudulently obtained. While not all activity performed in the Dark Web is malicious, criminals have exploited the hidden nature of these sites to offer a variety of services as well as sell stolen consumer information. Although these sites are visible publicly, you must know their secret IP addresses and the servers that run them in order to access the sites, making visitors and site runners difficult to track. October 5th 2015
image-dna: DIY Identity Risk Scoring DIY Identity Risk Scoring https://www.idology.com/diy_identity_risk_scoring We all understand the importance of identity verification and fraud prevention when it comes to mitigating risk, acquiring new customers and meeting compliance standards. Because of this, IDology recently launched ExpectID Score which enables organizations to further enhance their customer authentication process by creating their own risk profiles and scoring models. What is identity risk scoring? Identity risk scores are an easy way for businesses to assess the risk of a particular transaction. By examining a transaction as high, medium or low risk, organizations can simplify the approval processes and enhance their business rules regarding fraud. When might you need identity risk scoring? If you want to comply with regulatory guidelines that recommend scoring If you have high risk customer segments If you perform international transactions If you have ID’s that pass but have suspicious attributes Through our ExpectID Score solution, you will gain the ability to “DYI” your own identity risk score utilizing our adaptive scoring functionality which allows you to create scoring models that fit your business rules and adapt to evolving fraud tactics. Identity attributes and fraud indicators can be assigned values based on risk to your business and then these values can be placed into risk thresholds that you, in turn, score. There are many additional benefits to identity risk scoring. Check out our new infographic called “DYI Identity Risk Scoring” for more information. October 5th 2015
image-dna: The Evolving Patient Portal, with Increased Adoption Brings Increased Risk The Evolving Patient Portal, with Increased Adoption Brings Increased Risk https://www.idology.com/evolvingpatientportalinfographic | Medical identity theft is a growing problem. Medical related identity theft accounted for 43% of all identity fraud committed in the US in 2013. And unfortunately, that number is anticipated to rise. With recent headlines containing news of healthcare data breaches, it is clear that healthcare organizations need to employ robust solutions in order to protect their patients from identity theft and fraud. As Electronic Medical Records grow in use and patient portals increase in adoption, healthcare organizations will inevitably experience more risk. October 5th 2015
image-dna: The Challenges & Benefits of a Trusted Mobile Identity The Challenges & Benefits of a Trusted Mobile Identity https://www.idology.com/infographic_trusted_mobileidentity | The amount of activity on the mobile marketplace has grown exponentially over the last decade, so much so that there are now more people using mobile devices than desktop computers worldwide. As such, the ability to accurately establish and ultimately trust the identity of a consumer in the mobile environment has become a top priority for organizations across a wide variety of industries. Establishing a persistent Mobile Identity for a customer is an important part of this process and comes with a number of challenges that, when properly addressed, can lead to significant benefits. October 5th 2015
image-dna: Card-Not-Present (CNP) Fraud Card-Not-Present (CNP) Fraud https://www.idology.com/cnpfraud_infographic | With e-commerce transactions increasing and consumers more willing to do business online, it is more important than ever for organizations to improve their identity verification processes. Check out the below infographic to learn more about Card-Not-Present (CNP) Fraud. October 5th 2015
image-dna: 2014 Fraud Report Trends Infographic 2014 Fraud Report Trends Infographic https://www.idology.com/2014_fraudtrends_infographic With fraudsters using more and more sophisticated methods every day, what steps do organizations need to take in order to stay ahead? According to our 2014 Fraud report, the rise in the amount of suspected fraud from 2013 to 2014 was significant, with 87 percent of survey respondents reporting they had experienced suspected fraud over the last 12 months, up from two-thirds in 2013. Understanding fraud targets allows an organization to discover and respond to potential threats, ensuring that legitimate customers get in and fraud stays out. There are three major trends that were apparent in this year’s fraud report: 1. Fraudsters continue to target web applications. 2. Credit, debit, and prepaid card fraud remains a major concern. 3. Small dollar fraud prevails. By addressing any weaknesses and enhancing the capabilities of a fraud prevention program using dynamic identity verification methods, an organization can effectively detect fraud and prevent it from taking place. Now is the time to act in order to protect customers and ensure that transactions process smoothly. Identity verification and fraud prevention technology solutions are a great way to ensure compliance with regulations, increase customer acquisition, and drive revenue. Click the below image to download a copy of our 2014 Fraud Report Trends Infographic for more details! October 5th 2015
image-dna: The Mobile Commerce Environment The Mobile Commerce Environment https://www.idology.com/infographic_mobile_commerce When you think of smartphones and the mobile environment, you may think about phone calls, texting or even social media. However, what’s becoming more and more common today is the use of smartphones as tools for accessing banking, payments, shopping, healthcare and other types of applications and websites. Nearly two-thirds of Americans now own smartphones and 19 percent of those rely on their smartphones for accessing online services. Not surprisingly, mobile commerce is expected to grow at a rate of 42 percent through 2016. With the convenience of smartphones being able to access their personal accounts across multiple industries, security remains a priority for organizations that have any sort of mobile applications. Tactics fraudsters use include malware, phishing, spoofing and even fake cellular towers to tap into phone calls and text messages. To see the complete list of statistics and findings for industries where consumers use their smartphones, and to see nine common fraud trends in the mobile industry, check out our complete infographic below. October 5th 2015

Close
Create

Back To Top