{"id":17890,"date":"2021-01-06T06:00:49","date_gmt":"2021-01-06T14:00:49","guid":{"rendered":"https:\/\/www.trulioo.com\/?p=17890"},"modified":"2023-08-01T16:27:34","modified_gmt":"2023-08-01T16:27:34","slug":"fraud-prevention","status":"publish","type":"post","link":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention","title":{"rendered":"Fraud prevention: Strategies, tactics and best practices"},"content":{"rendered":"\n<p>With the threat of fraud rising globally, it\u2019s vital that organizations implement effective <a href=\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/fraud-prevention\/fraud\">fraud prevention<\/a> processes that are adaptable and secure, while still ensuring good customers can onboard and transact quickly and seamlessly.<\/p>\n\n\n\n<p>In 2019, &nbsp;<a href=\"https:\/\/www.iii.org\/fact-statistic\/facts-statistics-identity-theft-and-cybercrime\" target=\"_blank\" rel=\"noopener noreferrer\">identity fraud in the U.S<\/a>. was estimated at $16.9 billion. One article points to 41&nbsp;<a href=\"https:\/\/i-sight.com\/resources\/41-types-of-fraud-and-how-to-detect-and-prevent-them\/\" target=\"_blank\" rel=\"noopener noreferrer\">different types of fraud<\/a>, and while not all will be applicable to each organization, it does indicate the variety and depth of fraudulent activity that needs consideration.<\/p>\n\n\n\n<p>Likewise, the threat of cybercrime is increasing, with the annual&nbsp;<a href=\"\/blog\/aml\/cybercrime\">cost to the global economy from cybercrime<\/a> estimated to rise to $6 trillion by 2021. Viruses, ransomware, phishing and many other digital threats pose a significant risk of fraud. Cybercrime can also cause compliance failures, either from the act itself, from non-reporting, or by weakening control systems to hide illicit activities.<\/p>\n\n\n\n<p>Understanding these threats and how fraudsters use technology to create new opportunities is an ongoing necessity. It\u2019s mission-critical for organizations to have holistic anti-fraud systems that are robust and can quickly adapt and deliver security and protection with minimal customer friction.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-types-of-online-fraud\">Types of online fraud<\/h2>\n\n\n\n<p>As Cathy Liu, Head of Fraud Prevention at Bolt states, \u201cFraud is a moving target, and the best protection is one that grows with your business. Fraud is such a difficult problem because <a href=\"\/blog\/fraud-prevention\/fraud-awareness-week-2020\">fraudsters are constantly innovating<\/a>; therefore, fraud prevention solutions must also innovate to remain one step ahead.\u201d<\/p>\n\n\n\n<p>Below are just some of the online fraud schemes that organizations should consider as part of their fraud strategies.<\/p>\n\n\n\n<p><strong>New account fraud<\/strong><\/p>\n\n\n\n<p><a href=\"\/blog\/document-verification\/new-account-fraud\">New account fraud<\/a> usually occurs within 90 days of account opening. Also referred to as application fraud or account origination fraud, the occurrence of fraud so close to account opening indicates the account&#8217;s creation was not for proper business purposes.<\/p>\n\n\n\n<p>For businesses, new account fraud is especially dangerous as there&#8217;s no track record to compare to, no existing relationship, and no history of trust. The initial activities might be benign or they may be acts of fraud yet to be uncovered.<\/p>\n\n\n\n<p>The worldwide increase in data breaches has led to wide-spread black-market access to so-called \u201cfullz,\u201d a full set of identity data that can be used for account opening. As hackers point out, \u201c<a href=\"https:\/\/securityboulevard.com\/2020\/08\/confessions-of-an-id-theft-kingpin-part-ii\/\" target=\"_blank\" rel=\"noopener noreferrer\">Buying identities<\/a> was so much better for them than stolen payment card data, because card data could be used once or twice before it was no good to them anymore. But identities could be used over and over again for years.\u201d<\/p>\n\n\n\n<p><strong>Card-not-present<\/strong> (<strong>CNP) fraud<\/strong><\/p>\n\n\n\n<p>As digital transactions are categorized as card-not-present (CNP), there are substantial risks of CNP fraud \u2014 and the merchant is liable for any costs incurred.<\/p>\n\n\n\n<p>An effective <a href=\"\/blog\/fraud-prevention\/cnp-fraud\">CNP fraud prevention program<\/a> is about risk mitigation. By understanding the techniques used by fraudsters, the fraud reduction tools and techniques available, and your organization\u2019s&nbsp;<a href=\"\/blog\/compliance\/risk-based-approach\">risk strategy<\/a>, you can develop and operate a program that contains costs while still being consumer-friendly.