<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:media="http://search.yahoo.com/mrss/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" >

<channel>
	<title>Veriff</title>
	<atom:link href="https://www.veriff.com/blog/fraud-ec-type/fraud-business/feed" rel="self" type="application/rss+xml" />
	<link>https://www.veriff.com</link>
	<description></description>
	<lastBuildDate>Fri, 14 Nov 2025 14:57:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<itunes:subtitle>Veriff</itunes:subtitle>
	<itunes:summary></itunes:summary>
	<itunes:explicit>false</itunes:explicit>
	<item>
		<title>Safeguarding your ecommerce site this Black Friday: a complete guide to fraud prevention</title>
		<link>https://www.veriff.com/fraud/business/black-friday-webinar-insights-ecommerce-fraud-safeguards</link>
		
		<dc:creator><![CDATA[Anna-Kristina Rätsep]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 14:56:57 +0000</pubDate>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<category><![CDATA[Marketplaces]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=fraud-article&#038;p=2067</guid>

					<description><![CDATA[<p>As ecommerce becomes the cornerstone of global retail, the holiday shopping rush around events like Black Friday and Cyber Monday presents a massive opportunity for retailers. Unfortunately, it also creates a prime hunting ground for fraudsters. With online sales growing, the threat of sophisticated fraud is more significant than ever. For businesses to thrive, they</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/black-friday-webinar-insights-ecommerce-fraud-safeguards">Safeguarding your ecommerce site this Black Friday: a complete guide to fraud prevention</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"></h3>



<p>As ecommerce becomes the cornerstone of global retail, the holiday shopping rush around events like Black Friday and Cyber Monday presents a massive opportunity for retailers. Unfortunately, it also creates a prime hunting ground for fraudsters. With online sales growing, the threat of sophisticated fraud is more significant than ever. For businesses to thrive, they must adopt robust security measures to protect their customers and their bottom line. This guide offers key insights and actionable strategies to help you safeguard your platform against the rising tide of ecommerce fraud.</p>



<h2 class="wp-block-heading">The escalating threat of e-commerce fraud</h2>



<p>A troubling increase in fraudulent activity has accompanied the growth of online shopping. A troubling increase in fraudulent activity has accompanied the growth of online shopping. Our <a href="https://www.veriff.com/resources/ebooks/future-of-ecommerce">Future of E-commerce report </a>shows a 21% rise in fraud between our 2024 and 2025 fraud reports. This isn&#8217;t a minor issue; we found that 1 in every 20 verification attempts in 2024 was fraudulent.</p>



<p>The financial impact is substantial. For more than a third of U.S. consumers, online fraud resulted in financial loss. On the business side, 13% of fraud decision-makers reported that fraud cost their company up to 20% of its annual revenue. This &#8220;fraud tax&#8221; is an unsustainable burden that demands immediate attention.</p>



<p>During peak shopping periods like Black Friday, the risk multiplies. The sheer volume of transactions provides cover for malicious actors to execute various scams. Key fraud types to watch for include:</p>



<ul class="wp-block-list">
<li><strong>Account Takeover Fraud:</strong> Criminals use stolen credentials from data breaches to access legitimate user accounts, making unauthorized purchases and changes.</li>



<li><strong>Refund and Return Fraud:</strong> Scammers exploit return policies by requesting refunds for items they never bought or by returning used or damaged goods. This type of policy abuse is the most common form of fraud experienced by nearly half of online merchants.</li>



<li><strong>Transaction and Chargeback Fraud:</strong> Using stolen credit card details, fraudsters make purchases, leading to significant financial losses and damaging chargeback ratios for merchants.</li>
</ul>



<p>A particularly alarming trend for the ecommerce industry is the rise of <strong>authorized fraud</strong>. Our 2025 Fraud Report revealed that ecommerce platforms suffer from this type of scam at a rate 18 times higher than the global average. This occurs when a user is tricked into completing an identity verification session, often through social engineering, giving fraudsters access to their accounts.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="576" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2024/12/Apple-digital-ID-1024x576.jpg" alt="" class="wp-image-34865" srcset="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2024/12/Apple-digital-ID-1024x576.jpg 1024w, https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2024/12/Apple-digital-ID-300x169.jpg 300w, https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2024/12/Apple-digital-ID-768x432.jpg 768w, https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2024/12/Apple-digital-ID-1536x864.jpg 1536w, https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/uploads/2024/12/Apple-digital-ID.jpg 1920w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2 class="wp-block-heading">AI: A double-edged sword in fraud prevention</h2>



<p>Artificial intelligence is revolutionizing the fraud landscape, presenting both challenges and opportunities. On one side, the accessibility of AI-powered tools has fueled a rise in sophisticated attacks. Over 60% of fraud professionals report an increase in AI-driven fraud attempts targeting their platforms, as generative AI enables the creation of synthetic identities and deepfakes with alarming ease.</p>



<p>On the other side, AI and machine learning are proving to be formidable allies in the fight against fraud. Businesses are leveraging these technologies to stay ahead of evolving threats. Research shows that 64% of U.S. ecommerce companies already use AI/ML for fraud prevention, with another 20% planning adoption within the next year. These systems excel at:</p>



<ul class="wp-block-list">
<li>Detecting complex fraud patterns and anomalies.</li>



<li>Accelerating the identification of sophisticated fraud attempts.</li>



<li>Automating customer verification processes.</li>



<li>Analyzing behavioral data to flag unusual activity.</li>
</ul>



<p>Veriff’s approach exemplifies the power of AI in fraud prevention. By combining cutting-edge AI with human expertise, Veriff has developed a layered system called <a href="https://www.veriff.com/identity-verification/ai-expertise-document-support">Enhanced Document Support</a>. This framework integrates large language models, mathematical forensics, and legal intelligence to detect fraud at scale. Their strategy merges AI’s precision with human insight, creating a resilient defense against emerging threats.</p>



<p>In an era where fraudsters innovate rapidly, businesses must adopt a proactive, AI-driven approach to safeguard digital trust. As Veriff demonstrates, the fusion of technology and human intelligence is key to staying one step ahead.</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 0px; margin-bottom: 0px; padding: 50px 0 50px;" id="block_c5dc657ffa14f99d653812d51428b538">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
        <span class="eyebrow">Unlock the future of secure ecommerce.</span>        <h2>Download your free copy of our in-depth industry report and discover the trends shaping tomorrow’s online marketplace</h2>        <p>Stay ahead in the rapidly evolving world of ecommerce.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark "
					   target="" href="https://www.veriff.com/resources/ebooks/future-of-ecommerce">
						<span class="btn-text">Read Now							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>



<h2 class="wp-block-heading">The IDV advantage: Meeting customer and regulatory demands</h2>



<p><a href="https://www.veriff.com/product/identity-verification">Identity Verification</a> (IDV) is no longer just a best practice; it&#8217;s a customer expectation. A staggering 75% of consumers believe IDV is important when signing up for an online marketplace. Businesses that prioritize robust security not only protect themselves but also build customer trust and loyalty.</p>



<p>Forward-thinking ecommerce companies are already reaping the benefits. A vast majority (83%) have adopted IDV and biometrics, with 81% planning to increase their reliance on this technology. The results speak for themselves. For example, by integrating Veriff’s IDV solution, JTI Philippines saw a 223% increase in customer conversion rates by streamlining its age-verification process. Similarly, The Pro&#8217;s Closet (TPC), a marketplace for pre-owned bikes, enhanced its operational efficiency and reduced fraud risk by automating seller verification.</p>



<p>Beyond customer demand, regulatory requirements like the INFORM Consumers Act in the U.S. mandate that online marketplaces collect and verify information for high-volume sellers. Partnering with an IDV provider is the most effective way to ensure compliance while maintaining a seamless user experience.</p>



<h2 class="wp-block-heading">Building your trust stack: A multi-layered strategy</h2>



<p>Effective fraud prevention requires a multi-layered approach—a &#8220;trust stack&#8221; designed to build confidence at every stage of the customer journey.</p>



<ul class="wp-block-list">
<li><strong>Identity Verification:</strong> This is the foundation. By verifying that users are who they claim to be, you establish a baseline of trust for all transactions.<a href="https://www.veriff.com/"> Veriff&#8217;s </a>solution combines document verification and biometric analysis to confirm a user&#8217;s identity quickly and accurately.</li>



<li><strong>Robust security:</strong> Protect customer data with essentials like secure server connections, data encryption, and two-factor authentication.</li>



<li><strong>Transparency:</strong> Be clear about your policies, processes, and fees. Accountability inspires confidence and reassures users.</li>



<li><strong>Social proof:</strong> Online reviews and testimonials are powerful trust signals. Research shows that nearly 95% of shoppers read reviews before making a purchase.</li>



<li><strong>Consumer protection:</strong> Implement clear refund and return policies to protect customers when things go wrong.</li>
</ul>



<h3 class="wp-block-heading"><strong>Preparing for the future with Veriff</strong></h3>



<p>As fraud tactics evolve, <a href="https://www.veriff.com/">Veriff</a> continues to lead with proactive innovation. Our CrossLinks technology identifies fraud patterns across a global network—detecting reused credentials or AI-generated identities without sharing personal data. Combined with advanced liveness detection and document authenticity checks, Veriff’s platform helps businesses stay ahead of deepfakes, digital manipulation, and emerging identity threats.</p>



<p>A powerful example of this innovation in action is Veriff’s partnership with <strong><a href="https://www.veriff.com/case-studies/veriff-a1-solarstore-partnership-fraud-prevention">A1 SolarStore</a></strong>, a digital-first marketplace operating across the U.S., Caribbean, and Europe. Facing an uptick in chargeback and shipping-redirection fraud due to high-value orders, A1 SolarStore needed a solution that could be deployed quickly and scale globally. By integrating Veriff’s AI-driven identity verification system, the company achieved <strong>a 100% reduction in chargeback incidents</strong>, effectively eliminating fraud while improving the experience for legitimate customers through frictionless verification. The partnership demonstrates how advanced IDV and AI—when strategically implemented—can safeguard ecommerce platforms even during high-risk shopping periods like Black Friday and Cyber Monday.</p>



<p>The foundation of secure digital commerce is trust. By integrating AI, biometrics, and responsible verification systems like <a href="https://www.veriff.com/demo/age-estimation">Veriff’s Age Estimation</a>, businesses can protect their users, meet compliance requirements, and deliver seamless customer experiences built on safety and integrity.</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/black-friday-webinar-insights-ecommerce-fraud-safeguards">Safeguarding your ecommerce site this Black Friday: a complete guide to fraud prevention</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>US data privacy laws: Key insights for financial services</title>
		<link>https://www.veriff.com/fraud/business/us-privacy-laws-key-insights-financial-services</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Fri, 09 May 2025 13:02:00 +0000</pubDate>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Finserv]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=fraud-article&#038;p=2150</guid>

					<description><![CDATA[<p>Introduction As U.S. data privacy laws for financial services tighten, are you ready to make compliance a competitive edge? Financial institutions face challenges with federal (GLBA,&#160;FCRA) and state (CCPA,&#160;VCDPA) laws, urging them to enhance their privacy frameworks. It’s about protecting personal financial and consumer data, empowering clients, and building trust. This article explores strategies for</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/us-privacy-laws-key-insights-financial-services">US data privacy laws: Key insights for financial services</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Introduction</h2>



<p>As U.S. data privacy laws for financial services tighten, are you ready to make compliance a competitive edge? Financial institutions face challenges with federal (<a href="https://www.ftc.gov/business-guidance/privacy-security/gramm-leach-bliley-act" target="_blank" rel="noopener">GLBA</a>,&nbsp;<a href="https://www.ftc.gov/legal-library/browse/statutes/fair-credit-reporting-act" target="_blank" rel="noopener">FCRA</a>) and state (<a href="https://oag.ca.gov/privacy/ccpa" target="_blank" rel="noopener">CCPA</a>,&nbsp;<a href="https://legalblink.it/post/vcdpa-virginia-consumer-data-protection-act.html" target="_blank" rel="noopener">VCDPA</a>) laws, urging them to enhance their privacy frameworks. It’s about protecting personal financial and consumer data, empowering clients, and building trust. This article explores strategies for staying compliant and strengthening customer loyalty in a privacy-focused world. Ensuring that financial data reporting is correct is crucial for compliance and protecting consumer rights. Don’t just comply—lead the way.</p>



