Insights

Electronic Verification Systems Partners with Skience To Augment New Account Opening Features for Wealth Management Firms

Identity Verification for Banks, & Financial Institutions

Identity Verification for Banks, & Financial Institutions

Filter Articles

Ashley Madison Data Breach Proves Even a Name is Valuable

Health care, government and education are common targets of data breaches. However, fraudsters are dominating headlines with a data breach of the affair-driven website, Ashley Madison. The breach…

Turbo Tax on the Defense Offline

As technology evolves, the fraud and identity theft risks do as well. In the last couple of months we have blogged about tax fraud prevention and the IRS…

Refund Fraud Causes Taxpayers Long Delays

Tax Day is April 15 and some people who already filed have received an unwelcome surprise, identity theft. In a February blog post, we covered the risks involved…

Identity Theft and Tax Season

As soon as the holidays end mid-January rolls around, many Americans start thinking about the next season falling up on us: tax season. For the majority of people….

Are We Ready for Identity Consolidation? Part 2

In yesterday’s post we discussed the Identity Ecosystem Framework, and the fact that these principles are already starting to emerge with Identity Providers. While the underlying concepts and…

Are We Ready for Identity Consolidation? Part 1

You are probably familiar with social log-ins, where instead of creating new credentials you log into a site by connecting to your Facebook, Twitter, or other social media…

2015, A Year for Action

This past year cyber security and fraud prevention became mainstream conversation with high profile breaches becoming commonplace on the daily news. While the new focus on fraud prevention…

What’s so Good About Being Different?

We’ve all heard those catch phrases like “Have it Your Way” and “Different is Good” and although a bit cliché, at EVS, we really mean it! Your identity…

Mobile Boarding Passes and Identity Verification

A Delta security flaw discovered this week showed once again the need for identity authentication measures for online and mobile platforms….

Real Age Verification – Getting Beyond the Button

In their most basic form, age screeners only require users to click a button to confirm that they are of age (often with the “right” option green, and…