{"id":18054,"date":"2021-02-04T06:00:24","date_gmt":"2021-02-04T14:00:24","guid":{"rendered":"https:\/\/www.trulioo.com\/?p=18054"},"modified":"2023-08-01T16:27:05","modified_gmt":"2023-08-01T16:27:05","slug":"account-takeover-fraud","status":"publish","type":"post","link":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud","title":{"rendered":"Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud.jpg\" alt=\"Account takeover fraud\" class=\"wp-image-18055\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-740x493.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-48x32.jpg 48w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<p>Our economic lives are increasingly digital. Bank, credit and crypto accounts are often online, as are numerous other services. Research from NordPass indicates the average person has <a href=\"https:\/\/tech.co\/news\/average-person-100-passwords\" target=\"_blank\" rel=\"noopener noreferrer\">over 100 passwords<\/a> for various sites and services. Unfortunately, these accounts are prime targets for fraudsters who use different account takeover fraud techniques to gain access to funds or to obtain the personal information needed to commit other fraudulent activity.<\/p>\n\n\n\n<p>Considering the value of online accounts, the number of global accounts and the speed that an ATO can access funds, account takeover fraud is one of the most severe forms of fraud today. According to Sift, <a href=\"https:\/\/sift.com\/products\/account-defense\" target=\"_blank\" rel=\"noopener noreferrer\">account takeover attempts are up 228% <\/a>&nbsp;from Q2 2019 to Q2 2020, while NuData noted <a href=\"https:\/\/nudatasecurity.com\/wp-content\/uploads\/2020\/06\/ATO-Infographic-2020.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">$6.8 billion was lost to account takeover fraud<\/a> in 2019 in the U.S. alone.<\/p>\n\n\n\n<p>Ensuring your organization has effective<a href=\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/fraud-prevention\/fraud\"> fraud prevention measures<\/a> to protect your corporate accounts and customer accounts from account takeover attacks is essential to avoid financial losses, reputational damage and customer churn.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-account-takeover-fraud\">What is account takeover fraud?<\/h2>\n\n\n\n<p>Account takeover fraud&nbsp;involves fraudulently taking control of an account to access funds, perform unauthorized transactions, or gain entry to other accounts.<\/p>\n\n\n\n<p>If not stopped, funds in a compromised online account are often quickly drained. As many people use repeat passwords, the fraudster can also try to take over other accounts. Or, the account itself might provide access to other linked services, like an email account. For example, <a href=\"\/blog\/identity-verification\/sim-swap-fraud\">SIM-swap fraud<\/a> enables fraudsters to access a mobile device, providing access to email and other personal accounts and allowing the fraudster to takeover other accounts.<\/p>\n\n\n\n<p>Businesses are also vulnerable. Corporate account takeovers amplify the fraud risk, as these accounts can hold significant funds and provide access to numerous customer profiles and confidential information. In one case, a global hotel brand had a data breach that <a href=\"https:\/\/www.helpnetsecurity.com\/2020\/04\/01\/marriott-data-breach-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">exposed over five million customer records<\/a>; the hackers were able to get hold of information by attaining employee credentials.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-preventing-account-takeover-attacks\">Preventing account takeover attacks<\/h2>\n\n\n\n<p>As with all fraud prevention measures, proper tools, training and ongoing diligence will help protect your organization. As there are many ways that fraudsters can get hold of accounts, there\u2019s no one \u201cmagic\u201d solution. Rather, layering in various social and technological processes helps reduce fraudsters\u2019 opportunities and mitigate any damage if they gain access.<\/p>\n\n\n\n<p><strong>Effective onboarding<\/strong><\/p>\n\n\n\n<p>The onboarding stage, when you gather initial account information, is an opportunity to prevent fraud before it even starts. Verifying that a customer is who they say they are helps limit the opening of illegitimate accounts. The same applies to employees, suppliers, business partners and anyone with whom you\u2019re doing business.<\/p>\n\n\n\n<p>The information can also be analyzed at different points of the relationship to <a href=\"\/blog\/identity-verification\/kyc-remediation\">revalidate<\/a> the account. Does the information they provided sync with information on record? If not, is there a good reason for any discrepancies? Depending on the type and quantity of data collected at onboarding, there are many ways to determine legitimacy.