In business terminology, the Covid 19 pandemic of 2020 (and probably beyond) is known as a black swan event. Referring to the rarity of a swan turning out to have black feathers, black swans in the business world are events which are impossible to predict; although some “experts” later assert that businesses should have seen them coming. Either way, black…
There are a number of ways cyber criminals can burglarise your computer and there are tell tale signs that will pop up to warn you that you are not alone. Fake antivirus messages, sudden appearance of unsolicited toolbars and redirected internet searches are just a few ways fraudsters have broken into your system to make mischief. Bogus antivirus messages These…
Online opportunists have wasted no time in sussing how to use QR codes to commit cybercrime. As quick as counting to three, this way they can access your personal details and use them in a number of ways that can wreak havoc. Fake QR codes are increasingly creating chaos with regular reports of unsuspecting users finding a zero balance on…
The value of digital ID verification is well known and proven by and for governments, border agencies and large financial institutions. In terms of national and financial security, robust ID checks keep whole populations and economies safe, in a very real way. What is perhaps not so well appreciated is the actual economic value that digital identification brings with it.…
Gone are the days when forging someone else’s signature was the most common form of identity theft, but these days this art of impersonation has found far easier routes and these don’t always involve illegal online operations. Closer than you think Hacking or exploiting a computer system is probably the hardest for the crooks to crack. These crimes are often…
In the age of the selfie, it makes sense for many members of the online ID verification community that they be part of the onboarding process. With timestamps and high quality digital images, there is a strong argument that a selfie can be a legitimate element of the verification process. This is especially true if applicants have limited access to…
You might have heard of this new phrase on the cyber block but have never really understood what it meant. Phishing is as flaky as it sounds – it is a fraudulent attempt to obtain sensitive data such as usernames, passwords and credit card details under the guise of a trusted entity via electronic communication. Electronic communication is by and…
In the digital age, verification of identity is an ongoing battle. Unlike previous eras, the issue of trust – be that of people or documents – is something that has to be checked with every single new contribution or application. Sophisticated hackers and algorithms are a constant threat, meaning that veracity of source material must be proved every time. The…
Artificial intelligence is widely accepted as being the development which will take online IT systems to the next level, with its massive potential to predict trends and reproduce user activity. Usually mentioned in the same breath or sentence is the term machine learning, or deep learning. These terms refer to the depth of information available in big data, and automated,…
Businesses, no matter how small, need an online presence these days, often making them fair game for cyber confident tricksters. There is no doubt that e-commerce paves the way for businesses to reach their target market, but on the downside it’s these business that fraudsters find easy to target. It Comes at a Price By introducing an efficient e-commerce option…