{"id":18380,"date":"2021-04-14T06:00:43","date_gmt":"2021-04-14T13:00:43","guid":{"rendered":"https:\/\/www.trulioo.com\/?p=18380"},"modified":"2023-08-01T16:25:10","modified_gmt":"2023-08-01T16:25:10","slug":"fraud-risk-management-program","status":"publish","type":"post","link":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program","title":{"rendered":"How effective digital onboarding supports your fraud risk management program"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Fraud-risk-management-program.jpg\" alt=\"fraud risk management program\" class=\"wp-image-18381\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Fraud-risk-management-program.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Fraud-risk-management-program-740x493.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Fraud-risk-management-program-48x32.jpg 48w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<p>In 2020, the <a href=\"https:\/\/public.tableau.com\/profile\/federal.trade.commission#!\/vizhome\/FraudReports\/LossesContactMethods\" target=\"_blank\" rel=\"noopener noreferrer\">Federal Trade Commission (FTC)<\/a> received over 2 million fraud reports that resulted in losses of over $3.3 billion. Fraudsters can run a scam from the onboarding process onward by obtaining and exploiting individual means of verification, including street addresses and passwords.<\/p>\n\n\n\n<p>An essential part of any <a href=\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/fraud-prevention\/fraud\">fraud risk management program<\/a> is an onboarding process that verifies that people are who they say they are. This can prevent fraudsters from entering your systems in the first place.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-preventing-fraud-risk-with-id-and-business-verification\">Preventing fraud risk with ID and business verification<\/h2>\n\n\n\n<p><a href=\"\/blog\/fraud-prevention\/identity-fraud\">Identity theft<\/a> is currently among the most common fraudulent activities and is continuing to expand. The increase in identity theft is partly due to the significant data breaches in recent years, which have given fraudsters access to vast amounts of personally identifiable information (<a href=\"\/blog\/compliance\/pii-data\">PII<\/a>).<\/p>\n\n\n\n<p>Using <a href=\"\/blog\/kyc\">Know Your Customer<\/a> (KYC) verification methods during the onboarding process helps prevent fraudsters from entering your system. The ID verification process flags anomalies in identity like out-of-date or mismatched information.<\/p>\n\n\n\n<p>Verification methods using biometric markers can cross-reference multiple data points by combining <a href=\"https:\/\/www.trulioo.com\/solutions\/identity-verification\/document-verification\">ID document verification<\/a> with distinguishing biological traits. Mobile Network Operator (MNO) phone data like geolocation, usage and billing information can also be cross-referenced with other identity data points.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-most-common-types-of-online-fraud\">The most common types of online fraud<\/h2>\n\n\n\n<p>Understanding the techniques used by fraudsters is one of the best ways you can protect your business. Here are some of the most common types of online fraud to consider as part of your overall fraud risk management program.<\/p>\n\n\n\n<p><strong>Synthetic identity fraud<br><\/strong><br><a href=\"\/blog\/fraud-prevention\/synthetic-identity-fraud\">Synthetic identity fraud<\/a> (SIF) is the most common type of ID theft where fake and real information is combined to create an identity for malicious activity. Typically, the real information included in this ID theft is stolen. SIF currently accounts for about 80% of all ID fraud, so spotting fake identities is a robust defense you can give your business without negatively impacting the customer onboarding experience.<\/p>\n\n\n\n<p>SIF is designed to bypass conventional validation and authentication methods. And the increase of large-scale customer data leaks has given fraudsters plenty of personal data to exploit.<\/p>\n\n\n\n<p><strong>Account origination and takeover fraud<br><\/strong><br><a href=\"\/blog\/document-verification\/new-account-fraud\">Account origination fraud<\/a> and account takeover fraud (ATO) are other types of identity theft that happen when a fraudster gains access to an individual\u2019s account to make fraudulent transactions or use their personal information elsewhere to create accounts.<\/p>\n\n\n\n<p>ATO is complicated to pinpoint because legitimate credentials are used to access the accounts. But companies can lose millions of dollars by not prioritizing a solution to fraud risk or uncovering ATO after the damage has already been done.<\/p>\n\n\n\n<p><strong>Card-not-present and chargeback fraud<\/strong><\/p>\n\n\n\n<p>Card-not-present (CNP) fraud is a general term for fraudulent transactions where a cardholder doesn\u2019t present a card in person at the time of purchase. CNP generally occurs through mobile payments or online, which makes them difficult to prevent and detect.<\/p>\n\n\n\n<p><a href=\"\/blog\/fraud-prevention\/chargeback-fraud\">Chargebacks<\/a> are a type of CNP fraud that happens when someone orders products or services and then requests a chargeback from the issuing bank instead of the merchant. Businesses that use 3D Secure, V.2 (3DS2), a multifactor authentication protocol, are now often able to shift the liability of a chargeback to the issuer.<\/p>\n\n\n\n<p>In addition to authentication methods like 3DS2, implementing an enterprise-wide strategic program can help your company effectively manage fraud risk across all transaction channels.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"300\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-systems-and-technologies.jpg\" alt=\"Account takeover fraud - systems and technologies\" class=\"wp-image-18056\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-systems-and-technologies.jpg 900w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-systems-and-technologies-740x247.jpg 740w, https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/02\/Account-takeover-fraud-systems-and-technologies-96x32.jpg 96w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-a-fraud-risk-management-program\">What is a fraud risk management program?