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"300\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-document-verification.jpg\" alt=\"Account takeover fraud - document verification\" class=\"wp-image-18057\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-document-verification.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-document-verification-740x247.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-document-verification-96x32.jpg 96w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<p><a href=\"\/solutions\/identity-verification\">ID document verification<\/a> can gather evidence of government-issued identity, as well as biometric information. The customer should be able to provide this evidence again if requested. It\u2019s important to note that storing biometric data is especially sensitive and might not be permissible, depending on the jurisdiction.<\/p>\n\n\n\n<p><a href=\"\/blog\/identity-verification\/mobile-id\">MobileID<\/a> information such as device, geolocation, usage and billing data provide numerous data points that are difficult for fraudsters to produce. This information is metadata, so it doesn\u2019t require the user to provide it, enabling a more friction-free check.<\/p>\n\n\n\n<p>If you need to verify an organization, you can use <a href=\"\/solutions\/business-verification\">business verification<\/a> to verify information like:<\/p>\n\n\n\n<ul>\n<li>Business registration number<\/li>\n\n\n\n<li>Company name<\/li>\n\n\n\n<li>Address<\/li>\n\n\n\n<li>Status<\/li>\n\n\n\n<li>Key management personnel<\/li>\n\n\n\n<li>Date of incorporation<\/li>\n<\/ul>\n\n\n\n<p><strong>Risk intelligence<\/strong><\/p>\n\n\n\n<p>Account and transaction monitoring enable ongoing insight into usage and any unusual activity can be quickly flagged for further analysis. Numerous data patterns can indicate potential fraud, including:<\/p>\n\n\n\n<ul>\n<li>Spikes in activities<\/li>\n\n\n\n<li>Exceeding thresholds<\/li>\n\n\n\n<li>Out-of-area or unusual cross-border activities<\/li>\n\n\n\n<li>Changing purchase patterns<\/li>\n\n\n\n<li>Consumer alerts<\/li>\n\n\n\n<li>Credit reports<\/li>\n\n\n\n<li>IP address discrepancies<\/li>\n<\/ul>\n\n\n\n<p>If there\u2019s a fraud flag indication, halting transactions or temporarily freezing accounts is best practice. People <a href=\"\/blog\/document-verification\/online-account-opening\">understand the need for security<\/a> and accept minor inconveniences to ensure their information is secure.<\/p>\n\n\n\n<p><strong>Education and training<\/strong><\/p>\n\n\n\n<p>Many customers are not computer savvy and might not know best practices when it comes to online safety. Taking the time and effort to help protect customers creates goodwill and can help avoid serious customer service issues. Everything from clear explanations to copy suggestions can help users more effectively use your services and better protect themselves.<\/p>\n\n\n\n<p>Employee training on proper security practices is advisable, and in many cases, it\u2019s a compliance requirement. For example, in the U.S., there are over <a href=\"https:\/\/www.knowbe4.com\/resources\/security-awareness-compliance-requirements\/\" target=\"_blank\" rel=\"noopener noreferrer\">8500 local, state and federal standards<\/a> that might require implementation. <a href=\"\/blog\/fraud-prevention\/data-privacy-day\">Date privacy<\/a> considerations, information protection, ensuring payment information and company data is kept secure, and numerous other factors require robust and ongoing training:<\/p>\n\n\n\n<ul>\n<li><strong>Awareness<\/strong><br>Employees need to understand the overall risks and develop a security mindset.<\/li>\n\n\n\n<li><strong>Fraudulent practices<\/strong><br>Employees need to know what techniques fraudsters can deploy and to be vigilant to watch out for those activities.<\/li>\n\n\n\n<li><strong>Specific actions<\/strong><br>What are the company protocols and procedures to handle various scenarios? These instructions need to be clear and communicated.<\/li>\n\n\n\n<li><strong>Testing<\/strong><br>Expecting security, without analysis, is problematic. Numerous methods to probe defenses, from fake phishing emails to sophisticated penetration tests, can help detect issues before they become security failures.<\/li>\n\n\n\n<li><strong>Ongoing training<\/strong><br>Fraudsters continue to develop new ways to takeover accounts and people can often become complacent. Regularly updating programs and training is a good recommendation.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"300\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-systems-and-technologies.jpg\" alt=\"Account takeover fraud - systems and technologies\" class=\"wp-image-18056\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-systems-and-technologies.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-systems-and-technologies-740x247.