<h3 class="wp-block-heading">Why privacy, and why now?</h3>



<p>Privacy regulations are rapidly evolving across the United States, exposing businesses to a myriad of compliance, operational, and financial risks. Over recent decades, federal laws and state laws have emerged to shield individuals’ personal information from exploitation.</p>



<p>Privacy regulations are coming into force across the United States throughout 2025 and beyond, and these regulatory changes expose organizations to numerous compliance, operational, and financial risks. Over the last few decades, a wave of privacy legislation worldwide has been building, as individuals and governments have taken steps to safeguard their sensitive data and private information in an increasingly digital world. The cost of identity theft, the prevalence of data breach(es), children’s online privacy, consumer requests, and an increased awareness of how private information can be exploited, sold, and stolen have driven national and international regulatory scrutiny into the data collection, data safeguards, and data processes that organizations (including government agencies) have established around individuals’ private information.&nbsp;<a target="_blank" href="https://www.ftc.gov/business-guidance/privacy-security/gramm-leach-bliley-act" rel="noreferrer noopener">&nbsp;The Gramm-Leach-Bliley Act</a>&nbsp;(GLBA) Privacy Rule requires financial institutions to disclose their data-sharing practices and set up controls to protect consumer privacy.&nbsp;<a href="https://www.ftc.gov/legal-library/browse/statutes/fair-credit-reporting-act" target="_blank" rel="noopener">The Fair Credit Reporting Act</a>&nbsp;(FCRA) ensures accuracy in credit data handling. Still, these federal laws address only very specific aspects of personal data processing. Without a unifying federal privacy law like the American Data Privacy and Protection Act (ADPPA) bill tried to introduce, individual states are leading the charge with tailored privacy frameworks.</p>


<div class="space-after-shadow">
    <section class="general-section client-testimonial alignfull   size-default heading-dark text-dark" style="background:#fff no-repeat; text-align: left !important; margin-top: 0px; margin-bottom: 0px; padding: 50px 0 50px;" id="block_6b6935ca402b2f97c1ae2de13ec54ab6">
                        <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
            <div class="client-testimonial-content">
                <div class="row-detail-content">
                    <figure class="icon-dots-col">
                        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/quote.svg" alt="quote" title="quote">
                    </figure>
                    <div class="content-right-testimonial">
                        <p>Today, states have identified additional areas of trade that require privacy regulation, and without a unifying federal law like the ADPPA bill introduced, they have taken steps to introduce state-level privacy bills.</p>
                    </div>
                </div>
                <div class="row-detail-position">
                    
                    <div class="info-author-col">
                        <p class="author-position-inner mb-0">
                                                            <strong>Margot Arnus</strong>
                                                                                        <span>Senior Privacy and Product Legal Counsel,</span>
                                                                                        <span>Veriff</span>
                                                    </p>
                    </div>
                </div>
            </div>
        </div>
    </section>
</div>


<h3 class="wp-block-heading">Key areas of privacy class action&nbsp;</h3>



<p>Privacy class action lawsuits remain a significant and growing risk for businesses operating in the United States.</p>



<p>Organizations risk exposure to class actions related to:</p>



<ul class="wp-block-list">
<li><em>Unauthorized access and misuse of biometric data (e.g., BIPA)</em></li>



<li><em>Unauthorized text communications (TCPA)</em></li>



<li><em>Call recording without consent (CIPA)</em></li>



<li><em>Tracking video consumption (VPPA)</em></li>
</ul>



<p>Further, tools like cookies and chatbots have drawn scrutiny under state privacy laws, especially when consumer data is leaked due to poor security measures.</p>



<p>Digital surveillance practices—such as the use of cookies, pixels, chatbots, and “session replay” tools—are especially scrutinized by regulators and plaintiffs alike. Under the CCPA, for example, companies may face private lawsuits if a data breach occurs due to insufficient security measures. The consumers can seek damages up to USD 750 per incident.</p>



<p>The finance sector remains one of the top industries to be targeted under&nbsp;<a target="_blank" href="https://perkinscoie.com/ccpa-litigation-tracker" rel="noreferrer noopener">CCPA claims.</a>&nbsp;This evolving litigation landscape reinforces the importance of strict compliance with privacy regulations. Businesses that fail to adopt proactive data protection measures not only risk financial penalties but also significant reputational harm.</p>



<h3 class="wp-block-heading">Key provisions of state-specific privacy laws in financial services</h3>



<ul class="wp-block-list">
<li><strong>Data protection:</strong> Financial services must secure customer information and personal data using encryption and safeguards that prevent unauthorized access. This is a requirement for financial institutions under <a href="https://www.ftc.gov/business-guidance/privacy-security/gramm-leach-bliley-act" target="_blank" rel="noopener">GLBA</a>, and also emphasized by many state laws. Veriff’s identity verification solutions support compliance, protect personal information, and help to maintain audit trails—key in case of regulator inquiries.</li>



<li><strong>Consumer rights:</strong> Modern privacy laws grant consumers rights to access, correct, or delete their personal and financial information. States like Virginia, Utah, and Colorado require clear privacy notices, opt-outs for marketing, and detailed vendor contracts. <a href="https://www.texasattorneygeneral.gov/consumer-protection/file-consumer-complaint/consumer-privacy-rights/texas-data-privacy-and-security-act" target="_blank" rel="noopener">The Texas Data Privacy and Security Act (TDPSA)</a>, effective July 2024, impacts contracts between financial services and third-party service providers.</li>



<li><strong>Opt-out mechanisms: </strong>Clear, easy opt-outs for the use of consumer data in marketing or analytics are now a must. Companies must honor users’ choices and provide controls that reflect the protection act intent of the law.</li>
</ul>



<h2 class="wp-block-heading">The importance of compliance for financial institutions</h2>



<p><a target="_blank" href="https://www.veriff.com/blog/the-essential-ways-veriff-strengthens-our-compliance" rel="noreferrer noopener">Compliance</a>&nbsp;with state-specific privacy laws is not just a regulatory issue—it’s a vital part of the value proposition for financial services companies. Financial institutions have the opportunity to differentiate themselves from the competition by demonstrating their commitment to protecting client data and protecting consumers. Non-compliance, on the other hand, can lead to<a target="_blank" href="https://www.veriff.com/kyc/learn/kyc-issues-and-challenges" rel="noreferrer noopener">&nbsp;severe consequences, such as fines, reputational damage, and loss of trust</a>.&nbsp;</p>



<p>Non-compliance with state privacy mandates has a direct financial impact on companies via regulatory fines calculated per violation. For example,&nbsp;<a href="https://oag.ca.gov/privacy/privacy-enforcement-actions" target="_blank" rel="noopener">Blackbaud</a>, Inc., in a stipulated judgment, agreed to pay $6.75 million to resolve allegations that it violated consumer protection and privacy laws.&nbsp;</p>



<p>By embedding data privacy into their operations, financial services businesses can build client loyalty and enhance their reputation as leaders in data protection. When<a target="_blank" href="https://www.veriff.com/use-cases/kyc" rel="noreferrer noopener">&nbsp;selecting a service provider</a>, it’s important that they share your commitment and values.</p>



<h5 class="wp-block-heading">🎥&nbsp;<strong>Watch this explainer video:</strong><a target="_blank" href="https://www.youtube.com/watch?v=1Nvep18-jDM" rel="noreferrer noopener">&nbsp;<strong>What is U.S. data privacy and why does it matter?</strong></a></h5>



<p><em>This short video breaks down how U.S. data privacy laws are evolving and why financial institutions must act now to stay ahead. It’s a great complement to our comprehensive guide.</em></p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_a2e0c21e652e1462b13ccd70260e1920">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Explore our Ultimate Guide to U.S. data privacy laws for financial services.</h3>        <p>Stay compliant and secure with the latest updates in U.S. data privacy regulations.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/fraud/guides/us-data-privacy-protection">
						<span class="btn-text">Get the guide now							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>



<h3 class="wp-block-heading">The role of Identity Verification in financial compliance</h3>



<p><a target="_blank" href="https://www.veriff.com/product/identity-verification" rel="noreferrer noopener">Identity verification</a>&nbsp;is essential in complying with laws that protect consumer rights and guard against unauthorized access. Advanced tools from Veriff help verify identities accurately while preserving personal information integrity and privacy.</p>



<p>Such tools automate checks, create audit logs, and assist with compliance with both federal laws and state laws, including the Fair Credit Reporting Act (FCRA) and Gramm-Leach-Bliley Act (GLBA).</p>



<p>With increasingly sophisticated cyber threats, accurately verifying a client’s<a target="_blank" href="https://www.veriff.com/case-studies" rel="noreferrer noopener">&nbsp;identity</a>&nbsp;is essential, particularly when processing requests for access, deletion, or modification of personal data. Financial institutions must request access to verify identities for data access requests, ensuring that only authorized individuals can view or modify sensitive information. However, the privacy and data protection aspects must also be taken into account. By using<a target="_blank" href="https://www.veriff.com/es" rel="noreferrer noopener">&nbsp;advanced identity verification solutions, such as those provided by Veriff</a>, financial institutions can securely confirm identities, mitigating fraud and ensuring compliance with state laws.</p>



<p>These solutions streamline the compliance process by automating<a target="_blank" href="https://www.veriff.com/product/ssn-verification" rel="noreferrer noopener">&nbsp;identity verification</a>, supporting data protection efforts, and enabling the setting up of audit trails. When it comes to handling such incredibly sensitive data, a competent service provider helps financial institutions to achieve peace of mind. The auditability of these processes ensures that financial institutions can<a target="_blank" href="https://www.veriff.com/product/aml-screening" rel="noreferrer noopener">&nbsp;demonstrate compliance in the event of regulatory scrutiny</a>.</p>



<h3 class="wp-block-heading">Practical tips for financial institutions</h3>



<p>Implementing effective security measures is critical for protecting consumer financial information in the United States.&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Stay informed</strong>: Track developments in federal and state laws to remain compliant.</li>



<li><strong>Invest in technology</strong>: Use identity verification, encryption, and monitoring tools to protect financial products and services.</li>



<li><strong>Enhance transparency</strong>: Clearly disclose how you handle personal data.</li>



<li><strong>Train your team</strong>: Ensure staff understand how to comply with regulations and handle consumer data responsibly.</li>



<li><strong>Conduct audits</strong>: Regularly assess systems and practices to prevent unauthorized access and demonstrate due diligence.</li>
</ul>



<h3 class="wp-block-heading">Future of US data privacy law</h3>



<p><a href="https://www.ftc.gov/" target="_blank" rel="noopener">The Federal Trade Commission (FTC)&nbsp;</a>is actively proposing new rules to unify the currently fragmented U.S. approach to data privacy. As states continue to pass or propose comprehensive privacy laws (keep in mind that for example&nbsp;<strong>Nebraska</strong>,&nbsp;<strong>New Hampshire&nbsp;</strong>and&nbsp;<strong>New Jersey&nbsp;</strong>state laws just entered into force in January 2025), and federal legislation efforts gain traction, financial institutions must be ready to adapt.</p>



<p>These evolving frameworks are expected to reshape how businesses collect, process, and protect personal information, especially when delivering financial products and services. In particular, organizations handling biometric data or sensitive consumer details will need to ensure proper consent mechanisms and robust safeguards are in place to comply with both state laws and any upcoming federal laws.</p>



<p>Proactively investing in systems implementing privacy by default principles and privacy by design practices now will help organizations remain resilient amid regulatory shifts, reducing legal exposure, protecting consumer data, and strengthening long-term trust and competitiveness.</p>



