Blog
Buyer’s guide to identity verification solutions
Learn what to look for in identity verification solutions, how to assess effectiveness and cost, and more.

What is simplified due diligence (SDD)?
Simplified due diligence is a low-friction identity verification process applied to customers who have a low risk of money laundering. Learn more.

Top cryptocurrency theft statistics of 2023
See how cryptocurrency thefts occur, dig into the biggest heists of all time, and get some tips for protecting users.

How email verification can help you confirm identities and prevent fraud
Email verification can help keep your business safe by uncovering suspicious activity. Learn what email verification is and how it can help you.

RegTech: Both a necessity and a differentiator
RegTech can transform compliance from simply a requirement to a point of differentiation. See how.

Sponsor banks & Banking as a Service: The importance of choosing the right tech vendors
BaaS allows fintechs to offer financial products and services without acquiring a banking license. Learn more.

Top healthcare data breach statistics of 2023
The healthcare sector is one of the most targeted industries by cybercrime. See some of the stats.

Video KYC verification: What is it, and how does it work?
Video KYC refers to any KYC process that leverages video in some capability. Learn more.

What is Protected Health Information (PHI)?
Learn what protected health information (PHI) is, who’s subject to HIPAA laws around PHI, what identifiers fall under PHI, and more.

Let's get Personal: Meet Jack!
Learn more about Jack, a member of our sales team who is consistently bested in negotiations by his two-year-old daughter.

The role of AML in the financial industry
Financial institutions are required by law to prevent money launderers from using their platforms. Learn more.

What is passport verification?
Learn what passport verification is, how it works, its benefits and drawbacks, and more.

What is KYC remediation?
KYC remediation involves updating customer documents and other information collected through the KYC process. Learn more.

What is address verification?
Address verification can help confirm if a person or business is based at the address they provided.

Unusual activity reports (UARs) vs. suspicious activity reports (SARs)
Find out if you should be filing UARs, why they’re used, and how to streamline the reporting process.

AML screening: Why it's important and how it works
AML screening is the process of checking whether customers pose a specific risk of money laundering. Learn more.

5 questions fraud leaders ask about synthetic fraud
3 experts discuss how generative AI might affect synthetic fraud risk, what data to look at to detect fraud, and more.
.png)
Linked fraudulent accounts: A threat and an opportunity
Spotting a fraudster on your platform is like spotting ants in your kitchen. If you see one, there are probably hundreds or thousands hidden behind the wall.

Cloud security in healthcare: Key considerations
Learn about the key considerations in any healthcare cloud security environment.

Know Your Patient (KYP): How to mitigate healthcare fraud
KYP is a necessary measure of protection for all sectors of the healthcare space. Learn more.

Know Your Customer (KYC) vs. Customer Due Diligence (CDD): What's the difference?
Learn what KYC and CDD are, why they're important, how they differ, and more.

Experts weigh in: How to combat synthetic fraud
Get key takeaways from our roundtable discussion on combating synthetic fraud.

Proof of address — what it is and how it works
Proof of address is generally required for organizations that have to comply with KYC regulations and can help companies prevent fraud and offer targeted services.

How marketplaces like Neighbor design trust & safety programs to mitigate and fight fraud
Learn about key moments when fraudsters are likely to strike, Neighbor’s approach to fighting fraud, and more.
.png)
Social Security number (SSN) verification: What it is and why it matters
Learn about common types of SSN verification — plus the potential shortcomings of relying solely on a person’s SSN for verification purposes.

What is driver’s license verification?
Learn about this common way to verify someone’s identity or age.

What is AML transaction monitoring?
Learn how transaction monitoring works, why it's important, and more.

What is government ID verification?
Learn how government ID verification works, how it's evolving, and more.

What is identity fraud?
When someone uses a different identity to commit a crime, they’re engaging in identity fraud. Learn how to protect your business..

International KYB: Everything global businesses need to know
Learn what Know Your Business is, the unique challenges of addressing it on a global scale, and some of the laws governing KYB requirements around the world.

eIDV: A better way to protect your business and customers
Discover how to prevent fraud, streamline business operations, and increase conversions by electronically verifying your customers’ identities.

Marketplace fraud: The cost of inaction
Learn about the different types of marketplace fraud — and the negative repercussions that can happen when you don’t proactively prevent marketplace fraud on your platform.

Capture more fraud with less effort using link analysis via Persona Graph
Proactively stop hard-to-catch fraud in its tracks with Persona

Bring your identity verification global with Persona
Verify more users with higher assurance — wherever they are

3 tips for managing risk without sacrificing user experience
Get tips for balancing risk and conversion in your business, learn about emerging trends in the identity space, and more.