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-systems-and-technologies-96x32.jpg 96w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<p><strong>Systems and technologies<\/strong><\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.fortunebusinessinsights.com\/industry-reports\/cyber-security-market-101165\" target=\"_blank\" rel=\"noopener noreferrer\">global cybersecurity market<\/a> is projected to reach $281 billion by 2027, from $112 billion in 2019. Numerous technologies and systems can monitor, detect, analyze and actively prevent fraudulent activity, including:<\/p>\n\n\n\n<ul>\n<li>Identity access management<\/li>\n\n\n\n<li>Two-factor or multi-factor authentication<\/li>\n\n\n\n<li>Firewalls<\/li>\n\n\n\n<li>Filters<\/li>\n\n\n\n<li>Email scores and verification<\/li>\n\n\n\n<li>Anti-virus software<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-security-and-speed-a-holistic-approach-to-digital-business\">Security <strong>and<\/strong> speed \u2013 A holistic approach to digital business<\/h2>\n\n\n\n<p>Account takeover fraud&nbsp;is a serious potential risk for businesses. However, security procedures mustn\u2019t create excessive friction for the customer; simply put, customers won\u2019t tolerate poor account creation experiences. According to our <a href=\"\/blog\/fraud-prevention\/prioritising-first-impressions\">Account Opening Report<\/a> nearly half (44%) say they would give up if a financial services site could not verify their identity after multiple attempts, and 41% would walk away if there were a lack of transparency about why certain personal information is required.<\/p>\n\n\n\n<p>Fortunately, speed and security don\u2019t need to conflict with each other. Creating <a href=\"\/blog\/compliance\/risk-based-approach\">risk-based<\/a> workflows that consider risk profiles and adapt security accordingly, provides options to maximize customer acquisition while minimizing the risk of fraud. Effective use of systems and \u201chuman firewalls\u201d help create organizations with both the technical capabilities and security-centric philosophies to help guard against fraud and risk in all its forms.<\/p>\n\n\n\n<p>Ensuring that accounts remain in possession of authorized owners is fundamental. Taking significant measures to deter account takeover fraud while keeping the customer experience effective is the path to business success.<\/p>\n","protected":false},"excerpt":{"rendered":"Our economic lives are increasingly digital. Bank, credit and crypto accounts are often online, as&#8230;","protected":false},"author":8,"featured_media":18055,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[331],"post-types":[148],"post-topics":[215,101,123,131],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.1 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers<\/title>\n<meta name=\"description\" content=\"Account takeover fraud\u00a0involves fraudulently taking control of an account to get funds, perform unauthorized transactions, or access other accounts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers\" \/>\n<meta property=\"og:description\" content=\"Account takeover fraud\u00a0involves fraudulently taking control of an account to get funds, perform unauthorized transactions, or access other accounts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud\" \/>\n<meta property=\"og:site_name\" content=\"Trulioo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trulioo\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-04T14:00:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-01T16:27:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Valkama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trulioo\" \/>\n<meta name=\"twitter:site\" content=\"@trulioo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Valkama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud\"},\"author\":{\"name\":\"Paul Valkama\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\"},\"headline\":\"Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers\",\"datePublished\":\"2021-02-04T14:00:24+00:00\",\"dateModified\":\"2023-08-01T16:27:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud\"},\"wordCount\":1143,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"articleSection\":[\"Fraud and Risk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud\",\"url\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud\",\"name\":\"Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/#website\"},\"datePublished\":\"2021-02-04T14:00:24+00:00\",\"dateModified\":\"2023-08-01T16:27:05+00:00\",\"description\":\"Account takeover fraud\u00a0involves fraudulently taking control of an account to get funds, perform unauthorized transactions, or access other accounts.