<h3 class="wp-block-heading">Conclusion</h3>



<p>In conclusion,&nbsp;<a href="https://www.veriff.com/fraud/guides/us-data-privacy-protection">US privacy laws&nbsp;</a>are complex and multifaceted, with both federal and state regulations playing a critical role in protecting consumer data. Financial institutions must navigate a range of laws and regulations, including the GLBA, FCRA, and CCPA, to ensure they are taking adequate measures to safeguard sensitive financial information. By staying informed about the latest developments in US privacy laws and working with regulatory agencies, businesses can help protect consumer data and maintain trust in the financial system. As the landscape of data privacy continues to evolve, financial institutions need to prioritize compliance and invest in robust security programs to prevent data breaches and protect sensitive information to regulatory frameworks and requirements.</p>



<h2 class="wp-block-heading">FAQ</h2>



<h3 class="wp-block-heading">1. Why are U.S. states enacting their own data privacy laws?</h3>



<p>Without a comprehensive federal law, states are passing laws to protect consumer data and address the growing threat of unauthorized access and data misuse.</p>



<h3 class="wp-block-heading">2. What challenges do businesses face with varying state privacy laws?</h3>



<p>Operating in multiple jurisdictions means tracking and complying with differing protection act requirements—an evolving task demanding a dedicated strategy.</p>



<h3 class="wp-block-heading">3. How does the U.S. approach differ from the EU’s GDPR?</h3>



<p>The U.S. approach is fragmented—relying on a mix of federal sectoral laws like GLBA or HIPAA, and state privacy laws such as the CCPA, whereas the EU’s GDPR is uniform across sectors and borders.</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/us-privacy-laws-key-insights-financial-services">US data privacy laws: Key insights for financial services</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Online fraud in the United States: How financial services can combat fraud</title>
		<link>https://www.veriff.com/fraud/business/online-fraud-united-states-financial-services-combat-fraud</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Wed, 06 Nov 2024 12:42:00 +0000</pubDate>
				<category><![CDATA[Fraud Prevention]]></category>
		<category><![CDATA[Crypto]]></category>
		<category><![CDATA[Fraud]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=fraud-article&#038;p=2102</guid>

					<description><![CDATA[<p>Don&#8217;t miss the chance to explore the latest trends and gain actionable insights essential for combating fraud and protecting your business. Download our&#160;Identity Fraud Report 2024 Online fraud is a rapidly growing threat in the United States, with criminals increasingly using deceptive tactics to trick victims into harmful actions. These actions often result in financial</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/online-fraud-united-states-financial-services-combat-fraud">Online fraud in the United States: How financial services can combat fraud</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Don&#8217;t miss the chance to explore the latest trends and gain actionable insights essential for combating fraud and protecting your business. Download our&nbsp;<a target="_blank" href="https://www.veriff.com/resources/ebooks/fraud-report-2024" rel="noreferrer noopener">Identity Fraud Report 2024</a></strong></p>



<p>Online fraud is a rapidly growing threat in the United States, with criminals increasingly using deceptive tactics to trick victims into harmful actions. These actions often result in financial loss, theft of personal or confidential information, and other damages. Unlike many forms of cybercrime, online fraud involves tricking victims into voluntarily performing these actions. The rise in cybercrime incidents, particularly online fraud, has been alarming. Between 2019 and 2023, the number of<a href="https://www.ic3.gov/AnnualReport/Reports/2023_IC3Report.pdf" target="_blank" rel="noopener">&nbsp;cybercrime cases in the U.S.&nbsp;</a>soared from 467,000 to over 880,000, with the financial impact rising from $3.5 billion to an astonishing $12.5 billion over the same period.</p>



<p>One of the earliest known scams in history was the infamous &#8220;419 scam&#8221; or &#8220;Nigerian Prince scam,&#8221; which originally emerged in the 1980s as mail fraud. This type of scam has evolved over time, and the internet has made it easier for fraudsters to reach larger audiences with similar tactics.</p>



<figure class="wp-block-embed is-type-wp-embed is-provider-fillout wp-block-embed-fillout"><div class="wp-block-embed__wrapper">
<iframe class="wp-embedded-content" sandbox="allow-scripts" security="restricted" title="Fillout" src="https://embed.fillout.com/t/8mSpBwZiwTus?fillout-embed-id=56272219765790&#038;fillout-embed-type=fullscreen&#038;fillout-embed-parent-page=https%3A%2F%2Fwww.veriff.com%2Ffraud%2Fbusiness%2Fonline-fraud-united-states-financial-services-combat-fraud#?secret=Qq3l9EsGzN" data-secret="Qq3l9EsGzN" width="900" height="600" frameborder="0" marginheight="0" marginwidth="0"></iframe>
</div></figure>



<h3 class="wp-block-heading">Phishing: A persistent threat</h3>



<p>Phishing is one of the most prevalent forms of online fraud in the U.S. In 2023, there were nearly&nbsp;<a href="https://www.ic3.gov/AnnualReport/Reports/2023_IC3Report.pdf" target="_blank" rel="noopener">299,000 phishing incidents reported</a>&nbsp;to law enforcement. Phishing involves tricking individuals into revealing personal information such as login credentials, credit card numbers, or other sensitive data. Mobile phishing, in particular, is on the rise, with North America being one of the regions most affected. According to recent data, online shopping scams have seen the biggest increase over the past eight years, highlighting the importance of caution when making purchases online. A recommended way to avoid these scams is to research online retailers before purchasing to ensure their legitimacy.</p>



<p>Phishing simulations, where organizations test their employees&#8217; ability to recognize fraudulent emails or links, have revealed the vulnerability of various industries. In 2023, sectors such as business services, consulting, telecommunications, construction, and entertainment showed the lowest resistance rates to phishing attacks, highlighting the need for better cybersecurity awareness and training.</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_3176b0b12a92eae5e4e19dd0a409b251">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Talk to us</h3>        <p>Talk to us to learn how Veriff can help your business fight fraud and avoid the biggest online scams.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/contact-sales">
						<span class="btn-text">Talk to us							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>



<h3 class="wp-block-heading">Business E-mail compromise (BEC)</h3>



<p>Another highly damaging form of online fraud is Business E-mail Compromise (BEC). In 2023, more than 21,000 individuals were targeted by BEC attacks in the U.S. In these attacks, fraudsters impersonate a trusted entity, such as a CEO or vendor, and trick employees into transferring money or sensitive information. The financial losses from BEC attacks were significant, amounting to&nbsp;<a href="https://www.ic3.gov/AnnualReport/Reports/2023_IC3Report.pdf" target="_blank" rel="noopener">$2.94 billion in 2023, up from $2.74 billion in 2022.</a>&nbsp;BEC scams can lead to severe financial damage; for instance, the largest recorded loss from a single email scam was a staggering $47 million.</p>



<h3 class="wp-block-heading">Impersonation scams: Targeting brands</h3>



<p>Impersonation scams, where fraudsters pose as well-known brands, are also on the rise.&nbsp;<a href="https://www.ftc.gov/system/files/ftc_gov/pdf/data-spotlight-who-s-who-in-scams-a-spring-roundup.pdf" target="_blank" rel="noopener">Best Buy&#8217;s Geek Squad&nbsp;</a>was the most impersonated brand in the U.S. in 2023, followed closely by Amazon. Microsoft was involved in 68% of online brand impersonation incidents. Impersonation scams often exploit cryptocurrency payments, and in 2023, they caused $208 million in financial losses through this payment method alone.</p>



<h3 class="wp-block-heading">Seniors targeted by scams</h3>



<p>Fraudsters often prey on the most vulnerable groups, and seniors in the U.S. are frequently targeted.<a href="https://www.fbi.gov/news/stories/elder-fraud-in-focus" target="_blank" rel="noopener">&nbsp;In 2023, individuals aged 60 and older filed the highest number of cybercrime complaints</a>, which included various types of online fraud. This age group also faced the highest financial losses, which totaled $3.4 billion. The most reported form of cybercrime among seniors was tech support fraud, but the most financially devastating were investment scams.</p>



<p>A key tip for avoiding scams like computer software service fraud is to never let someone take control of your computer unless you’re absolutely sure of their legitimacy.</p>



<h3 class="wp-block-heading">Changing landscape: Social media &amp; AI</h3>



<p>The nature of online fraud is evolving, with<a href="https://www.ftc.gov/system/files/ftc_gov/pdf/social-media-spotlight-oct-2023.pdf" target="_blank" rel="noopener">&nbsp;social media now playing a significant role in scam encounters.</a>&nbsp;Social media platforms have become the most common avenue for costly scams, with online shopping frauds being particularly prevalent. Additionally, the rise of generative AI has made it easier for fraudsters to create convincing deep fakes, further complicating the detection of online fraud.</p>



<h2 class="wp-block-heading">Key tips for financial services to combat online fraud</h2>



<p>Financial services organizations are prime targets for online fraud due to the sensitive nature of the data they handle and the high volume of transactions they process. To effectively combat the ever-evolving threat of online fraud, financial services companies must adopt a multifaceted approach that includes technological advancements, customer education, and strong security measures.</p>



<figure class="wp-block-embed is-type-rich is-provider-embed-handler wp-block-embed-embed-handler wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Keep your financial institution safe with IDV | Veriff" width="640" height="360" src="https://www.youtube.com/embed/5y-U2UIEq-4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>Here are some key strategies:</p>



<h4 class="wp-block-heading"><strong>1. Implement Multi-Factor Authentication (MFA)</strong></h4>



<p>To reduce the risk of unauthorized access, financial institutions should implement&nbsp;<a target="_blank" href="https://www.veriff.com/blog/what-is-two-factor-authentication-2fa" rel="noreferrer noopener"><strong>Multi-Factor Authentication (MFA)</strong></a>. MFA adds an extra layer of security by requiring users to verify their identity through multiple methods, such as a one-time code or biometric authentication. This makes it harder for fraudsters to exploit stolen credentials.</p>



<h4 class="wp-block-heading"><strong>2. Leverage Artificial Intelligence (AI) and Machine Learning (ML)</strong></h4>



<p>Financial services can benefit greatly from AI and ML technologies. These tools analyze large datasets to detect patterns and anomalies that may indicate fraudulent activity. AI-driven systems can provide real-time alerts on suspicious transactions, making it possible to prevent fraud before significant damage occurs.</p>



<h4 class="wp-block-heading"><strong>3. Enhance customer education and awareness</strong></h4>



<p>Fraudsters often rely on tricking individuals into sharing sensitive information. Educating customers on the latest fraud tactics, such as phishing and impersonation scams, can help prevent such attacks. Regularly share cybersecurity best practices, such as avoiding suspicious links and verifying requests for sensitive information.</p>



<h4 class="wp-block-heading"><strong>4. Deploy advanced fraud detection solutions</strong></h4>



<p>Financial services should invest in advanced fraud detection solutions that use&nbsp;<a target="_blank" href="https://www.veriff.com/product/biometric-authentication" rel="noreferrer noopener">biometric authentication</a>, AI, and data analytics to identify suspicious activities in real-time. These systems can monitor account activities, detect unauthorized access, and block fraudulent transactions before they occur.</p>



<h4 class="wp-block-heading"><strong>5. Adopt strong data encryption and secure communication channels</strong></h4>



<p>Securing data and communication channels is critical in preventing fraud. Financial services must use strong encryption protocols to protect sensitive customer information during both storage and transmission. All digital platforms, including mobile apps, should employ secure HTTPS connections to safeguard against data breaches.</p>



<h4 class="wp-block-heading"><strong>6. Monitor and block business e-mail compromise (BEC) attempts</strong></h4>



<p>Financial institutions must be vigilant against BEC attacks by implementing email verification protocols, such as&nbsp;<a target="_blank" href="https://dmarc.org/" rel="noreferrer noopener"><strong>DMARC</strong></a>&nbsp;(Domain-based Message Authentication, Reporting &amp; Conformance), to prevent fraudulent emails from reaching employees. Training staff on how to spot suspicious emails and verify financial requests is crucial.</p>



