Insights

Data Breaches and Online Identity Verification Solutions

How to Prevent Chargebacks, Friendly Fraud, and Other First-Party Fraud

Filter Articles

Introducing The Worlds First Bitcoin ATM

With much excitement, the day has finally come where we are being introduced to the worlds first Bitcoin ATM. The machine converts the virtual currency to conventional cash…

Is It Possible for Financial Institutions to Implement Virtual Currencies?

There are a lot of questions from financial institutions on whether or not its safe to offer virtual currencies into their offerings. Financial institutions that are considering the…

Simplicity for Integrating Identity Verification

Developers have long made use of existing components for custom development. This approach allows for the implementation of best practices within specialized areas including user authentication, account administration,…

Building A Concrete Authentication Plan

The best way to build a secure fraud prevention plan is to use layered, multiple verification and authentication methods. This can be done through several different solutions, like…

The Benefits of Drivers License Verification

In September 2013, New York implemented a new format of drivers licenses in an effort to make them more secure. This was done in hopes to start preventing…

The Benefits of Dynamic KBA

With identity theft recognized as one of the fastest growing crimes, the trust of consumers and businesses can be challenging based on the fear of becoming a victim…

Touch ID Biometrics and KBA Work In Perfect Harmony

There have been a lot of rumors around the new iPhone feature, a fingerprint scanner, related to identity theft and fraud. This technology is supposed to improve security…

Data Brokers Open the Door for Identity Theft

Massive amounts of data are constantly being generated about consumers and everything they do online. Data brokers are compiling information and selling it without fully verifying or authenticating…

Improving Phishing Prevention with ID Authentication

When two parties need to ensure the other party is trusted, digital signatures are great. The shared key is established after both parties have been authenticated, but the…

Their Voice, Your Identity: Proper Authentication in Biometrics

Theres no doubt that there is a lot of really innovative and cool technology in our world.Prior to working with EVS, I worked in telecommunications.I used to love…