How to Identity Proof in an Increasingly Virtualized World The pandemic has only accelerated the migration online, necessitating more sophisticated identity proofing than ever before.

By Jonathan McDonald

Opinions expressed by Entrepreneur contributors are their own.

Teera Konakan | Getty Images

Proving a person's digital identity has always been a challenging problem, especially when balanced against the need for information to be accessible online. Customers want their information to be secure, but they also want to avoid being hassled by burdensome authentication tasks. Businesses, therefore, are faced with balancing security with accessibility, and the problem will only continue to grow more complex as almost everything moves online.

Related: Need For Better Fraud Prevention Strategies Amidst Surge In Payment Digitization: Report

Evaluating the potential for fraud

Companies that find it necessary to identify customers or business partners must always be aware of the potential for fraud, but luckily, AI and advanced systems for proving identity are making great strides in fraud identification. The increasingly expansive digital footprint of online activity makes it possible to establish patterns of behavior and indicate whether or not a device is associated with potential fraud, across various online activities. A solution that can couple digital footprint data with consumer credit information and public records data, where available, will provide an even more complete picture, therefore enabling a company to determine with increased confidence whether a consumer is who she claims to be – or is a potential fraudster.

All of this technology serves to help identity proofing companies identify potential cases of fraud early for their clients. Online retailers or banks are moving away from a simple username/password authentication process in favor of multiple factors of authentication, along with fraud detection services, to prove a consumer's identity. These factors include:

  • Knowledge-based authentication (KBA) informed by hard-to-guess personal or credit data
  • Multi-factor identification, leveraging email and phone
  • Document-centric identity authentication
  • Digital attribute risk assessment
  • Behavior analysis
  • Reputation and link analysis, which can associate multiple devices which each other

With all these factors, machines can learn a person's identity and be leveraged to improve pass rates in online businesses. In this way, consumers can be sure their identity is being successfully safeguarded, while the business can be sure it's protecting itself and its consumers from fraud.

Government trends

The private sector can often learn lessons from the way the government operates, particularly in the realm of cybersecurity. To authenticate its users, government agencies have largely moved away from relying on knowledge-based exams alone to using a combination of device-risk, document verification and multi-factor authentication, leveraging email and phone, as an example, to evaluate physical credentials. This has enabled government agencies to cut down on fraud and improve identity verification pass rates. Moving towards this model may be a way for businesses to provide a more streamlined and secure method of verifying identity.

Focus on being proactive

There are plenty of examples of supposedly secure applications and websites being hacked by unsophisticated methods (phishing is one of the widespread examples). There's always room for improvement, but some of these breaches have finally forced companies to wake up and become more aware of the threat. A good assumption is that everyone's identity has already been stolen, so the bad guys can be assumed to have passwords and answers to security questions.

New methods of identity verification need to be developed, which brings us back to using additional factors to stop fraud. Fraudsters are getting smarter, though, so companies can never become complacent with their own authentication processes. There is a need to constantly innovate.

For example, with TransUnion, we have a database that partners with tens of thousands of businesses and consumers around the world. These partners feed both positive and adverse information on digital devices back to the database. This allows crowdsourcing of possible threats, where device information and other risk factors can be pulled off potentially fraudulent devices and shared among other subscribers so that fraudulent activities are immediately detected and mitigated. Fraudsters can be identified by their devices even if they change their online identity because of the uniqueness of each device.

It's important to implement any new security measures so that customers maintain a positive user experience, while at the same time balancing security concerns. This goes back to that balance between security and accessibility; applications need to be secure while at the same time avoiding being burdensome. This is where risk signal intelligence analysis can become crucial; it allows for businesses to verify identity without placing any additional requirements on their consumer base.

Related: 4 Telltale Signs Your Business Is Ripe for a Cybersecurity Attack (and How to Respond)

Constant innovation is the key to success

The digital world is constantly evolving, and yet the core requirements stay the same: verify a user's identity and prevent fraud. The bad guys are constantly innovating and figuring out new ways to overcome old authentication methods, so it's up to businesses and their cybersecurity partners to stay one step ahead while still allowing for a seamless customer experience.
Wavy Line
Jonathan McDonald

EVP & GM, Public Sector at TransUnion

Jonathan McDonald leads TransUnion’s Public Sector business, which provides a suite of mission-critical solutions to help U.S. federal, state and local government agencies manage risk and reduce costs. He has hands-on experience managing large technology programs within various government agencies.

Editor's Pick

She's Been Coding Since Age 7 and Presented Her Life-Saving App to Tim Cook Last Year. Now 17, She's on Track to Solve Even Bigger Problems.
Lock
I Helped Grow 4 Unicorns Over 10 Years That Generated $18 Billion in Online Revenues. Here's What I've Learned.
Lock
Want to Break Bad Habits and Supercharge Your Business? Use This Technique.
Lock
Don't Have Any Clients But Need Customer Testimonials? Follow These 3 Tricks To Boost Your Rep.
Why Are Some Wines More Expensive Than Others? A Top Winemaker Gives a Full-Bodied Explanation.

Related Topics

Legal

How You Structure Your Business to the IRS Can Affect More Than Your Tax Bill. Here's What You Need to Know.

From startup to going public, the business formation structure you choose affects your company in many ways, including how you file your taxes and how much you owe the IRS.

Leadership

The Real Reason Why The Return to Office Movement is Failing is Revealed in New Study

There is a vivid sign of the disconnect between employees and their workplace, a glaring indication that companies need to revise their scripts to improve their hybrid and remote work policies.

Fundraising

Working Remote? These Are the Biggest Dos and Don'ts of Video Conferencing

As more and more businesses go remote, these are ways to be more effective and efficient on conference calls.

Growing a Business

The Best Way to Run a Business Meeting

All too often, meetings run longer than they should and fail to keep attendees engaged. Here's how to run a meeting the right way.

Marketing

8 Ways to Do Big-Time Marketing Without Spending a Fortune

When it comes to building your brand, how you spend your money is at least as important as how much money you spend.

Growing a Business

Subscribers Exclusive Event: Discover How These 2 Founders Turned Their Side Hustle into a Million-Dollar Lifestyle Brand

Learn how you can transform your personal brand into a thriving business empire with co-founders of The Skinny Confidential