How Veriff keeps your data safe

Header image

Building trust in an unsafe digital world Verifying that an individual is who they say they are in the virtual world is a top priority for many businesses. Veriff is in the privileged position of handling vast amounts of private and personal information every day. This is not something we take lightly. Since trust is

Veriff Fraud Index 2024 – key findings

Header image

The internet has transformed how we shop, consume, and do business, expanding opportunity and fuelling innovation. But the digital economy has a dark side – the growing scourge of online fraud. We surveyed 1,000 individuals across the US and Europe, gathering diverse viewpoints across age groups, nationalities, and genders. The responses expose the reality of

How to prevent multi-accounting in 2024

Header image

1. How to prevent multi-accounting in 2024 “Gnoming” and “Gubbing” are strange terms and sound like activities you would find in a Lord of the Rings film. But behind these funny terms lies a fraudulent online activity called multi-accounting. Multi-accounting is no laughing matter and is estimated to cost the iGaming industry billions yearly. The

Age verification regulations in the EU and the UKIE

Header image

In an increasingly digital world, the protection of minors from harmful content is of paramount concern for governments worldwide. While the extent of the minor’s exposure to inappropriate content remains variable among different countries, the EU Kids Online 2020 reported an average of 33% of children aged 9-16 having seen sexual images. The same study discovered that

From losses to lessons: Assessing the full spectrum of the cost of fraud

Header image

Fraud studies of financial services firms show that the overall cost of fraud is high: some believe that many organizations are losing around 7% of their annual turnover because of the crime. However, businesses and customers alike face a number of other threats and costs. Acts of fraud cost consumers around the world billions of

A day in the life of a fraud fighter

Header image

Erik shares insights into memorable fraud cases, challenges in staying ahead of evolving tactics, and Veriff’s approach to tackling fraud. The curious incident of the potato salad in the night  From a whimsical search for potato salad to a career combating fraud; through determination and keen observation, Erik’s evolved from a kitchen detective to a

Understanding the implications of the US AI Executive Orders

Header image

What are the Executive Orders, and how do they impact AI? AI regulation in the US has been under great debate by US policymakers regarding how AI development and usage should be governed and what degree of legal and ethical oversight is needed. The US government has notably empowered existing governmental agencies, to the extent

Fraud prevention teams: Why you need one

Header image

Fraud is an increasingly serious problem in the digital world, where the use of stolen personal information imperils honest customers. One of the most common methods of fraud is identity theft, in which criminals steal personally identifiable information from their victims.  This can include personal information like names, addresses, phone numbers, and details used for

Elevating Security: Veriff Unveils Two Cutting-Edge Fraud Mitigation Solutions

Header image

Both packages use advanced machine learning models, behavioral insights, and Veriff’s in-house fraud detection expertise to enhance organizations’ ability to mitigate constantly evolving fraud attempts. During the IDV process, Veriff analyzes the user’s document, face biometrics, device, and network along with previous fraud patterns to deliver industry-leading fraud protection. “Organizations are faced with an evolving

Navigating Obsolescence: The Key Pain Points of Legacy Authentication in Business

Header image

Knowledge-based authentication As the name suggests, knowledge-based authentication uses things that only the relevant authorized person should know to control access to an account or service (passwords are technically a form of KBA). Static KBA This involves a previously agreed set of shared secrets, usually in the form of questions and answers such as “what