<h4 class="wp-block-heading"><strong>7. Strengthen vendor and partner security</strong></h4>



<p>As third-party vendors can introduce security risks, financial institutions should implement strict vendor management protocols. Regularly auditing the security practices of partners and requiring them to adhere to the same cybersecurity standards helps minimize potential vulnerabilities.</p>



<h4 class="wp-block-heading"><strong>8. Use Identity Verification and KYC processes</strong></h4>



<p>By implementing strong&nbsp;<a target="_blank" href="https://www.veriff.com/kyc/guides/kyc-and-cdd-in-aml-compliance-what-your-business-needs-to-know" rel="noreferrer noopener"><strong>Know Your Customer (KYC)</strong>&nbsp;</a>procedures, financial services can verify the legitimacy of their customers and reduce fraud risk. Automated identity verification solutions that use biometrics and government-issued ID checks can help prevent fraudsters from creating fake accounts or engaging in unauthorized transactions.</p>



<h4 class="wp-block-heading"><strong>9. Implement transaction limits and alerts</strong></h4>



<p>Setting transaction limits and sending real-time alerts for high-risk transactions, such as large fund transfers or payments to unfamiliar accounts, can help detect and block fraudulent activity early. Customers should be immediately notified of suspicious transactions.</p>



<h4 class="wp-block-heading"><strong>10. Collaborate with law enforcement and fraud networks</strong></h4>



<p>Collaboration is key in the fight against online fraud. Financial institutions should work closely with law enforcement agencies and participate in fraud detection networks to share information about emerging threats and fraudulent schemes. This collective intelligence can help prevent fraud on a larger scale.</p>



<h3 class="wp-block-heading"><strong>Conclusion</strong></h3>



<p>The online fraud landscape is constantly evolving, but financial services can significantly reduce their risk by adopting a combination of technological solutions, customer education, and internal security measures. By staying proactive, leveraging AI-powered fraud detection, and maintaining strong communication with both customers and law enforcement, financial services organizations can protect themselves and their customers from the growing threat of online fraud.</p>



<h2 class="wp-block-heading">How Veriff can help fight fraud</h2>



<p>As online fraud continues to grow, businesses need reliable solutions to protect their customers and their own operations from cybercriminals.&nbsp;<a target="_blank" href="https://www.veriff.com/" rel="noreferrer noopener"><strong>Veriff</strong>,</a>&nbsp;a leading identity verification platform, is well-equipped to help financial services and other industries in their fight against online fraud. Here’s how Veriff can provide crucial support:</p>



<h4 class="wp-block-heading"><strong>1. AI-Powered Identity Verification</strong></h4>



<p>Veriff uses advanced artificial intelligence (AI) and machine learning (ML) technologies to verify the identity of users in real-time. By analyzing biometric data, government-issued IDs, and behavioral patterns, Veriff can quickly and accurately detect fraudulent attempts to create fake accounts or perform unauthorized transactions. This helps prevent fraud at the point of onboarding and ensures that businesses are dealing with legitimate customers.</p>



<h4 class="wp-block-heading"><strong>2. Comprehensive KYC &amp; AML Solutions</strong></h4>



<p>Veriff&#8217;s&nbsp;<a target="_blank" href="https://www.veriff.com/use-cases/kyc" rel="noreferrer noopener"><strong>Know Your Customer (KYC)</strong>&nbsp;</a>and&nbsp;<a target="_blank" href="https://www.veriff.com/product/aml-screening" rel="noreferrer noopener"><strong>Anti-Money Laundering (AML)</strong></a>&nbsp;solutions help financial services comply with regulatory requirements while preventing fraud. By automating the verification process, Veriff enables businesses to identify high-risk customers and ensure that they meet compliance standards, reducing the risk of financial crimes like money laundering and fraud.</p>



<h4 class="wp-block-heading"><strong>3. Fraud Detection &amp; Prevention</strong></h4>



<p>With Veriff’s real-time fraud detection tools, businesses can identify suspicious activity during the verification process. Veriff&#8217;s technology detects anomalies such as document forgery, synthetic identity creation, and deepfake attempts, enabling companies to flag and block fraudulent transactions before they cause harm.</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_885650b1762bc95165889250d7e32348">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Get the Identity Fraud report 2025</h3>        <p>Discover global data on consumer attitudes to fraud, risk, and digital identity.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/resources/ebooks/veriff-identity-fraud-report-2025">
						<span class="btn-text">Get the fraud report							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/online-fraud-united-states-financial-services-combat-fraud">Online fraud in the United States: How financial services can combat fraud</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Unveiling the threat: A deep dive into document fraud [2024]</title>
		<link>https://www.veriff.com/fraud/business/document-fraud-tampering-2024</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Wed, 17 Apr 2024 12:09:00 +0000</pubDate>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Finserv]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=fraud-article&#038;p=2078</guid>

					<description><![CDATA[<p>1. Document fraud&#160; – a growing danger Document fraud is one of the biggest dangers today regarding online fraud. What exactly is the threat – and how can it be prevented?&#160; Document fraud is often the type of identity fraud that leaps to mind first &#8211; whether it is tampering with an existing identity document</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/document-fraud-tampering-2024">Unveiling the threat: A deep dive into document fraud [2024]</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">1. Document fraud&nbsp; – a growing danger</h2>



<p>Document fraud is one of the biggest dangers today regarding online fraud. What exactly is the threat – and how can it be prevented?&nbsp;</p>



<p>Document fraud is often the type of identity fraud that leaps to mind first &#8211; whether it is tampering with an existing identity document or an entirely fake&nbsp;<a target="_blank" href="https://www.veriff.com/supported-countries" rel="noreferrer noopener">identity document</a>. Fraudulent documents often exist in the form of fake IDs for a specific real-world application &#8211; such as gaining access to something you’re underage for &#8211; but online, there is normally more skill that goes into their creation. They look to serve a monetary purpose, frequently offering some form of financial bonus for inviting more users to a site.</p>



<p>So, let’s look at both examples.</p>



<h2 class="wp-block-heading">2. Tampered documents</h2>



<p>There are various methods of tampering, but the result always includes slight alterations made to a legitimate document in order to partially or entirely change the holder’s identity. Forgeries include but are not limited to:</p>



<ul class="wp-block-list">
<li>Altering or replacing the document image</li>



<li>Overwriting document data with a pen, pencil, or other simple tools</li>



<li>Adding/removing specific document data or elements</li>
</ul>



<h2 class="wp-block-heading">3. Fake documents</h2>



<p>While tampered documents are usually counterfeited original documents, fake documents include manipulations that try to imitate the appearance of a legitimate-looking document but, in reality, are reproductions of the original. Such forgeries might come in the form of:</p>



<ul class="wp-block-list">
<li>Alterations of government-issued document specimens that are publicly available</li>



<li>Premade templates with inserted fake photos and document data</li>



<li>AI-Generated document fakes&nbsp;</li>
</ul>



<p>According to the&nbsp;<a target="_blank" href="https://www.veriff.com/resources/ebooks/fraud-report-2024" rel="noreferrer noopener">Veriff Identity Fraud Report 2024</a>, there was a 20% rise in overall fraud year-on-year from 2022 to 2023. A significant chunk of fraud in 2023 – 13.7% &#8211; was specifically document fraud, almost double the proportion in 2022, when it sat at 7.65%.</p>



<p>Within the broader category of identity fraud – the biggest challenge facing our customers – document fraud ranked second to impersonation, comprising 1.04% of all verifications in 2023. In sectors like gaming, where identity fraud reigns supreme, the prevalence of AI-generated document fakes exacerbates the challenge.&nbsp;</p>



<p>What impact does this have in the real world? Let’s take the&nbsp;<a target="_blank" href="https://www.veriff.com/industry/gaming-gambling" rel="noreferrer noopener">gaming</a>&nbsp;sector as an example. Our identity fraud report found that identity fraud was the most prevalent fraud type in this vertical in 2023, with more than 10% of all verification attempts stemming from this danger, including altered or counterfeit document submission attempts. It’s clear that fraud detection is a vital priority.&nbsp;</p>



<h2 class="wp-block-heading">4. AI-generated document fakes</h2>



<p>Unfortunately, the rapid advancements in generative AI technology have opened up new avenues for fraudsters to exploit. We are now seeing a concerning surge in AI-generated identity fraud, where bad actors use these powerful technologies to create highly convincing fake documents and entirely new identities out of thin air.&nbsp;</p>



<p>In our recent blog post on “<a target="_blank" href="https://www.veriff.com/blog/how-the-latest-tech-advances-including-generative-ai-are-driving-an-increase-in-online-fraud" rel="noreferrer noopener">How generative AI is driving an increase in online fraud</a>,” we highlighted the alarming scale of this problem.&nbsp;<a target="_blank" href="https://www.veriff.com/blog/how-the-latest-tech-advances-including-generative-ai-are-driving-an-increase-in-online-fraud" rel="noreferrer noopener">A MwAre study found that 66%</a>&nbsp;of cyberattacks involved&nbsp;<a target="_blank" href="https://www.veriff.com/blog/identity-fraud-the-growing-ai-threat" rel="noreferrer noopener">deepfakes</a>&nbsp;in 2023, and&nbsp;<a target="_blank" href="https://slashnext.com/press-release/slashnexts-2023-state-of-phishing-report-reveals-a-1265-increase-in-phishing-emails-since-the-launch-of-chatgpt-in-november-2022-signaling-a-new-era-of-cybercrime-fueled-by-generative-ai/" rel="noreferrer noopener">SlashNext reported a 1,265%</a>&nbsp;increase in phishing emails since the launch of ChatGPT, as scammers use generative AI to generate highly personalized and believable messages. Criminals are leveraging generative AI to generate synthetic identities, fake IDs, and even deepfake videos to bypass identity verification measures.</p>



<p>Our CEO, Kaarel Kotkas, has recently shared&nbsp;<a target="_blank" href="https://www.linkedin.com/posts/kaarelkotkas_americas-election-chiefs-are-worried-ai-activity-7183863588598505472-3a55?utm_source=share&amp;utm_medium=member_desktop" rel="noreferrer noopener">in his LinkedIn post</a>&nbsp;about how fraudsters are capitalizing on these new AI technologies. He mentioned one such service that allows users to generate fake documents in just a few clicks using generative AI:&nbsp;</p>



<p>&#8220;Today, getting a fake ID on the internet requires a few minutes or impersonating someone else using deepfakes. Those tools have been around for some time, but now being more accessible than ever.”</p>



<p>The rise of generative AI is a double-edged sword &#8211; it has the potential to drive incredible innovation but also enables new and more complex forms of fraud that pose a major challenge for both individuals and organizations.</p>



<p>For more information on the dangers of generative AI and online fraud, check out our previous post&nbsp; “<a target="_blank" href="https://www.veriff.com/blog/identity-fraud-the-growing-ai-threat" rel="noreferrer noopener">Identity fraud: the growing AI threat</a>”.</p>


<div class="space-after-shadow">
    <section class="general-section client-testimonial alignfull   size-default heading-dark text-dark" style="background:#fff no-repeat; text-align: left !important; margin-top: 0px; margin-bottom: 0px; padding: 50px 0 50px;" id="block_2a8191b0097df5a07645bab52f3ab3d6">
                        <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
            <div class="client-testimonial-content">
                <div class="row-detail-content">
                    <figure class="icon-dots-col">
                        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/quote.svg" alt="quote" title="quote">
                    </figure>
                    <div class="content-right-testimonial">
                        <p>Today, getting a fake ID on the internet requires a few minutes or impersonating someone else using deepfakes. Those tools have been around for some time, but now being more accessible than ever.</p>
                    </div>
                </div>
                <div class="row-detail-position">
                    
                    <div class="info-author-col">
                        <p class="author-position-inner mb-0">
                                                            <strong>Kaarel Kotkas</strong>
                                                                                                                    <span></span>
                                                    </p>
                    </div>
                </div>
            </div>
        </div>
    </section>
</div>