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trulioo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraud and Risk\",\"item\":\"https:\/\/www.trulioo.com\/post-topics\/fraud-prevention\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trulioo.com\/#website\",\"url\":\"https:\/\/www.trulioo.com\/\",\"name\":\"Trulioo\",\"description\":\"Building trust online (online identity verification services)\",\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trulioo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trulioo.com\/#organization\",\"name\":\"Trulioo\",\"url\":\"https:\/\/www.trulioo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"contentUrl\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"width\":2784,\"height\":1464,\"caption\":\"Trulioo\"},\"image\":{\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/trulioo\",\"https:\/\/twitter.com\/trulioo\",\"https:\/\/www.linkedin.com\/company\/trulioo\",\"https:\/\/www.instagram.com\/trulioo_global\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\",\"name\":\"Paul Valkama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"caption\":\"Paul Valkama\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers","description":"Account takeover fraud\u00a0involves fraudulently taking control of an account to get funds, perform unauthorized transactions, or access other accounts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud","og_locale":"en_US","og_type":"article","og_title":"Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers","og_description":"Account takeover fraud\u00a0involves fraudulently taking control of an account to get funds, perform unauthorized transactions, or access other accounts.","og_url":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud","og_site_name":"Trulioo","article_publisher":"https:\/\/www.facebook.com\/trulioo","article_published_time":"2021-02-04T14:00:24+00:00","article_modified_time":"2023-08-01T16:27:05+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud.jpg","type":"image\/jpeg"}],"author":"Paul Valkama","twitter_card":"summary_large_image","twitter_creator":"@trulioo","twitter_site":"@trulioo","twitter_misc":{"Written by":"Paul Valkama","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud#article","isPartOf":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud"},"author":{"name":"Paul Valkama","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae"},"headline":"Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers","datePublished":"2021-02-04T14:00:24+00:00","dateModified":"2023-08-01T16:27:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud"},"wordCount":1143,"commentCount":0,"publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"articleSection":["Fraud and Risk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud","url":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud","name":"Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers","isPartOf":{"@id":"https:\/\/www.trulioo.com\/#website"},"datePublished":"2021-02-04T14:00:24+00:00","dateModified":"2023-08-01T16:27:05+00:00","description":"Account takeover fraud\u00a0involves fraudulently taking control of an account to get funds, perform unauthorized transactions, or access other accounts.","breadcrumb":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/account-takeover-fraud#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trulioo.com\/"},{"@type":"ListItem","position":2,"name":"Fraud and Risk","item":"https:\/\/www.trulioo.com\/post-topics\/fraud-prevention"},{"@type":"ListItem","position":3,"name":"Account takeover fraud \u00ad\u2014 Protecting your accounts and your customers"}]},{"@type":"WebSite","@id":"https:\/\/www.trulioo.com\/#website","url":"https:\/\/www.trulioo.com\/","name":"Trulioo","description":"Building trust online (online identity verification services)","publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trulioo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.trulioo.com\/#organization","name":"Trulioo","url":"https:\/\/www.trulioo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","contentUrl":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","width":2784,"height":1464,"caption":"Trulioo"},"image":{"@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trulioo","https:\/\/twitter.com\/trulioo","https:\/\/www.linkedin.com\/company\/trulioo","https:\/\/www.instagram.com\/trulioo_global\/"]},{"@type":"Person","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae","name":"Paul Valkama","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","caption":"Paul Valkama"}}]}},"_links":{"self":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/18054"}],"collection":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/comments?post=18054"}],"version-history":[{"count":1,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/18054\/revisions"}],"predecessor-version":[{"id":36396,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/18054\/revisions\/36396"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media\/18055"}],"wp:attachment":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media?parent=18054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/categories?post=18054"},{"taxonomy":"post-types","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-types?post=18054"},{"taxonomy":"post-topics","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-topics?post=18054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}