White Paper

The Importance of Lifecycle Management to Mitigate Fraud
Enrollments
The Importance of Lifecycle Management to Mitigate Fraud

Organizations have made significant investments to create user experiences that are easier, faster and more connected. But despite their best efforts to assemble a more secure system, fraud — including identity theft, account takeover and application fraud — continues to thrive.

Read More »
U.S. Identity Theft: The Stark Reality
Identity
U.S. Identity Theft: The Stark Reality

GIACT’s new report, U.S. Identity Theft: The Stark Reality, developed by Aite Group and underwritten by GIACT, uncovers the striking pervasiveness of identity fraud perpetrated against U.S. consumers, tracking pandemic-related shifts in banking behaviors.

Read More »
Tax & Identity: 1099s, W-2s, and the Cost of Employee Customer, ID Tracking
Identity
Tax and Identity: 1099s, W-2s, and the Cost of Employee Customer, ID Tracking

This upcoming tax season represents the most challenging to date for those responsible for issuing 1099s, W-2s and other tax documents. With so many Americans having moved during the pandemic – almost 16 million between February and July of 2020 alone, according to the USPS – keeping up-to-date on the whereabouts of your employees and customers will require significant effort.

Read More »
Javelin & GIACT: Identity Fraud in the Digital Age
Identity
Javelin & GIACT: Identity Fraud in the Digital Age

GIACT’s new report, Identity Fraud in the Digital Age, developed by Javelin Strategy & Research, sponsored by GIACT, details the challenges of preventing new and emerging fraud threats and what businesses should consider in their fraud prevention strategies for the year ahead.

Read More »
The Changing Landscape of Identity Fraud: Fraudsters Strike Back
Identity
The Changing Landscape of Identity Fraud: Fraudsters Strike Back

Fraud operators are increasingly using stolen, manipulated, and fabricated identities as the entry point for attacks against both consumers and businesses across the payments ecosystem. These attacks both originate from and target nearly every vertical imaginable ranging from banking, insurance and lending to e-commerce, utilities and telecom.

Read More »
Business Email Compromise (BEC): A Global Threat
Identity
Business Email Compromise (BEC): A Global Threat

Business email compromise, or BEC – defined as a fraud tactic using email to socially engineer an employee to install malware or unwittingly transfer/redirect funds into a fraud operator’s account – is an increasingly sophisticated and elusive fraud tactic. According to the FBI, BEC is a $2 billion a year business.

Read More »