<h2 class="wp-block-heading">5. How do we detect document fraud in Veriff?</h2>



<p>Document fraud prevention has always been, and always will be, one of Veriff&#8217;s top priorities. Veriff employs a layered approach to detecting document fraud; these features complement each other, increasing our defense, particularly against generated fake documents.</p>



<p>Customers like Easygo / Stake.us&nbsp; are under constant attack from fraudsters who were also bombarding the website with fake ID documents, slowing down Stake.us’ entire verification system and seriously impacting the customer experience of bone fide customers. However, partnering with Veriff put a cap on the document fraud issue. It immediately cleared its backlog and offered near-real-time validation from that point forward.&nbsp;</p>



<p>Our proprietary specimen database plays a key role in ensuring the accuracy of document fraud prevention. It contains more than&nbsp;<a target="_blank" href="https://www.veriff.com/product/identity-verification" rel="noreferrer noopener">12,000 identity</a>&nbsp;and government document specimens from over&nbsp;<a target="_blank" href="https://www.veriff.com/product/identity-verification" rel="noreferrer noopener">230 countries</a>&nbsp;and territories. With our comprehensive document database, we possess a clear understanding of the standard appearance of documents. By meticulously cataloging their attributes, we streamline the process of identifying any deviations or suspicious elements, enabling efficient detection of anomalies. The database is updated daily as we carry out extensive document-related research (i.e., we find official specimens, information related to the issuing terms, etc) and cooperate with government authorities across the world.</p>



<p>In addition to our specimen database, we employ a variety of checks to validate the legitimacy of documents. This includes leveraging machine learning algorithms to analyze document features and detect anomalies or signs of manipulation in:</p>



<ul class="wp-block-list">
<li>Document material integrity</li>



<li>Portrait photo&nbsp;</li>



<li>Data cross-referencing&nbsp;</li>



<li>Format validation</li>



<li>Data dependencies&nbsp;</li>



<li>Document font&nbsp;</li>
</ul>



<p>Learn more about our core AI-powered checks as part of our&nbsp;<a target="_blank" href="https://www.veriff.com/product/fraud-protect" rel="noreferrer noopener">Fraud Protect</a>&nbsp;fraud mitigation package.&nbsp;</p>



<p>Additionally, Veriff’s fraud prevention engine plays a crucial role in document fraud detection and prevention. The key elements to stopping repeat offenders are device and network fingerprinting that is used in CrossLinks. CrossLinks enables Veriff to group sessions that share similar data points and analyze them together instead of viewing them as standalone attempts. For example, sessions submitted by the same person, on the same network, with the same device, and/or using the same document. All the insight and intelligence that gets generated through the existing features is shared via API&nbsp; as part of our&nbsp;<a target="_blank" href="https://www.veriff.com/product/fraud-intelligence" rel="noreferrer noopener">Fraud Intelligence</a>&nbsp;fraud mitigation package. We also use both manual and machine learning-driven processes to continuously monitor incoming traffic for anomalies. This way, we can identify clusters of traffic that are indicative of organized fraud attempts.&nbsp;</p>



<p>Observing that technology continuously evolves and becomes more widespread, some of the tools previously considered science fiction tools, such as deepfake generators, audio modulators, or document generators, today have become common for enthusiasts and fraudsters. We at Veriff understand that fraud, by nature, is never static. Neither can the techniques and innovation that go toward detecting it, which prompts us to do continuous research on emerging fraud trends, working along with our internal teams as well as our customers to track, identify, and stop various known fraud vectors as well as focusing on problems that we might be facing in the future.</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_e8af41f20ce7afaebf88abca6b8546f1">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Ready to watch?</h3>        <p>Hear David and Maarten explain in more detail about what can be done to effectively counter AI-powered identity fraud.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/blog/identity-fraud-the-growing-ai-threat">
						<span class="btn-text">Watch now							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/document-fraud-tampering-2024">Unveiling the threat: A deep dive into document fraud [2024]</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Unveiling the power of fraud detection software: Safeguard your business in the digital era</title>
		<link>https://www.veriff.com/fraud/business/the-power-of-fraud-detection-software</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Wed, 10 Apr 2024 12:46:00 +0000</pubDate>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=fraud-article&#038;p=2104</guid>

					<description><![CDATA[<p>In today’s digital landscape, it has never been more important to secure your business against fraud. Criminals are increasingly sophisticated, evolving their tactics and honing their techniques. According to Europol Spotlight Report, online fraud schemes pose a significant criminal threat within the EU and globally, as online fraudsters generate billions in illegal profits annually, causing</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/the-power-of-fraud-detection-software">Unveiling the power of fraud detection software: Safeguard your business in the digital era</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In today’s digital landscape, it has never been more important to secure your business against fraud. Criminals are increasingly sophisticated, evolving their tactics and honing their techniques. According to Europol Spotlight Report, online fraud schemes pose a significant criminal threat within the EU and globally, as online fraudsters generate billions in illegal profits annually, causing harm to individuals, businesses, and public entities.</p>



<p>However,. with advanced technologies like identity verification software (IDV), you can stay ahead of the fraudsters.&nbsp;</p>



<p>The growing danger is clear to see. Veriff’s&nbsp;<a target="_blank" href="https://www.veriff.com/resources/ebooks/fraud-report-2024" rel="noreferrer noopener">Identity Fraud Report 2024</a>&nbsp;found a 20% rise in overall fraud year-on-year from the previous report in 2023. Of the verification attempts we processed over the course of 2023, a worrying 6% were fraudulent.</p>



<p>So, how can you build your defenses against online criminals? Fraud detection software in IDV and beyond provides a crucial advantage.&nbsp;&nbsp;</p>



<h2 class="wp-block-heading">1. The threat from modern fraudsters</h2>



<p>Fraud detection tools are vital for&nbsp;<a target="_blank" href="https://www.veriff.com/blog/identity-fraud-prevention" rel="noreferrer noopener">stopping fraudulent activity f</a>rom taking place. But how could such fraudsters target your business and its customers?&nbsp;</p>



<p>There are numerous approaches fraudsters use to gain access to your business using false or manipulated details or pretending to be a genuine customer, which could include:</p>



<ul class="wp-block-list">
<li>Stealing or manipulating someone’s genuine identity</li>



<li>Producing fake ID cards</li>



<li>Obtaining documents like a passport or a driving license in someone else’s name</li>



<li>Deceiving a genuine user into performing an IDV session</li>



<li>Conducting ‘man-in-the-middle’ attacks, perhaps through criminal efforts like tech support scams</li>



<li>Take over someone’s account using their password</li>



<li>Use phishing or smishing messages</li>
</ul>



<h2 class="wp-block-heading">2. Fighting back: fraud detection software&nbsp;</h2>



<p>To protect your business against such activity, fraud detection software is key, fortifying your business and protecting your customers. Cutting-edge solutions can thwart criminals, preventing them from infiltrating your business and assets.&nbsp;</p>



<p>What’s more, such tools can help build your reputation for security, instilling confidence in your business and helping to fuel future growth.&nbsp;</p>



<p>So how does it work? Let’s look at IDV, a vital form of fraud detection software.&nbsp;</p>



<h2 class="wp-block-heading">3. IDV and onboarding</h2>



<p>As the name suggests, IDV software is used&nbsp;<a target="_blank" href="https://www.veriff.com/product/id-verification" rel="noreferrer noopener">to&nbsp;check and confirm a person’s identity</a>. In doing so, it can detect fakes and documents that have been tampered with.&nbsp;</p>



<p>How does this work in practice? To verify the identity documents of real people, Veriff’s IDV solution asks the user to take a picture of their identity document. The solution automatically detects whether it’s a driver’s license, passport, residence permit, or standard ID. It assists the user through the process, making the experience seamless. The user’s ID is then verified, and their selfie is checked against the portraitprotrait image from the identity document for likeness and liveness.&nbsp;<br>This&nbsp;<a target="_blank" href="https://www.veriff.com/product/identity-verification" rel="noreferrer noopener">identity verification solution</a>&nbsp;can reach a decision in around six seconds, meaning users enjoy a swift, secure, and minimal friction experience.</p>



<h2 class="wp-block-heading">4. Verifying the identity of returning users</h2>



<p>On top of this, fraud detection tools can also be used to verify the identity of a returning customer. Such fraud prevention tools use&nbsp;facial biometric analysis to validate that a returning user is exactly who they’re claiming to be. In doing so, these tools use a selfie-based&nbsp;<a target="_blank" href="https://www.veriff.com/product/biometric-authentication" rel="noreferrer noopener">biometric authentication</a>&nbsp;that’s far more secure than using a password or one-time passcode.</p>



<h2 class="wp-block-heading">5. Case study: Deel&nbsp;</h2>



<p>Deel is the leading payroll and compliance platform for international businesses. With more than 4,500 organizations using the platform in over 150 countries, it&nbsp;<a target="_blank" href="https://www.veriff.com/case-studies/deel-veriff-partnership-announcement" rel="noreferrer noopener">partnered with Veriff</a>&nbsp;to ensure the highest level of security against fraud.</p>



<p>The partnership adds an extra layer of safety and security to Deel’s online platform, meaning organizations can now quickly, easily, and securely verify the identity of employees or contractors as part of a hassle-free onboarding process. Since Deel processes payments, Veriff also helps it meet know your customer (KYC) requirements, a key element of fraud detection.&nbsp;</p>



<p>“Identity verification is critical, especially when providing a reliable and secure experience for our customers online,” said Dan Westgarth, COO at Deel. “Veriff&#8217;s ongoing commitment to providing the highest quality IDV makes the partnership one we&#8217;re excited for, especially as we continue to offer more robust and complex offerings.”</p>



<h2 class="wp-block-heading">6. Challenges of fraud detection softwares</h2>



<p>There are plenty of fraud detection software options on the market. However, they face a range of challenges. You must ensure your solution is fit for purpose and that real-time anomaly detection is a given, not an optional extra.</p>



<h3 class="wp-block-heading">What are the potential obstacles your software tools must handle?</h3>



<ul class="wp-block-list">
<li>False positives: These occur when genuine user sessions are flagged as fraudulent, leading to unnecessary investigation or rejection of valid sessions. High false positive rates can lead to customer dissatisfaction and increased operational costs</li>



<li>False negatives: Conversely, false negatives occur when fraudulent activities go undetected by the software, allowing fraudsters them to proceed unchecked. This can result in financial losses and reputational damage</li>



<li>User experience: Although essential for safeguarding businesses and their customers, fraud prevention measures frequently result in a less-than-optimal customer experience. While strong controls can effectively stop fraudulent activities, they can also create difficulties for legitimate users who are trying to access services or platforms. Achieving the appropriate equilibrium between preventing fraud and ensuring a positive customer journey remains a persistent challenge for numerous enterprises. </li>



<li>Complexity: Fraudsters continually evolve their tactics, making fraud patterns increasingly complex and difficult to detect. Fraud detection software may struggle to keep pace with these changes, leading to gaps in detection capabilities</li>



<li>Data quality: The effectiveness of fraud detection software relies heavily on the quality of the data it analyzes. Incomplete, inaccurate, or outdated data can lead to erroneous conclusions and missed fraud signals</li>



<li>Overreliance on rules: Many fraud detection systems operate based on predefined rules or thresholds. While this approach can be effective in capturing known fraud patterns, it may struggle to detect novel or sophisticated fraud schemes that don’t fit within the rules</li>



<li>Adversarial attacks: Fraudsters may actively seek to circumvent detection systems by studying their algorithms and exploiting their weaknesses. This can lead to adversarial attacks designed to evade detection, undermining the effectiveness of the software</li>



<li>Privacy concerns: Fraud detection software often requires access to sensitive  data related to the user, thier device, the nework they are using, etc. to effectively identify fraudulent activities. However, collecting and analyzing such data can raise privacy concerns</li>
</ul>



<h2 class="wp-block-heading">7. Key considerations for a fraud detection platform</h2>



