{"id":6618,"date":"2009-09-08T16:58:00","date_gmt":"2009-09-08T16:58:00","guid":{"rendered":"https:\/\/evssolutions.com\/insights\/verification-vs-authentication-09-08-2009\/"},"modified":"2023-04-19T20:58:10","modified_gmt":"2023-04-19T20:58:10","slug":"verification-vs-authentication-09-08-2009","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/verification-vs-authentication-09-08-2009\/","title":{"rendered":"Verification vs. Authentication-09-08-2009"},"content":{"rendered":"
LOUISVILLE, Ky. (<\/span>September 8, 2009) – <\/em>Consumer interactions are evolving. With each passing year, innovations in convenience, security and cost-effectiveness revolve around transactions conducted online. But as the benefits of online transactions multiply, so do the risks taken by both business and consumer. Hackers, scammers and identity thieves develop new ways to exploit both parties just as quickly as they adapt to protect themselves from attack. It is critical in todays market for those participating in online business to take action to protect themselves, their consumers and their investments with solid identity verification and authentication tools.<\/p>\n When searching for the proper system to protect your interests, the difference between these two components can become obscured, especially in terms of government regulation compliance. In fact, the recent delay of the Federal Trade Commissions (FTC) Red Flags Rule implementation date from August 1 to November 1 was a direct result of confusion over for whom, and to what capacity, compliance procedures should be implemented. Its important for all business owners to understand and agree to the level of identity protection that is suitable for their needs.<\/p>\n In this article, we will explore the difference between verification and authentication, and how both are critical to your businesss overall success.<\/p>\n What Is Identity Verification?<\/strong> While identity verification alone is required for some businesses and is simply an extra layer of security for others, it is not foolproof. From fake IDs to intricately designed scams, those who would exploit businesses are quick to work around identity verification. And those workarounds mean that businesses, consumers and confidential information could be at serious risk. Thats where authentication comes in.<\/p>\n
\nIf you have ever been asked to display a drivers license<\/a>, enter a Social Security number<\/a>, or present other qualifying personal information before a transaction could proceed, you have experienced identity verification<\/a>. In other words, identity verification is simply asking a consumer to present a form of identification out of his or her wallet to prove who they are.<\/p>\n