<\/p>\n\n\n\n<p>Online merchants are required to meet the Payment Card Industry Data Security Standard (PCI). The PCI is an industry group for payment organizations to develop standards for payment data security. The following image details how PayPal addresses the standards:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"600\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/04\/fraud-prevention-Illustration.png\" alt=\"\" class=\"wp-image-33617\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/04\/fraud-prevention-Illustration.png 1024w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/04\/fraud-prevention-Illustration-740x434.png 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/04\/fraud-prevention-Illustration-55x32.png 55w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Additional security measures in credit cards include:<\/p>\n\n\n\n<ul>\n<li><a href=\"\/blog\/identity-verification\/verifying-addresses\">Address Verification<\/a>&nbsp;Service (AVS). AVS checks the numbers of the address on the credit card file to the corresponding numbers provided in the transaction. While Visa, Mastercard and American Express widely support AVS in the U.S., Canada and the UK, there is still significant work to expand to more countries.<\/li>\n\n\n\n<li>Card verification value (CVV).&nbsp; An additional security feature comprising a three- or four-character number.<\/li>\n<\/ul>\n\n\n\n<p><strong>Identity fraud<\/strong><\/p>\n\n\n\n<p><a href=\"\/blog\/fraud-prevention\/identity-fraud\">Identity fraud<\/a> is when a person uses another person&#8217;s personal data, without authorization, to deceive or defraud someone else.<\/p>\n\n\n\n<p>With so much of our lives now digital, treasure troves of <a href=\"\/blog\/compliance\/pii-data\">personally identifiable information<\/a> (PII) are on numerous databases, only one data breach away from being in the hands of fraudsters or organized crime rings. According to <a href=\"https:\/\/www.forbes.com\/sites\/jessedamiani\/2020\/03\/25\/your-social-security-number-costs-4-on-the-dark-web-new-report-finds\/?sh=3e95bc1813f1\" target=\"_blank\" rel=\"noopener noreferrer\">Flashpoint<\/a>, you can buy an ID for as little as four dollars on the dark web. Or, fraudsters can create synthetic identities based on PII of real ID&#8217;s to use for activities.<\/p>\n\n\n\n<p><a href=\"\/blog\/fraud-prevention\/synthetic-identity-fraud\">Synthetic identity fraud (SIF)<\/a> uses fake identities usually based on combining fake information with actual ID data. One example of what comprises a fake identity is one that contains a real social security number along with a fake address and other synthetic data points. The fraudster can then use the&nbsp;<a href=\"https:\/\/securityintelligence.com\/synthetic-identity-theft-three-ways-synthetic-identities-are-created\/\" target=\"_blank\" rel=\"noopener noreferrer\">fake identity<\/a> to acquire everything from driver&#8217;s licenses and passports to credit cards and other accounts.<\/p>\n\n\n\n<p>Protecting your customer\u2019s information and taking precautions to prevent data breaches is a prudent business practice. The costs of prevention are minimal when compared to the financial and reputational costs of a data breach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-implementing-anti-fraud-technologies-at-account-creation\">Implementing anti-fraud technologies at account creation<\/h2>\n\n\n\n<p>While steps for detecting and decreasing fraud should occur during all stages of an account lifecycle, preventing bad actors before they enter your system helps eliminate the risk before it does any damage. As Trulioo COO Zac Cohen said, \u201cAs a first step to safeguarding against bad actors, companies must ensure they\u2019re paying close attention to the onboarding process; by taking a holistic approach \u2014 <a href=\"\/blog\/kyc\/identity-security-beats-speed\">using a variety of identity verification and authentication methods<\/a> to deliver the right level of risk protection \u2014 businesses can prevent these bad actors from accessing their customers.\u201d<\/p>\n\n\n\n<p><strong>Identity verification<\/strong><\/p>\n\n\n\n<p>Before an account is opened, <a href=\"\/solutions\/identity-verification\">identity verification<\/a> processes can flag potential fraudsters and prevent any damage being done. Anomalies in identity information, such as out-of-date information or mismatches in data, can quickly reveal issues for further examination. By cross-referencing multiple data points and data sources for identity checks, you create even higher barriers to fraudsters.