Fraud at Enrollment: The Impact of Application Fraud​

Enrollments
White Paper

Verifying the true identity of a consumer or business is becoming increasingly difficult. Following a decade of high-profile data breaches, real and fictitious identity data is being used daily to open new accounts. In fact, 1 in 6 U.S. consumers claimed to have fallen victim to application fraud last year.

GIACT’s new report, Fraud at Enrollment: The Impact of Application Fraud, explains the prevalence of application fraud, and how to secure online enrollment without unnecessarily impacting user experience.


Topics Covered

  • Application fraud impact points and cases by channel;
  • Why application fraud continues to elude organizations and best practices for addressing application fraud;
  • And how GIACT (a Refinitiv company) helps organizations streamline and secure their enrollment process.

Download the White Paper

 

Refinitiv Introduces Digital Onboarding Solution to Help Businesses Accelerate Secure and Frictionless New Customer Onboarding
Enrollments
Refinitiv Introduces Digital Onboarding Solution to Help Businesses Accelerate Secure and Frictionless New Customer Onboarding

GIACT, a Refinitiv company, today announced that it has added a global consumer and business identity verification solution, gIDENTIFY® Global, to its EPIC Platform. gIDENTIFY Global represents a significant advancement in global identity verification, allowing U.S. organizations to validate non-U.S. persons across 38 countries and businesses across 11 countries, respectively.

Read More »
Consumer Scams Rising in Velocity and Sophistication_Press Release
Identity
34% of U.S. consumers were targeted by scams in 2021, Aite-Novarica Group consumer survey finds

GIACT’s report, Consumer Scams: Rising in Velocity & Sophistication, looks at the methods scammers used to target U.S. consumers, including email, text, phone, and social media. As detailed within the report’s findings, U.S. consumers were solicited through a wide range of mediums using a variety of tactics to social engineer victims into providing payment and / or sensitive payment information.

Read More »