Identity management in digital health: protecting patient identities
How can organizations protect their patients and secure private health information? Learn how to master identity management in healthcare.

Why to assemble a trust and safety team for your organization
With instances of fraud on the rise, it's paramount for organizations to assemble trust and safety teams that are equipped to meet modern security demands.

Understanding and implementing FATF’s 40 Recommendations
Learn how FATF's 40 Recommendations to combat money laundering can impact your policies.

Get the best out of both worlds: How thoughtful manual review can enhance your automations
While it may be possible to completely automate your business’s fraud detection processes, it shouldn’t necessarily be your goal to do so. Learn why.

Why your business needs flexible identity infrastructure
Identity verification isn’t one-size-fits-all. Learn how a flexible identity infrastructure can help your business be more resilient.

What is the INFORM Consumers Act?
The INFORM Consumers Act is a law aimed at restricting online shopping fraud, while the SHOP Safe Act is a bill with the same goal. Learn more.

Understanding customer Source of Funds (SOF) and Source of Wealth (SOW)
Understanding the source of your customers’ funds and wealth is a crucial aspect of KYC and AML.

How device fingerprinting catches suspicious actors
Device fingerprinting is an effective way for organizations to catch suspicious actors in their tracks. Learn how you can apply it.

Link analysis: How can it help you spot fraud?
Link analysis is a method of analyzing data that allows you to study relationships that aren't visible in raw data. Learn more.

The most mind-blowing money laundering statistics of 2023
Learn more about the scale of this widespread problem.

NFC e-passport verification guide
NFC technology allows for a more secure identity verification process while improving usability. Learn how it works.

How match requirements allow you to fine-tune your IDV processes
Setting name match requirements is an important part of the identity verification process. Learn more about why it’s important to get them right.

What is Know Your Customer’s Customer (KYCC)?
KYCC is a powerful way to protect your reputation and guard against financial crimes.

Mobile KYC: How will it transform compliance?
Improve your verification processes with mobile KYC.
.png)
Student identity verification: How educational institutions can improve their IDV
In an increasingly digitized education space, student identity verification is becoming essential. Learn how it works.

A better customer verification process: How Persona is paving the way with NFC, mDL, and other new technologies
The verification process has never been more efficient thanks to the deployment of new technologies.

Global KYC: A KYC breakdown by countries
Learn how KYC regulations differ by country.

What is reverification, and why does it matter?
Establish trust with your users by implementing reverification at key touchpoints.

Understanding Ultimate Beneficial Owner (UBO) checks
Learn about this essential step in managing your risk and complying with AML regulations.

Power all of your identity operations with Persona's identity infrastructure
Businesses can build and unite any part of their identity operations with Persona’s configurable building blocks.

Document verification: Understanding the whole process
See how document verification works and how it can benefit your business.

Credential stuffing vs. password spraying
Learn how these two attacks differ and how to protect your business.

What is account creation fraud?
Learn what account creation fraud is, what it can look like, how it typically works, and how to protect your business and legitimate users.

What is marketplace fraud, and how do companies stop it?
Explore the different types of marketplace fraud and learn how to mitigate marketplace fraud in your business.

Web3 could be huge: How it handles trust and identity will be critical
Web3 just might be able to bridge the gap between an individual’s physical identity and their digital identity.

What is a Customer Identification Program (CIP)?
Learn what a CIP is, how it works, and what requirements CIPs need to meet.

Red Flags Rule: Your business’s role in preventing identity theft
The Red Flags Rule requires businesses to create a plan to identify and prevent identity theft. Find out who this rule applies to and how to comply.

Persona achieves ISO 27001 certification
Learn what this certification means for you and what's next.

Persona named one of the best authentication solutions by Cybernews
See what sets Persona apart from other solutions.

What are suspicious activity reports (SARs)?
Financial institutions must use suspicious activity reports (SARs) to report questionable activity to the appropriate body for legal investigation
.png)
CDD vs EDD: What’s the difference?
Explore how CDD and EDD work and learn when each is necessary.

New at Persona: Mobile driver's license (mDL) verification via Apple Wallet
Organizations that obtain Apple's entitlement will be able to accept mobile driver’s licenses (mDLs) as a form of identification within Persona’s verification flow.

What is identity verification (IDV)?
Learn what IDV is, explore how it works, and take a look at the different types of identity verification you may choose to leverage in your business.

Mobile driver’s licenses (mDLs) and your business
Take a closer look at what mobile driver’s licenses are, how they work, and the use cases they may present for your business.