<\/h2>\n\n\n\n<p>A fraud risk management program gives your business a framework for identifying, assessing, <a href=\"\/blog\/fraud-prevention\/fraud-prevention\">preventing<\/a>, mitigating, monitoring and reporting fraudulent activities. Preventing fraud isn\u2019t just about protecting revenues and bottom lines; it also minimizes reputational harm and helps build customer trust. Plus, it can reduce friction by streamlining the customer experience.<\/p>\n\n\n\n<p>One of the main benefits of a fraud risk management program is a significantly positive impact on decreasing the overall costs of fraud for companies. Conducting risk analysis also gives businesses a greater understanding of their strengths and weaknesses and insights on how to improve their fraud risk management process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-tips-for-implementing-a-fraud-risk-management-program\">Tips for implementing a fraud risk management program<\/h2>\n\n\n\n<p>Establishing a fraud risk management program standardizes your organization\u2019s commitment to managing fraud risk. A comprehensive, proactive strategy can enhance your controls and communication for employees and customers regarding areas of exposure.<\/p>\n\n\n\n<p>Here are some helpful tips on how to get started:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-nbsp-nbsp-nbsp-nbsp-assess-your-company-s-specific-fraud-risk\">1.&nbsp;&nbsp;&nbsp;&nbsp; Assess your company\u2019s specific fraud risk<\/h3>\n\n\n\n<p>The first step is to perform a comprehensive fraud risk assessment. Consider the requirements associated with your particular regulatory compliance and industry standards. Also, investigate the common techniques fraudsters use against your type of business.<\/p>\n\n\n\n<p>Armed with this assessment, you can more easily define procedures for detecting and preventing fraud. Then you can select, develop, and deploy fraud risk control activities that are specifically suited to your company\u2019s risk tolerance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-nbsp-nbsp-nbsp-nbsp-implement-a-fraud-awareness-and-training-program\">2.&nbsp;&nbsp;&nbsp;&nbsp; Implement a fraud awareness and training program<\/h3>\n\n\n\n<p>Ensure employees understand various fraud risks and know what to look for and how to respond.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-nbsp-nbsp-nbsp-nbsp-adopt-a-coordinated-approach-to-fraud-reporting\">3.&nbsp;&nbsp;&nbsp;&nbsp; Adopt a coordinated approach to fraud reporting<\/h3>\n\n\n\n<p>An effective fraud reporting process includes a coordinated approach to investigation and corrective action. As you monitor the fraud risk management process, your team can report the results and make continuous improvements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-nbsp-nbsp-nbsp-nbsp-leverage-fraud-detection-tools\">4.&nbsp;&nbsp;&nbsp;&nbsp; Leverage fraud detection tools<\/h3>\n\n\n\n<p>Fraud detection tools such as Address Verification Service (AVS) and Card Verification Value (CVV) can help combat fraud from credit and debit cards. The FTC reports that most fraud stems from credit card, debit card and payment app or service payment methods. So, having fraud detection tools in place can help mitigate fraud risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-nbsp-nbsp-nbsp-nbsp-take-advantage-of-fraud-management-software\">5.&nbsp;&nbsp;&nbsp;&nbsp; Take advantage of fraud management software<\/h3>\n\n\n\n<p>Many automated fraud management software systems use machine learning (AI) and predictive analytics. Using machine learning to authenticate transactions can allow businesses to reduce fraud by uncovering hidden correlations between people\u2019s behavior and the likelihood of fraudulent actions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-digital-onboarding-is-crucial-to-fraud-risk-management\">Digital onboarding is crucial to fraud risk management<\/h2>\n\n\n\n<p>Customer onboarding is the beginning of a customer\u2019s relationship with your business. Effective digital onboarding can make online account opening easier so you can gain genuine customers while keeping bad actors out. Companies that have optimized their onboarding process as part of their risk management program have achieved significant and sustainable advances in preventing fraud.<\/p>\n\n\n\n<p>Adapting to the ever-changing world of digital identity requires limiting the risk of fraud while maintaining customers\u2019 trust.<\/p>\n","protected":false},"excerpt":{"rendered":"In 2020, the Federal Trade Commission (FTC) received over 2 million fraud reports that resulted&#8230;","protected":false},"author":8,"featured_media":18381,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[331],"post-types":[148],"post-topics":[123],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.1 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How digital onboarding supports your fraud risk management program<\/title>\n<meta name=\"description\" content=\"An essential part of any fraud risk management program is an onboarding process that verifies that people are who they say they are.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How digital onboarding supports your fraud risk management program\" \/>\n<meta property=\"og:description\" content=\"An essential part of any fraud risk management program is an onboarding process that verifies that people are who they say they are.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program\" \/>\n<meta property=\"og:site_name\" content=\"Trulioo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trulioo\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-14T13:00:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-01T16:25:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Fraud-risk-management-program.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Valkama\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trulioo\" \/>\n<meta name=\"twitter:site\" content=\"@trulioo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Valkama\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program\"},\"author\":{\"name\":\"Paul Valkama\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\"},\"headline\":\"How effective digital onboarding supports your fraud risk management program\",\"datePublished\":\"2021-04-14T13:00:43+00:00\",\"dateModified\":\"2023-08-01T16:25:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program\"},\"wordCount\":1060,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"articleSection\":[\"Fraud and Risk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program\",\"url\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program\",\"name\":\"How digital onboarding supports your fraud risk management program\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/#website\"},\"datePublished\":\"2021-04-14T13:00:43+00:00\",\"dateModified\":\"2023-08-01T16:25:10+00:00\",\"description\":\"An essential part of any fraud risk management program is an onboarding process that verifies that people are who they say they are.