<\/p>\n\n\n\n<p>According to Carmen Honacker, Sr. Manager Global Fraud Strategy at Sony, \u201cIdentity verification is necessary if you want to find out if a person is who they say they are. Customer friction needs to be kept to a minimum, so making sure you don\u2019t accidentally hold good people up in your fraud checks is only possible if you can <a href=\"\/blog\/fraud-prevention\/global-fraud-strategist\">properly authenticate the people<\/a> who interact with your ecosystem.\u201d<\/p>\n\n\n\n<p><strong>Biometric authentication<\/strong><\/p>\n\n\n\n<p>Authentication establishes whether the person presenting the identity data or document is the holder of that identity. Biometric authentication evaluates one or more distinguishing biological traits to uniquely identify a person. Combining <a href=\"\/solutions\/identity-verification\">ID document verification<\/a> (proof of possession of a legitimate identity document) with a selfie (liveness check) provides two additional layers that help deliver authentication for online channels.<\/p>\n\n\n\n<p><strong>MobileID checks<\/strong><\/p>\n\n\n\n<p>The ubiquity and usefulness of mobile phones enable mobile network operators (MNOs) to collect significant amounts of identity data, including name, mobile number and address, along with device information like geolocation, usage and billing data. When cross-referenced with other identity data points, MobileID data helps verify the individual, plus it offers real-world data patterns that can pinpoint inconsistencies. Patterns such as out-of-location, traffic spikes, or unusual behavior can also be set to trigger a fraud flag for further investigation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-fraud-prevention-tips\">Fraud prevention tips<\/h2>\n\n\n\n<p>While fraud prevention and compliance measures are necessary, requiring every customer to go through the highest levels of scrutiny often isn\u2019t necessary and can lead to customer abandonment. The customer, use case and many other factors will affect the risk profile, and the rulesets and workflows should also vary. Workflows may be customized to offer the most appropriate onboarding experience based on the risk associated with the digital identity.<\/p>\n\n\n\n<p>Workflows that allow lower-risk accounts to onboard seamlessly, while requiring higher-risk accounts to go through more robust measures, help to <a href=\"\/blog\/compliance\/fraud-risk-mitigation\">provide a balanced, risk-based approach<\/a>.<\/p>\n\n\n\n<p>As Rutherford Wilson, Trulioo VP of Emerging Tech, said, \u201cApply a risk profile. Understanding your customer\u2019s risk during onboarding allows you to <a href=\"\/blog\/fraud-prevention\/emerging-tech-veteran\">remove friction for less risky customers<\/a> and apply friction for risky customers.\u201d<\/p>\n\n\n\n<p><strong>Data as fraud-fighting fuel<\/strong><\/p>\n\n\n\n<p>All transactions leave a data trail, including the fraudulent ones. Every eCommerce transaction involves data \u2013 a name, shipping address, credit card number or other personal information. Data fuels the transaction by helping to define, authenticate and verify identities, ensuring that the right person receives the right goods and services. But data can be used more effectively to <a href=\"\/blog\/identity-verification\/data-role-against-online-fraud\">verify identities and detect eCommerce fraud<\/a> before any losses occur.<\/p>\n\n\n\n<p>Moreover, the use of specific data points can create barriers that prevent criminals from gaining access to eCommerce accounts while simultaneously authorizing legitimate customers to effortlessly access their accounts. In mere seconds, data can be referenced, verified and used to prevent a fraudulent transaction \u2013 saving digital services time, money, and resources \u2013 while allowing legitimate customers to easily and efficiently onboard.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-fraud-prevention-as-a-core-business-competency\">Fraud prevention as a core business competency<\/h2>\n\n\n\n<p>Organizations now need to be constantly vigilant to best protect their business, customers and employees from fraud. With <a href=\"\/blog\/identity-verification\/2020-year-digital-transformation\">digital transformation<\/a> accelerating, the need for effective fraud prevention measures is increasing as well.