Fraud occurs when a bad actor originates a new account using all or parts of someone else’s personally identifiable information (PII) – including information from credit cards, banks, insurance, utilities, healthcare, brokerages, or ecommerce. Because of data breaches, hacking and other scams, most PIIs have been leaked and are easily accessible by career criminals. Many types of fraudulent applications can pass traditional identity verification checks. Zumigo verification includes:

 

  • Comparing the name and address provided by the user to the name and address on file with the carrier and additional real-time authoritative data sources.
  • Return mobile account information and risk indicators including account standing, account status and tenure, and any information on deactivation, SIM changes, porting, etc.
  • Risk scores to indicate whether the phone is trustworthy and protected from account takeover; and whether the associated email belongs to the consumer.
  • The distance between the mobile phone’s network location and the following locations: merchant address, IP address, device (Wi-Fi SSID), or any other submitted set of geo-coordinates.
  • The geo-coordinates and address of the mobile phone’s network location for the business to calculate the distance between the location of the phone and other pre-determined locations.