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trulioo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fraud and Risk\",\"item\":\"https:\/\/www.trulioo.com\/post-topics\/fraud-prevention\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How effective digital onboarding supports your fraud risk management program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trulioo.com\/#website\",\"url\":\"https:\/\/www.trulioo.com\/\",\"name\":\"Trulioo\",\"description\":\"Building trust online (online identity verification services)\",\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trulioo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trulioo.com\/#organization\",\"name\":\"Trulioo\",\"url\":\"https:\/\/www.trulioo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"contentUrl\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"width\":2784,\"height\":1464,\"caption\":\"Trulioo\"},\"image\":{\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/trulioo\",\"https:\/\/twitter.com\/trulioo\",\"https:\/\/www.linkedin.com\/company\/trulioo\",\"https:\/\/www.instagram.com\/trulioo_global\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae\",\"name\":\"Paul Valkama\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g\",\"caption\":\"Paul Valkama\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How digital onboarding supports your fraud risk management program","description":"An essential part of any fraud risk management program is an onboarding process that verifies that people are who they say they are.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program","og_locale":"en_US","og_type":"article","og_title":"How digital onboarding supports your fraud risk management program","og_description":"An essential part of any fraud risk management program is an onboarding process that verifies that people are who they say they are.","og_url":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program","og_site_name":"Trulioo","article_publisher":"https:\/\/www.facebook.com\/trulioo","article_published_time":"2021-04-14T13:00:43+00:00","article_modified_time":"2023-08-01T16:25:10+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2021\/04\/Fraud-risk-management-program.jpg","type":"image\/jpeg"}],"author":"Paul Valkama","twitter_card":"summary_large_image","twitter_creator":"@trulioo","twitter_site":"@trulioo","twitter_misc":{"Written by":"Paul Valkama","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program#article","isPartOf":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program"},"author":{"name":"Paul Valkama","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae"},"headline":"How effective digital onboarding supports your fraud risk management program","datePublished":"2021-04-14T13:00:43+00:00","dateModified":"2023-08-01T16:25:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program"},"wordCount":1060,"commentCount":0,"publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"articleSection":["Fraud and Risk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program","url":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program","name":"How digital onboarding supports your fraud risk management program","isPartOf":{"@id":"https:\/\/www.trulioo.com\/#website"},"datePublished":"2021-04-14T13:00:43+00:00","dateModified":"2023-08-01T16:25:10+00:00","description":"An essential part of any fraud risk management program is an onboarding process that verifies that people are who they say they are.","breadcrumb":{"@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trulioo.com\/blog\/fraud-prevention\/fraud-risk-management-program#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trulioo.com\/"},{"@type":"ListItem","position":2,"name":"Fraud and Risk","item":"https:\/\/www.trulioo.com\/post-topics\/fraud-prevention"},{"@type":"ListItem","position":3,"name":"How effective digital onboarding supports your fraud risk management program"}]},{"@type":"WebSite","@id":"https:\/\/www.trulioo.com\/#website","url":"https:\/\/www.trulioo.com\/","name":"Trulioo","description":"Building trust online (online identity verification services)","publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trulioo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.trulioo.com\/#organization","name":"Trulioo","url":"https:\/\/www.trulioo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","contentUrl":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","width":2784,"height":1464,"caption":"Trulioo"},"image":{"@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trulioo","https:\/\/twitter.com\/trulioo","https:\/\/www.linkedin.com\/company\/trulioo","https:\/\/www.instagram.com\/trulioo_global\/"]},{"@type":"Person","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/4dedbd41574b6b5754919a490ed4d5ae","name":"Paul Valkama","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae0ad041b53eb878badb2c5744ad4691?s=96&d=mm&r=g","caption":"Paul Valkama"}}]}},"_links":{"self":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/18380"}],"collection":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/comments?post=18380"}],"version-history":[{"count":1,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/18380\/revisions"}],"predecessor-version":[{"id":36375,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/posts\/18380\/revisions\/36375"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media\/18381"}],"wp:attachment":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media?parent=18380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/categories?post=18380"},{"taxonomy":"post-types","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-types?post=18380"},{"taxonomy":"post-topics","embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/post-topics?post=18380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}