<p>With the right fraud detection software, you can address these challenges and detect suspicious activity in a secure and seamless manner. The right solution should be adaptable, advanced, and built to respect user privacy while ensuring their security.&nbsp;</p>



<p>So, what exactly should it look like?&nbsp;</p>



<ul class="wp-block-list">
<li>The ideal IDV solution should have  built-in fraud detection capabilities  prioritizing security. However, it shouldn’t sacrifice speed, ease of use, and accuracy.</li>



<li>It’s vital to build security in the long term by sharing insights throughout the organization. For example, Veriff’s <a href="https://www.veriff.com/product/fraud-intelligence" target="_blank" rel="noreferrer noopener">Fraud Intelligence platform</a> produces risk insights and intelligence to help inform your decisions, offering risk scoring tools to enhance protection  </li>



<li>Solutions that automate identity verification processes, provide real-time feedback, and maintain high accuracy rates are instrumental in ensuring seamless user experiences and robust security measures.</li>



<li>Solution should involve partnering with a vendor with in-depth knowledge in fraud mitigation,  a comprehensive understanding of global identity documents, and a commitment to continuously enhancing their fraud detection capabilities to proactively address evolving fraud trends and accurately identify and flag suspicious activities.</li>
</ul>



<h2 class="wp-block-heading">8. Empower your fraud prevention efforts</h2>



<p>Arm your business with the right fraud detection platform to combat evolving threats and safeguard your assets. Schedule a consultation with Veriff today to explore how our advanced fraud detection solutions help businesses keep up with the ever-changing threat.</p>



<p>Download our&nbsp;<a target="_blank" href="https://www.veriff.com/resources/ebooks/fraud-report-2024" rel="noreferrer noopener">Identity Fraud Report 2024</a>&nbsp;now to access comprehensive insights and equip your business with the tools needed to combat fraud effectively.</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/the-power-of-fraud-detection-software">Unveiling the power of fraud detection software: Safeguard your business in the digital era</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Fraud Happens Online: How Fraudsters Can Damage Your Business</title>
		<link>https://www.veriff.com/fraud/business/fraudsters-affect-business</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Fri, 18 Aug 2023 12:13:00 +0000</pubDate>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=fraud-article&#038;p=2083</guid>

					<description><![CDATA[<p>Fraud is stubbornly prevalent and occurs in many forms, both offline and as an internet crime. Criminals often steal and use details from honest customers, such as email addresses, credit card numbers, and other personally identifiable information. Such data can then be used to perpetrate a fraud scheme, such as card fraud for wire transfer</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/fraudsters-affect-business">How Fraud Happens Online: How Fraudsters Can Damage Your Business</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Fraud is stubbornly prevalent and occurs in many forms, both offline and as an internet crime. Criminals often steal and use details from honest customers, such as email addresses, credit card numbers, and other personally identifiable information. Such data can then be used to perpetrate a fraud scheme, such as card fraud for wire transfer or other types of online theft, like making unauthorized purchases online. In many cases, criminals can access vast amounts of personal information, allowing them to commit large-scale fraud.</p>



<p>Indeed, almost since the birth of the internet, criminals have been using the anonymity of the online environment to commit fraud. The following are just a few significant examples that severely damaged the affected businesses.&nbsp;</p>



<h3 class="wp-block-heading">Facebook and Google fall for $100m fake invoice scam</h3>



<p>Business email compromise (BEC) is an issue for firms of all sizes, with even the biggest names vulnerable to becoming the victims of a well-crafted scam – and the methods don’t necessarily have to be technologically sophisticated.&nbsp;</p>



<p>Between 2013 and 2015, Facebook and Google were duped out of over US$120m by a Lithuanian man who sent a series of fake invoices to the two tech giants. Having noticed that both organizations used the Taiwanese infrastructure supplier Quanta Computer, Evaldas Rimasauskas registered a company in Latvia with the same name.&nbsp;</p>



<p>Over the next two years, he sent a series of phishing emails to Facebook and Google employees containing forged multi-million-dollar invoices, accompanied by contracts and letters that appeared to have been signed by the company&#8217;s senior executives. He then transferred funds paid to bank accounts in the fake company&#8217;s name to further accounts in Latvia, Cyprus, Slovakia, Lithuania, Hungary, and Hong Kong.</p>



<p>The scam was eventually discovered, and following legal action, Rimasauskas was sentenced to five years in prison. However, only around half of the stolen funds were recovered.&nbsp;</p>



<h3 class="wp-block-heading">Sony hack is not a pretty picture&nbsp;&nbsp;</h3>



<p>Often, the reputational and operational cost of online fraud on a company can be just as severe as any direct financial loss.&nbsp;</p>



<p>When in 2014 Sony Pictures suffered a huge data breach, the attack was tracked back to a series of phishing emails sent to top Sony executives months earlier. These were seemingly made to look like requests relating to Apple IDs and directed the executives to a bogus site that captured&nbsp;<a target="_blank" href="https://www.politico.com/story/2015/04/sony-hackers-fake-emails-117200" rel="noreferrer noopener">their login credentials</a>. This information was then used to access 100 terabytes of sensitive data, including details about employees and their families, private correspondence, and information regarding then-unreleased films. At the same time, the attackers erased Sony Picture’s IT infrastructure and posted yet-to-be-released films online.</p>



<p>Experts estimated the overall cost to the company at up to US$100m. This included the cost of lost productivity, internal investigations, replacing or repairing computers, steps required to prevent future attacks and the loss of trade secrets, as well as the impact on parent company Sony’s reputation, for a perceived failure to safeguard information.&nbsp;</p>



<h3 class="wp-block-heading">Deepfake vishing lands a huge catch</h3>



<p>One of the most alarming recent trends is the deployment of AI by hackers, including the use of ‘deepfake’ voice technology.</p>



<p>The first significant case came in March 2019, when an executive at a UK-based energy firm was duped into believing he was speaking on the phone to the&nbsp;<a target="_blank" href="https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402" rel="noreferrer noopener">CEO of the firm’s parent company</a>.&nbsp; In response to his fake boss’s urgent request, he transferred US$243,000 to a fraudulent account.</p>



<p>That may seem like a lot of money, but it pales into insignificance next to the figure stolen in a ‘virtual bank heist’ in&nbsp;<a target="_blank" href="https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/" rel="noreferrer noopener">Hong Kong in early 2020</a>. On that occasion, a bank manager received a call from the director of a company he’d spoken to before – or so he thought. The voice told him the company was about to make an acquisition – a claim supported by emails in the manager’s inbox from both the director himself and a lawyer apparently hired to oversee the transaction. As a result, the bank manager authorized transfers to the tune of US$35m. Unfortunately, the call was part of an elaborate plot involving at least 17 individuals, as part of which “deep voice” technology had been used to clone the director’s speech.</p>



<h3 class="wp-block-heading">Keeping one step ahead of the fraudsters</h3>



<p>What all these examples have in common is the use of deception and false identities to trick businesses into allowing bad actors to gain access to sensitive information, like the social security number. With more and more sensitive information accessible via the internet, being sure somebody is who they say they are online is more critical than ever.&nbsp;</p>



<p>Our own data shows that nearly 1 in 10 of the identity checks we carried out between January and October 2022 identified fraudulent activity – of which more than half involved identity fraud. Relying on legacy approaches leaves the door wide open to bad actors –&nbsp;passwords are far too vulnerable to data breaches, while two-factor authentication is too susceptible to device compromise. And with the use of deep fake technology on the rise, even conventional identity verification technology isn’t completely infallible.</p>



<p>Veriff is leading the fight against friendly fraud occur and identity theft, credit card fraud, using stolen credit card information or stolen social security information, and other others of online fraud. We tackle fraud from multiple angles to ensure that fraudsters are caught both in the moment and in recurring attacks and organized fraud rings. As well as examining device, network, face and document information for individual sessions, we use crosslinking to compare this information across thousands of sessions and pick out bad actors through patterns of behavior even when their actions are superficially legitimate. That means we can stop online scamming in its tracks.</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_41970537d0dcc33a146dd42c0b7a785e">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Get more details</h3>        <p>To find out more about how Veriff’s fraud prevention solutions can help you address the threat to your business from bad actors, visit our Fraud Education Center.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/fraud">
						<span class="btn-text">Learn more							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/fraudsters-affect-business">How Fraud Happens Online: How Fraudsters Can Damage Your Business</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Evolving Threat: 10 Key Online Frauds Shaping the Digital Landscape</title>
		<link>https://www.veriff.com/fraud/business/online-fraud</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Tue, 15 Aug 2023 12:30:00 +0000</pubDate>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=fraud-article&#038;p=2097</guid>

					<description><![CDATA[<p>In today&#8217;s digital world, it is vital for customers to protect their personally identifiable information and for businesses to prioritize user safety. Indeed, the increase in internet crime, including the use of data breaches (f.e. phishing emails) to obtain personal information such as credit card numbers and email addresses, has severely hampered trust in the</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/online-fraud">The Evolving Threat: 10 Key Online Frauds Shaping the Digital Landscape</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In today&#8217;s digital world, it is vital for customers to protect their personally identifiable information and for businesses to prioritize user safety. Indeed, the increase in internet crime, including the use of data breaches (f.e. phishing emails) to obtain personal information such as credit card numbers and email addresses, has severely hampered trust in the digital world. Card fraud is a growing problem, with bad actors using stolen credit card information to obtain goods and services illegitimately. Since 2000, the crime complaint center<a href="https://www.ic3.gov/" target="_blank" rel="noopener">&nbsp;IC3 in the United States</a>&nbsp;has received complaints crossing the spectrum of cyber crime matters, including online fraud in its many forms including Intellectual Property Rights (IPR) matters, Computer Intrusions (hacking), Economic Espionage (Theft of Trade Secrets), Online Extortion, International Money Laundering, Identity Theft, and a growing list of Internet-facilitated crimes.</p>



<p>For better perspective on the growing trends in internet fraud, we spoke to Veriff’s Senior Director of Fraud Prevention and Experience, David Divitt. Divitt offered insight into the rise of ‘AI warfare’ between bad actors and businesses to the collapse of the online user experience; read on to find out more.</p>



<h3 class="wp-block-heading">Faster services mean faster fraud</h3>



<p>“One benefit of digitization is speed &#8211; speed to market, speed of services. You can now get your identity validated for a new product in seconds. But faster services mean faster fraud –&nbsp;these things just go hand in hand. So, while faster services are hugely beneficial for society and enable us to do so many more things, they also enable bad actors to commit fraud very, very quickly.”</p>



<h3 class="wp-block-heading">Prevention is about changing the ROI for the fraudster</h3>



<p>“At the end of the day, what you&#8217;re really aiming to do is to put more roadblocks in place for bad actors. Basically, change the ROI for the fraudster, that&#8217;s the name of the game. Unfortunately, it&#8217;s close to impossible to completely stop fraud. But you can make it much less attractive so that fraudsters go elsewhere.”</p>



<h3 class="wp-block-heading">It’s best to stop fraud before it can get started</h3>



<p>“In a digital world, once money is stolen, it can be laundered very efficiently. Once that’s happened, it’s extremely difficult to get it back. So, the best approach is to stop the issue before it can even get started. If fraudsters can’t set up fraudulent accounts, they can’t use them to commit fraud. With effective verification you&#8217;re addressing the issue at its root, before it can become a bigger problem.”</p>



<h3 class="wp-block-heading">Humans are the weakest link in the chain</h3>



<p>“Because technology has done such a good job at stopping a lot of fraud, unfortunately fraudsters are now directly targeting the humans involved. The locks on the door are very good, so you get the person who owns the actual key to open the door for you. That’s perhaps the most concerning trend that we&#8217;ve seen across financial crime and non-financial crime. People need to be more aware that they are the targets.”</p>



<h3 class="wp-block-heading">The collapsed user experience is a major issue for legacy authentication methods</h3>



<p>“Two-factor authentication, which typically uses a one-time passcode (OTP) sent by text to your mobile, is going to become less and less effective. That’s simply because the intended separation between the two factors often isn’t there anymore – quite often we do things like buying online directly via our phones, so if your device has been compromised, two-factor authentication won’t protect you.”</p>