What is selfie identity verification, and how does it work?
Learn about selfie identity verification and liveness detection, how they work together, the challenges they address, and their shortcomings.

What is Combating the Financing of Terrorism (CFT)?
By implementing procedures to combat the financing of terrorism, you can protect customers and help make the world a safer place.

Let's get Personal: Meet Khadija!
Learn more about Khadija, a member of our customer experience team who loves solving problems and helping customers get the most out of our product.

Know Your Business (KYB) 101
Learn what KYB is, why it matters, who needs it, and more.

How to build a Know Your Business (KYB) process
Learn what to consider when building a KYB process, what metrics to think about, what to look for in a KYB vendor, and more.

What does the Know Your Business (KYB) process look like?
Learn how businesses usually conduct KYB, why the process is often challenging, and more.

How corporate KYC can reduce fraud and increase trust
Discover what corporate KYC is and how it can protect your business.

Why does KYC matter for fintech companies?
Whether you offer a lending product or investing service, if you're a fintech company, you need to comply with KYC regulations.

How do AML regulations apply to crypto exchanges?
If your business operates in the crypto space, it’s critical that you understand the tenets of AML so you can take the requisite steps to meet regulatory requirements.

AML tools: What to look for in AML software
Learn about the different features you may want to look for as you build your AML toolkit.

Why automated adverse media screening is essential for AML
Negative news checks are an essential but complex process. Protect your business from reputational risk with an automated screening solution.

Global AML compliance: Is your business doing enough?
Discover some of the regulations and protocols you’ll need to know and remember when conducting business internationally

What is eKYC?
Take a look at the different signals that eKYC can take advantage of and review the benefits that eKYC offers both businesses and their customers.

Build onboarding flows that convert with Dynamic Flow
Customers like LedgerX and Coursera drive conversion at every screen with Dynamic Flow.

Let's get Personal: Meet David!
Learn more about David, our people operations business partner who loves to drive company-wide initiatives, but doesn’t have a license to drive a car.

KYC for online gaming (iGaming)
Learn about the KYC requirements that impact the online gaming (iGaming) industry, which includes online sports betting, poker betting, video game betting, and casino gaming.

What is the Bank Secrecy Act?
Learn about the Bank Secrecy Act's requirements and how the law could impact your business.

How to protect your business with automated sanctions screening
It’s illegal to do business with a sanctioned entity, but sanctions screening is complicated. Here’s how to protect your business & comply with AML regulations.

Onboard businesses faster with Persona's automated Know Your Business (KYB) solution
Get everything you need to automatically onboard, verify, and investigate the businesses you partner with and the individuals behind them.

The importance of KYC for online gambling
Learn more about the growing risks for online casinos and gambling apps, the evolving regulatory landscape, and what companies can do to stay compliant.

Let's get Personal: Meet Ali!
Learn more about Ali, one of our amazing solutions engineers who always has his hands tied up in a bunch of different projects.

Decentralized exchanges and KYC
It's important for decentralized exchanges to get ready for KYC and AML regulations now so they will be prepared if and when they find themselves subject to the rules.

What is KYB, and why does it matter?
If you work with other companies, you may be required to implement KYB verification. Learn more.

5 best practices for securing health data
Healthcare organizations must prioritize data security to protect patient information and ensure regulatory compliance. Learn how.

Should a private company own taxpayer data?
Recent controversies involving the IRS’s use of third-party ID verification service providers raise an important question: What’s the right way to handle identification of taxpayers online?

Cybercrime statistics worldwide
Cybercrime is more common than ever. Learn about the most common types of cybercrimes, most attacked industries, and more.

Reimagine your manual review process with Persona Cases
Cases gives your team a single place to control, customize, and optimize your entire manual review process.

NFT money laundering and AML compliance
Learn more about non-fungible tokens, why they're appealing to criminals, and how to reduce the risk of money laundering via NFTs.

What are issuing database verifications?
Issuing database verifications are one of the best ways to reduce fraud in your business. Learn more.
.png)
What will the post-Covid fraud landscape look like?
Learn about the risk areas anti-fraud professionals are most concerned about — and how to protect your business.

What is a politically exposed person (PEP)?
Learn what PEPs are, why your business should screen for them, and how Persona can help.
.png)
Identity verification: a crucial component of customer experience
Friction during IDV can create a poor user experience that can break trust with your customers. This is why IDV must fit each unique situation and user.
Ready to get started?
Get in touch or start exploring Persona today.
Subscribe to Verified with Persona
Learn more about new privacy regulations, KYC/AML, and how to improve the identity experience for users.