Comparing Identification vs. Verification vs. Authentication

Identification vs. Authentication vs. Verification: What Each of These Terms Mean

Data breaches, compliance mandates, and identity theft have made it increasingly difficult for organizations and individuals to establish trust online. Yet, for those very same reasons, it’s more important than ever. From the baseline identification of a customer or user to the recurring process of ensuring that the person logging into or using your online […]

Read more...
10 Tips to Convert More Customers During Account Onboarding [Infographic]

10 Tips to Convert More Customers During Account Onboarding [Infographic]

The digital onboarding journey is in need of a serious shake-up. While 72% of consumers want an all-digital onboarding experience, they’re clearly not happy with the current state of affairs — 56% of online bank account applications in the UK were abandoned due to a long or complicated enrollment process. There are a number of […]

Read more...
Unclaimed Property Fraud

Why States’ Unclaimed Property Websites are Becoming a Lucrative Target for Fraud

There are literally billions of dollars — somewhere between $40 billion and $50 billion — of unclaimed property held by states. Each year, unclaimed or abandoned assets are turned over to each state’s Unclaimed Property divisions by financial institutions and businesses that lose contact with the owners of those assets. Each state’s treasury department serves […]

Read more...
What is Regtech?

Regtech: What It Is and What It Means for the Future of Financial Technology

What is regtech? Regulatory Technology is an emerging field that applies new technologies to manage the administration of regulatory requirements, and is considered a subset of fintech (technologies that make financial activities more efficient). Here’s how John Dwyer, senior research analyst at Celent, explains the growth of regtech. “By harnessing technology to improve and optimize […]

Read more...
AI & Automatic ID Recognition

How Jumio Uses AI for Automatic Recognition of ID Documents

Jumio recently announced the beta launch of Jumio Go, a fully automated identity verification solution. Jumio Go combines AI, OCR and certified liveness detection technologies to automatically extract ID document data and validate the user’s digital identity in real time. Jumio Go, along with Jumio’s entire suite of identity verification and authentication solutions, automatically performs […]

Read more...
KYC in Banking: Why Financial Institutions Must Perform Due Diligence

KYC in Banking: Why Financial Institutions Must Perform Due Diligence

The Hudson United Bank of New Jersey was one of the banks used by the airplane hijackers who perpetrated the deadliest attack ever on American soil on Sept. 11, 2001. According to the 9/11 Commission, money-laundering safeguards at the time were not designed to detect or disrupt the type of deposits, withdrawals and wire transfers […]

Read more...
digital identity defined

What is a Digital Identity?

In the real world, proving your identity is pretty straightforward. When you show up in person to open a bank account, rent a car, book a hotel room, gamble at a casino or purchase alcohol, you present your government-issued ID, proof of address or whatever else might be required for the transaction, and the company […]

Read more...
How Jumio’s Investment in AI is Delivering Big Results for Our Customers

How Jumio’s Investment in AI is Delivering Big Results for Our Customers

Today we’re excited to announce some big improvements in our industry-leading identity verification and authentication solutions. Made possible by our multi-year investment in AI, automation and product development, these innovations are onboard now to help you fight fraud and meet your compliance requirements, while converting good customers faster. We invite you to get the complete […]

Read more...
Jumio Go Says No-Go to Deepfakes, Bots and Sophisticated Spoofing Attacks

Jumio Go Says No-Go to Deepfakes, Bots and Sophisticated Spoofing Attacks

Your marketing department comes up with a great campaign. They think through all the wording and craft pithy catchphrases to capture the imagination of your target market. They develop email campaigns, banner ads, social posts and even some direct mail — all with the intent of generating bona fide prospects to your website. These campaigns […]

Read more...
Taking the Sting Out of Data Breaches

Taking the Sting Out of Data Breaches

Recently, you may have heard about a company that experienced a data breach, and because you didn’t patronize this company, you presumably breathed a sigh of relief. But don’t get too comfortable — chances are your data may get compromised in the next breach, or the one after that. When there’s a big data breach, […]

Read more...