<h3 class="wp-block-heading">‘AI warfare’ is increasingly a feature of online fraud</h3>



<p>“Machine learning is a powerful tool for fraud prevention, but fraudsters also use this technology. There&#8217;s a lot of evidence of bad actors training combative machine learning models using live customers or active fraud detection models. So, you start to get into a kind of AI warfare between the two sides, which is why it&#8217;s so important to continue to invest and develop your solution to stay on top of it.”</p>



<h3 class="wp-block-heading">Fraud can be double trouble for businesses</h3>



<p>“For smaller businesses, paying a large invoice to a fraudster can lead to bankruptcy pretty quickly because not only have you lost that money, but you also still have to settle your invoice with the real supplier. So, cash flow right away becomes an issue. Even for larger businesses, if you get hit by fraud, and it doesn&#8217;t look like you&#8217;ve done everything you can to prevent it, that can have a very bad reputational impact. Not to mention potential fines for legal breaches around money laundering, terrorist financing, human trafficking, and so on.”</p>



<h3 class="wp-block-heading">The benefits of biometrics</h3>



<p>“With effective biometric technology, the collapse of the multi-factor environment becomes less of an issue. It doesn&#8217;t matter if a fraudster can intercept a one-time passcode if they can’t prove that the real account holder is physically present in real-time. So, it starts to create a separation of the two factors again. Alongside that, you can have things like a digital ID with biometric security wrapped around it to control access, which creates much stronger security than a simple check of a paper ID.”</p>



<h3 class="wp-block-heading">The need to swing the pendulum</h3>



<p>“There’s what I call an eternal pendulum, which represents the compromise between customer experience and risk prevention. As your business changes, as the fraud landscape changes, and as the customer landscape changes, you&#8217;ll want to be able to swing that pendulum back and forth. You can do a lot that’s invisible to your customers by collecting data on how they interact with your services and using this to tune your tools and strategies. But sometimes the friction has to be there.”</p>



<h3 class="wp-block-heading">A good fraud experience is a powerful thing</h3>



<p>“As a consumer it’s surprisingly easy to be scammed and make a mistake that could prove very costly. So, if a business you&#8217;re dealing with believes someone might be trying to take advantage of you and they put a pause on things while they clarify the situation, as long as they contact you to let you know, you’re likely to feel they have your back. Businesses that do that well reap the benefits in terms of positive customer relationships.”</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_340c339aa45699f9b0bd840a40ebc9e1">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Get more details</h3>        <p>To find out more about how Veriff’s fraud prevention solutions can help you address the threat to your business from bad actors, visit our Fraud Education Center.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/fraud">
						<span class="btn-text">Learn more							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/online-fraud">The Evolving Threat: 10 Key Online Frauds Shaping the Digital Landscape</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Business Scams Unveiled: A Comprehensive Insight into Fraudulent Tactics</title>
		<link>https://www.veriff.com/fraud/business/business-scams-fraud</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Wed, 26 Jul 2023 12:05:00 +0000</pubDate>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Finserv]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=fraud-article&#038;p=2072</guid>

					<description><![CDATA[<p>Fraud is a growing internet crime in today&#8217;s increasingly digitized world. It can take many forms. The most common scams are email phishing scams, card fraud for sending money and deepfaking. Fraudsters use various techniques to target government agencies or unsuspecting individuals, often collecting personal information such as email addresses, credit card numbers, and other</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/business-scams-fraud">Business Scams Unveiled: A Comprehensive Insight into Fraudulent Tactics</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Fraud is a growing internet crime in today&#8217;s increasingly digitized world. It can take many forms. The most common scams are email phishing scams, card fraud for sending money and deepfaking. Fraudsters use various techniques to target government agencies or unsuspecting individuals, often collecting personal information such as email addresses, credit card numbers, and other personally identifiable information.&nbsp;</p>



<p>Fraud schemes can be complex and involve multiple steps, taking advantage of anonymity and tax security practices. In some cases, the fraudster may even sell honest customers’ personal information to other bad actors, who can then use it to commit further crimes. It’s not only honest customers at risk, but also the business owners. Legitimate companies are liable to severe financial, legal, and reputational harm if bad actors can illegitimately target big as well as small businesses’ services, submitting fake invoices for wire transfers, sending genuine-looking checks &amp; forcing businesses to optimize their anti-fraud strategies.</p>



<p>However, fraudsters are always innovating to stay one step ahead, from adopting new behaviors like identity farming to embracing technological advances like deepfake video. As a business, it’s important to keep up to date with the latest fraud trends, but also to understand where they fit in established patterns of criminal behavior that change little over time.&nbsp;</p>



<h2 class="wp-block-heading">Scams Targeting Businesses</h2>



<p>Business fraud can essentially be categorized into four key types: identity fraud, document fraud, technical fraud and recurring fraud.</p>



<h3 class="wp-block-heading">Identity fraud (Identity theft)</h3>



<p>Attempting to appropriate other people’s identities to bypass security measures is easily the most common form of fraud online, making up over half of all fraudulent activity. The most direct form is impersonation, whereby a fraudster uses somebody else’s likeness, bank accounts, phone numbers or identity documents as if they were their own.</p>



<p>Identity fraud can also take the form of third-party intervention, where a fraudster forces, coerces or dupes someone else to gain access to services on their behalf and demand payment. As identity verification (IDV) technology becomes more sophisticated, third-party techniques involving social engineering (using deception to manipulate individuals into divulging confidential information) are becoming popular again.</p>



<h3 class="wp-block-heading">Document fraud (Synthetic fraud)</h3>



<p>As the name suggests, document fraud is the act of altering the information on government-issued IDs or creating fake documents with the aim of defrauding the verification process. Also known as synthetic fraud, this can include the erasure, alteration or substitution of data on the document.</p>



<p>For obvious reasons, synthetic fraud tends to be more prevalent using documents that are less sophisticated in terms of their own security measures and/or from countries where stolen or “borrowed” documents are easier to come by. For example, Veriff’s decline rate for verification sessions using the Philippines national passport is 65.22%, of which 40% are refused due to physical tampering with the document.&nbsp;</p>



<h3 class="wp-block-heading">Technical fraud (Scamming)</h3>



<p>Technical fraud involves common scams such as attempting to bypass a set verification process &#8211; submitting streamed videos for a supposedly live verification session, or fraudulently accessing sessions that were meant for a separate individual.&nbsp;For instance, gift card scamming is becoming increasingly common phenomenon.</p>



<p>With the rise of AI, the use of deepfakes to overcome security based on facial verification and voice biometrics is an emerging trend in technical fraud and avoiding scams is becoming increasingly difficult.&nbsp;</p>



<h3 class="wp-block-heading">Recurring fraud (Pattern fraud)</h3>



<p>Once bad actors find a vulnerability that enables them to circumvent security measures, they will tend to replicate it as many times as possible. Often attacks will occur against the same target but involve different real users or a series of synthetic identities. On other occasions the same user will try to get approval multiple times using different documents.</p>



<p>As online security measures become more effective, recurring fraud is being exploited by bad actors as a way to maximize their potential gains from any discovered vulnerability. In fact, recurring fraud increased by almost&nbsp;<a href="https://discover.veriff.com/identity-fraud-report-2023" target="_blank" rel="noopener">47% year on year between 2021 and 2022</a>. However, by crosslinking the data obtained from verification sessions it becomes possible to identify patterns and carry out further investigation to isolate this type of fraudulent behavior.</p>



<h2 class="wp-block-heading">The latest trends</h2>



<p>Fraudsters are constantly finding new ways to surface these four main fraud strategies. The following are just a few examples of recent trends we’ve seen.&nbsp;</p>



<p><strong>Deepfake phishing</strong>: The first phishing attacks date back to the commercialization of email in the 1990s, but the potential to create deepfakes using AI threatens to take the technique to a whole new level. Voice impersonation has already been used in highly successful attacks, and it’s likely to be only a matter of time before streaming deepfake video can be used in a similar way.</p>



<p><strong>Identity farming</strong>: The tactic of creating one or more fake identities using stolen personal information is becoming increasingly popular and now makes up 9% of all online fraud. Fraudsters from developed countries are often connecting with criminals in poorer locations to obtain stolen or “borrowed” identity documents, or to get them to verify themselves for services for illicit purposes.&nbsp;</p>



<p><strong>Fake job ads:&nbsp;</strong>Scammers place a fake job ad on social media claiming to represent a company. Using information from the CVs supplied, the fraudsters then open accounts on the applicant’s behalf. When identity verification is required, fraudsters send magic links to the victim’s email as part of the ‘hiring process’ to try to dupe them into completing the verification process on their behalf.</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 50px;" id="block_79a5b5cf7f7d2996b4fb4df95a3ce857">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Get more details</h3>        <p>To find out more about how Veriff’s fraud prevention solutions can help you address the threat to your business from bad actors, visit our Fraud Education Center.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/fraud">
						<span class="btn-text">Learn more							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>



<p><a href="https://www.veriff.com/fraud/business/marketplaces-struggling-fraud-protection-customer-experience"></a></p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/business-scams-fraud">Business Scams Unveiled: A Comprehensive Insight into Fraudulent Tactics</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is your marketplace facing challenges balancing marketplace fraud protection and customer experience?</title>
		<link>https://www.veriff.com/fraud/business/marketplaces-struggling-fraud-protection-customer-experience</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Thu, 30 Mar 2023 12:18:00 +0000</pubDate>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Identity Verification]]></category>
		<category><![CDATA[Marketplaces]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=fraud-article&#038;p=2086</guid>

					<description><![CDATA[<p>The Veriff Identity Fraud Report, reveals a 17.9% uptick in fraudulent online activity across all sectors of the economy during the past year, with marketplaces one of the biggest hits within the ecommerce sector. This surge in fraud equates to nearly one-in-ten verification requests seen by Veriff now being fraudulent. The Veriff Identity Fraud Report</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/marketplaces-struggling-fraud-protection-customer-experience">Is your marketplace facing challenges balancing marketplace fraud protection and customer experience?</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Veriff Identity Fraud Report, reveals a 17.9% uptick in fraudulent online activity across all sectors of the economy during the past year, with marketplaces one of the biggest hits within the ecommerce sector. This surge in fraud equates to nearly one-in-ten verification requests seen by Veriff now being fraudulent.</p>



<p>The Veriff Identity Fraud Report 2023 also reveals that:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Document fraud is a massive problem</strong>, growing by 79% during 2022.&nbsp;</li>



<li><strong>Organized crime groups are ramping up activity</strong>&nbsp;with a 49% increase in so-called recurring and pattern fraud across all sectors</li>



<li><strong>Marketplace attacks are now being launched on an industrial scale</strong>. The report reveals that 9% of all identity fraud now involves mass-produced fake identities – a process known as identity pharming.&nbsp;</li>
</ul>



<p>So, what steps should marketplaces take to protect their platforms and customers?&nbsp;</p>



<h2 class="wp-block-heading">Walking the identity verification tightrope</h2>



<p>In theory, online marketplaces can enable marketplace fraud protection &#8211; lockdown their platforms, introducing passwords, knowledge-based security questions and multi-factor authentication at every step of the buyer and seller journey, making fraud virtually impossible. This approach, however, would deal a severe blow to user experience, making day-to-day marketplace interactions slow and stressful, and customer onboarding tortuous, increasing churn and drop-off.</p>



<p>Instead, marketplaces need to walk a tightrope, finding the perfect balance between effectively addressing the rising tide of identity theft and fraud, while also delivering the slick and intuitive customer experiences that marketplace users have grown accustomed to.&nbsp;</p>



<p>Marketplaces that can successfully walk this verification tightrope have a golden opportunity to excel at a time when marketplaces are set to become the world’s biggest ecommerce channel by 2027. To do this they need a verification solution that works with, rather than against, existing infrastructure, while also introducing a fundamental step-change in security.</p>