<\/p>\n\n\n\n<p>Fraud represents a broad operational risk and unfortunately, the fraudsters are well-funded, organized and tech-savvy. As Ralph Echemendia, \u201c<a href=\"\/blog\/fraud-prevention\/ethical-hacker\">The Ethical Hacker<\/a>,\u201d points out:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>The law is always years behind the criminals. The technologies are always behind the criminals[&#8230;] Then you come into regulatory, compliance, and governments, and all their involvement. By the time it gets there, the truth is, we\u2019re addressing issues that are maybe five to ten years old, as far as regulations and compliance is concerned.<\/p>\n<\/blockquote>\n\n\n\n<p>Fraud is a global issue with serious financial consequences. It can affect individuals and organizations, and sows\u2019 mistrust in in our digital lives. With the increasing level and sophistication of fraudulent attacks, all organizations, employees and consumers need to take ownership of preventing fraud from happening to them. The problem is too big and too serious to rely on hopes it won\u2019t happen to you.<\/p>\n\n\n\n<p>Taking active fraud prevention measures is a necessity in this new era of doing business.<\/p>\n","protected":false},"excerpt":{"rendered":"With the threat of fraud rising globally, it\u2019s vital that organizations implement effective fraud prevention&#8230;","protected":false},"author":8,"featured_media":33615,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[331],"post-types":[148],"post-topics":[123],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.1 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fraud prevention: Strategies, tactics and best practices<\/title>\n<meta name=\"description\" content=\"Effective fraud prevention processes are adaptable and secure, while still ensuring good customers can onboard and transact quickly and seamlessly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fraud prevention: Strategies, tactics and best practices\" \/>\n<meta property=\"og:description\" content=\"Effective fraud prevention processes are adaptable and secure, while still ensuring good customers can onboard and transact quickly and seamlessly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention\" \/>\n<meta property=\"og:site_name\" content=\"Trulioo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trulioo\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-06T14:00:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-01T16:27:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/01\/fraud-prevention-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1370\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Valkama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trulioo\" \/>\n<meta name=\"twitter:site\" content=\"@trulioo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Valkama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention\"},\"author\":{\"name\":\"Paul Valkama\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\"},\"headline\":\"Fraud prevention: Strategies, tactics and best practices\",\"datePublished\":\"2021-01-06T14:00:49+00:00\",\"dateModified\":\"2023-08-01T16:27:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention\"},\"wordCount\":1626,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"articleSection\":[\"Fraud and Risk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention\",\"url\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention\",\"name\":\"Fraud prevention: Strategies, tactics and best practices\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/#website\"},\"datePublished\":\"2021-01-06T14:00:49+00:00\",\"dateModified\":\"2023-08-01T16:27:34+00:00\",\"description\":\"Effective fraud prevention processes are adaptable and secure, while still ensuring good customers can onboard and transact quickly and seamlessly.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trulioo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraud and Risk\",\"item\":\"https:\/\/www.trulioo.com\/post-topics\/fraud-prevention\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fraud prevention: Strategies, tactics and best practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trulioo.com\/#website\",\"url\":\"https:\/\/www.trulioo.com\/\",\"name\":\"Trulioo\",\"description\":\"Building trust online (online identity verification services)\",\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trulioo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trulioo.com\/#organization\",\"name\":\"Trulioo\",\"url\":\"https:\/\/www.trulioo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"contentUrl\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"width\":2784,\"height\":1464,\"caption\":\"Trulioo\"},\"image\":{\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/trulioo\",\"https:\/\/twitter.com\/trulioo\",\"https:\/\/www.linkedin.com\/company\/trulioo\",\"https:\/\/www.instagram.com\/trulioo_global\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\",\"name\":\"Paul