<h2 class="wp-block-heading">Seamless and sensitive anti-fraud measures</h2>



<p><strong>Seamless and sensitive anti-fraud measures</strong></p>



<p>A solution known as identity verification (IDV) is now at the vanguard of this effort to verify customers in a seamless and sensitive way. This far-more secure approach involves the customer taking photos of government-issued identity documents (ie driver’s license and passport) and then taking a selfie of themselves in real time. Market-leading IDV solutions can complete this verification process in just six seconds.</p>



<p>IDV involves no laborious form-filling by the customer, no manual processing by the marketplace and no long wait times for either party. Customers are also spared the fuss and frustration of being locked out of their accounts because they’ve forgotten their mother’s maiden name or their favorite food.</p>



<p>Market-leading IDV solutions are already achieving game-changing improvements for firms in a wide range of sectors, from finance to ecommerce. Forrester recently&nbsp;<a href="https://www.veriff.com/events?_post_type=webinar">analyzed the performance of Veriff’s IDV solution</a>, and found that a company partnering with Veriff:</p>



<ul class="wp-block-list">
<li>Reduced revenue lost to fraud by 20%, saving the company $7.4 million over three years.&nbsp;</li>



<li>Enjoyed customer experience benefits valued at $18.4 million by Forrester over three years, and a total return on investment of 195%.</li>



<li>Could save $11 million over three years, thanks to efficiencies linked to automation.</li>
</ul>



<div class="wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex">
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Fast decisions</h4>



<p>A 98% check automation rate gets customers through in about 6 seconds.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Simple experience</h4>



<p>Real-time end user feedback and fewer steps gets 95% of users through on the first try.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Document coverage</h4>



<p>An unmatched 12K+, and growing, government-issued IDs are covered.</p>
</div>
</div>
</div>



<div class="wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex">
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">More conversions</h4>



<p>Up to 30% more customer conversions with superior accuracy and user experience.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Better fraud detection</h4>



<p>Veriff’s data-driven fraud detection is consistent, auditable, and reliably detects fraudulent forms of identification.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Scalability embedded</h4>



<p>Veriff’s POA can grow with your company’s needs and keep up with times of increased user demand.</p>
</div>
</div>
</div>



<h2 class="wp-block-heading">Don’t let fraud stifle growth and innovation</h2>



<p>It is clear that online marketplaces face rapidly deteriorating levels of identity theft and fraud, which threaten to curtail innovation and growth among the poorly prepared. Meanwhile, customers expect speed, convenience, and peace of mind, while assuming that marketplaces will protect them from fraudsters. At the very least, if marketplace users’ expectations are not fulfilled, they will vote with their feet and do business elsewhere.&nbsp;</p>



<p>Marketplace fraud often takes the form of fraudsters trying to extract personal information or payment methods from victims. This can take the form of stealing credit cards, impersonating seller accounts through a fake email address and asking for financial information. Fraudsters also sometimes ask for gift cards. And, as well as fake email addresses, fraudsters will use Google voice, fake phone numbers and text messages to extract information. The advice to consumers is that if you receive notification of an offer that seems too good to be true &#8211; then it probably is. But online marketplaces can also do more to enhance fraud prevention.</p>



<p>All types of marketplaces that harness solutions such as IDV to significantly reduce fraud, transform onboarding and elevate customer experience in general, will enjoy a significant competitive advantage.&nbsp;</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_70def886e62d4cfb6fc32557ca9b2303">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Get more details</h3>        <p>Discover more about how IDV is powering business growth and customer acquisition.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/product/identity-verification">
						<span class="btn-text">Learn more							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/marketplaces-struggling-fraud-protection-customer-experience">Is your marketplace facing challenges balancing marketplace fraud protection and customer experience?</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Neobanks Don’t Need to Sacrifice UX to Fight Fraud and Stay Compliant</title>
		<link>https://www.veriff.com/fraud/business/neobanks-why-ux-matters-to-win-new-customers</link>
		
		<dc:creator><![CDATA[agustina.bustinduy@veriff.net]]></dc:creator>
		<pubDate>Wed, 04 Jan 2023 12:23:00 +0000</pubDate>
				<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Finserv]]></category>
		<category><![CDATA[KYC]]></category>
		<guid isPermaLink="false">https://www.veriff.com/?post_type=fraud-article&#038;p=2092</guid>

					<description><![CDATA[<p>Traditional banks have received criticism for an outdated approach to user experiences, from setting up bank check-in and savings accounts using Knowledge-Based Authentication (KBA) to visiting a physical branch to access a range of banking services. In an increasingly competitive financial product services market, customer acquisition remains a key priority, creating an opportunity for challenger</p>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/neobanks-why-ux-matters-to-win-new-customers">Why Neobanks Don’t Need to Sacrifice UX to Fight Fraud and Stay Compliant</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Traditional banks have received criticism for an outdated approach to user experiences, from setting up bank check-in and savings accounts using Knowledge-Based Authentication (KBA) to visiting a physical branch to access a range of banking services. In an increasingly competitive financial product services market, customer acquisition remains a key priority, creating an opportunity for challenger banks to grow worldwide. This form of digital banking promises that customers can partner with banks and have a better user experience, from ordering new debit &amp; credit cards in just a few swipes to accessing online banking with bank apps in seconds. However, for neobanks, the desire for good users clashes with the reality of bad actors who look to open fake accounts plus commit acts such as payment fraud and account takeover in bank charters. As such, fighting identity theft in neobanks entails recognizing suspicious activity, prioritizing detection and prevention, and meeting compliance.</p>



<p>Being a 100% virtual entity, neobanks offer key advantages over traditional financial technology and institutions. Removing bricks-and-mortar branches from the equation significantly lowers overheads, making it possible to offer more favorable terms. Meanwhile, freedom from the shackles of legacy infrastructure and established thinking makes it possible to be far more nimble at offering customer-centric experiences. As evidence of this, Capgemini’s&nbsp;<em><a target="_blank" href="https://www.capgemini.com/au-en/news/world-retail-banking-report-2022-incumbent-banks-must-embrace-data-centric-capabilities-to-drive-personalized-customer-experiences/" rel="noreferrer noopener">World Retail Banking Report 2022</a></em>&nbsp;found that 75% of customers surveyed were attracted to FinTech’s fast, cost-effective, and easy-to-use services.</p>



<h3 class="wp-block-heading">Addressing the trust disadvantage</h3>



<p>However, one crucial factor that puts neobanks work at a disadvantage is the trust engendered by face-to-face customer support with customers that their more traditional competitors enjoy. Trust is one of the key pillars of mobile banking, and its ability to drive engagement and increase loyalty directly impacts your bottom line. Previous&nbsp;<a href="https://www.visualcapitalist.com/trust-banking-industry/" target="_blank" rel="noopener">Capgemini research</a>&nbsp;found that trust outranked price for customers’ choice of bank, underlining the importance of the issue. So, without recourse to direct interpersonal relationships, how can you bridge the trust gap?</p>


<div class="space-after-shadow">
    <section class="general-section client-testimonial alignfull   size-default heading-dark text-dark" style="background:#fff no-repeat; text-align: left !important; margin-top: 0px; margin-bottom: 0px; padding: 50px 0 50px;" id="block_05f83a1ca424939b7745d0420b65f92d">
                        <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
            <div class="client-testimonial-content">
                <div class="row-detail-content">
                    <figure class="icon-dots-col">
                        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/quote.svg" alt="quote" title="quote">
                    </figure>
                    <div class="content-right-testimonial">
                        <p>To bridge the trust gap, you need to create the kind of seamless online user experience that makes customers feel as supported as if they had a real person ‘holding their hand’.</p>
                    </div>
                </div>
                <div class="row-detail-position">
                    
                    <div class="info-author-col">
                        <p class="author-position-inner mb-0">
                                                            <strong>Chris Hooper</strong>
                                                                                                                    <span></span>
                                                    </p>
                    </div>
                </div>
            </div>
        </div>
    </section>
</div>


<h3 class="wp-block-heading">User Experience: The key to unlocking brand trust</h3>



<p>As a neobank, your user interface essentially&nbsp;<em>is&nbsp;</em>your brand. That makes effective design a vital tool to help build your relationship with a new client. However, to paraphrase the great Steve Jobs, design isn’t just about look and feel, it’s about how something works.&nbsp;</p>



<p>To bridge the trust gap, you need to create the kind of seamless online user experience that makes customers feel as supported as if they had a real person ‘holding their hand’. This is particularly important during the onboarding process, when prospective customers are getting their first impression of interacting with your brand. A confusing and complicated user flow or a frustrating identity verification process could be enough to turn a potential new customer into a lost opportunity and a negative review.</p>



<div class="wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex">
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Fast decisions</h4>



<p>A 98% check automation rate gets customers through in about 6 seconds.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Simple experience</h4>



<p>Real-time end user feedback and fewer steps gets 95% of users through on the first try.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Document coverage</h4>



<p>An unmatched 12K+, and growing, government-issued IDs are covered.</p>
</div>
</div>
</div>



<div class="wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex">
<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">More conversions</h4>



<p>Up to 30% more customer conversions with superior accuracy and user experience.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Better fraud detection</h4>



<p>Veriff’s data-driven fraud detection is consistent, auditable, and reliably detects fraudulent forms of identification.</p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<h4 class="wp-block-heading">Scalability embedded</h4>



<p>Veriff’s POA can grow with your company’s needs and keep up with times of increased user demand.</p>
</div>
</div>
</div>



<h3 class="wp-block-heading">Better onboarding through technology</h3>



<p>Fortunately, the latest account onboarding systems use sophisticated AI to support customers during the account onboarding process, turning a potential barrier to conversion into a positive engagement tool. For example, Veriff’s Assisted Image Capture technology provides real-time feedback to users that makes sure they get verified on the first try. Verification happens within six seconds on average, moving users through the process quickly and getting them interacting with your products and services.</p>



<p>Veriff also uses a diversified dataset to train facial recognition models so that face comparison accuracy is the same for any ethnicity or document origin. This feature has been invaluable to&nbsp;<a target="_blank" href="https://www.veriff.com/case-studies/nala-veriff-identity-verification-partnership" rel="noreferrer noopener">NALA</a>, a Tanzanian personal finance app focused on addressing the hidden barriers that prevent the African community from accessing traditional financial services and is already used by over 250,000 people.&nbsp;</p>



<p>These and similar innovations can contribute to a seamless onboarding experience that ensures your new clients start their journey with you engaged and receptive to the full range of mobile banking solutions you offer.&nbsp;</p>



<section class="general-section promo-card block-content alignfull   size-default heading-white text-white" style="background:#03282C no-repeat; text-align: left !important; margin-top: 50px; margin-bottom: 50px; padding: 100px 0 100px;" id="block_580ea9c118e798c654a12f3111116e02">
            <figure class="icon-left-top-col">
        <img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/img/img-top-left.png" alt="">
    </figure>
    <div class="container" id="" data-aos-duration="800" data-aos="fade-up">
                <h3>Get more details</h3>        <p>Discover more about how IDV is powering Neobank growth and customer acquisition.</p>
        		<div class="content-buttons buttons-justification-star">
												<a class="btn-site btn-primary btn-mode-dark " target="" href="https://www.veriff.com/industry/neobanks">
						<span class="btn-text">Learn more							<span><img decoding="async" src="https://spcdn.shortpixel.ai/spio/ret_img,q_cdnize,to_webp,s_webp/www.veriff.com/wp-content/themes/veriff/assets/img/buttonarrow.svg" class="button-arrow" alt="" aria-hidden="true"></span>
						</span>
					</a>
									</div>
	    </div>
</section>
<p>The post <a rel="nofollow" href="https://www.veriff.com/fraud/business/neobanks-why-ux-matters-to-win-new-customers">Why Neobanks Don’t Need to Sacrifice UX to Fight Fraud and Stay Compliant</a> appeared first on <a rel="nofollow" href="https://www.veriff.com">Veriff</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