Valkama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"caption\":\"Paul Valkama\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fraud prevention: Strategies, tactics and best practices","description":"Effective fraud prevention processes are adaptable and secure, while still ensuring good customers can onboard and transact quickly and seamlessly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention","og_locale":"en_US","og_type":"article","og_title":"Fraud prevention: Strategies, tactics and best practices","og_description":"Effective fraud prevention processes are adaptable and secure, while still ensuring good customers can onboard and transact quickly and seamlessly.","og_url":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention","og_site_name":"Trulioo","article_publisher":"https:\/\/www.facebook.com\/trulioo","article_published_time":"2021-01-06T14:00:49+00:00","article_modified_time":"2023-08-01T16:27:34+00:00","og_image":[{"width":2400,"height":1370,"url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/01\/fraud-prevention-1.jpg","type":"image\/jpeg"}],"author":"Paul Valkama","twitter_card":"summary_large_image","twitter_creator":"@trulioo","twitter_site":"@trulioo","twitter_misc":{"Written by":"Paul Valkama","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention#article","isPartOf":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention"},"author":{"name":"Paul Valkama","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae"},"headline":"Fraud prevention: Strategies, tactics and best practices","datePublished":"2021-01-06T14:00:49+00:00","dateModified":"2023-08-01T16:27:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention"},"wordCount":1626,"commentCount":0,"publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"articleSection":["Fraud and Risk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention","url":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention","name":"Fraud prevention: Strategies, tactics and best practices","isPartOf":{"@id":"https:\/\/www.trulioo.com\/#website"},"datePublished":"2021-01-06T14:00:49+00:00","dateModified":"2023-08-01T16:27:34+00:00","description":"Effective fraud prevention processes are adaptable and secure, while still ensuring good customers can onboard and transact quickly and seamlessly.","breadcrumb":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-prevention#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trulioo.com\/"},{"@type":"ListItem","position":2,"name":"Fraud and Risk","item":"https:\/\/www.trulioo.com\/post-topics\/fraud-prevention"},{"@type":"ListItem","position":3,"name":"Fraud prevention: Strategies, tactics and best practices"}]},{"@type":"WebSite","@id":"https:\/\/www.trulioo.com\/#website","url":"https:\/\/www.trulioo.com\/","name":"Trulioo","description":"Building trust online (online identity verification services)","publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trulioo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.trulioo.com\/#organization","name":"Trulioo","url":"https:\/\/www.trulioo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","contentUrl":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","width":2784,"height":1464,"caption":"Trulioo"},"image":{"@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trulioo","https:\/\/twitter.com\/trulioo","https:\/\/www.linkedin.com\/company\/trulioo","https:\/\/www.instagram.com\/trulioo_global\/"]},{"@type":"Person","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae","name":"Paul Valkama","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","caption":"Paul Valkama"}}]}},"_links":{"self":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/17890"}],"collection":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/comments?post=17890"}],"version-history":[{"count":1,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/17890\/revisions"}],"predecessor-version":[{"id":36401,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/17890\/revisions\/36401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media\/33615"}],"wp:attachment":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media?parent=17890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/categories?post=17890"},{"taxonomy":"post-types","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-types?post=17890"},{"taxonomy":"post-topics","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-topics?post=17890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}