Blog
Buyer’s guide to identity verification solutions
Learn what to look for in identity verification solutions, how to assess effectiveness and cost, and more.

DAC7 compliance: What is it, and who does it impact?
See how DAC7 impacts businesses, consumers, and governments, and understand what you need to know to stay compliant. Learn how Persona can help.

LLMs + fraud: How criminals use large language models to commit fraud
Large language models (LLMs) have a lot of potential to be used for fraud. Learn how fraudsters have added this and other AI programs to their toolkit.

Trust & safety in the age of AI
LLMs and other types of generative AI have the potential to destroy customer trust in your marketplace or platform. Learn more about the risks and solutions.

AI promo abuse: How to prevent online promotion fraud
Promo abusers are using AI to scale their efforts. Learn how to protect your business.

AI phishing attacks: What you need to know to protect your users
Phishing has become more sophisticated thanks to AI. Learn more.

KYC requirements and regulations in Mexico: A comprehensive guide
KYC procedures in Mexico keep evolving to meet stringent regulatory requirements. Learn more.

What is a money services business (MSB)?
A money services business (MSB) is any business that converts, transmits, or exchanges money. Learn more.

What is Know Your Transaction (KYT), and why does it matter?
KYT is an AML tactic that monitors customers’ transactions for suspicious activity to help prevent financial crimes. Learn more.
.png)
How RegTech can help streamline AML programs and compliance
RegTech solutions can help financial institutions comply with anti-money laundering (AML) regulations. See how.

HIPAA compliance for identity verification
Learn how to safeguard patient information and meet regulatory requirements.

What are AI-generated selfies?
Learn how fraudsters are using AI-generated selfies to slip past verification systems — and what you can do to protect your business from this new threat.

A comprehensive guide to KYC in Australia
Non-compliance with KYC in Australia can lead to severe penalties and sanctions. Read how Persona helps businesses comply with identity requirements.

Know Your Customer (KYC) requirements & regulations in the UK
Learn about KYC requirements that exist for different industries in the UK.
.png)
AML case management: What is it, and why is it important?
Learn the most effective strategies, technologies, and best practices for effective AML case management

Let's get Personal: Meet Poornima
Learn more about Poornima, a customer success manager who is passionate about our #pets Slack channel and critiquing Architectural Digest home tours.
.png)
AML for the real estate sector: Risks and best practices
Learn why and how criminals use real estate to launder money — and which regulations and programs can help stop them.
.png)
AML and AI: How machine learning can help prevent money laundering
Explore how artificial intelligence (AI) technologies revolutionize anti-money laundering (AML) processes, thereby enhancing fraud detection, risk assessment, and compliance measures.

How to protect your business against generative AI fraud
Even ChatGPT’s founder is concerned about generative AI fraud. See why and learn how to fight deepfakes.

What is a risk-based approach to AML?
Embracing a risk-based approach to AML gives you the flexibility to determine what AML and KYC processes are right for your business.
.png)
Streamline your identity verification processes with a unified identity platform
Unified identity platforms provide all of the services, tools, and processes businesses need to perform comprehensive identity verification.

What to know about the 6 EU Anti-Money Laundering Directives (AMLDs)
Explore the key components of AMLD and discover how it helps combat money laundering and terrorist financing activities in the EU.

Key AML laws and regulations in the US
Learn about the history of AML laws in the US, the key components of the laws, and how you can create a compliant AML program.

Persona obtains PCI DSS certification.
Learn what this certification means for you and what's next.

Trust and safety: How it helps create a better online marketplace
Learn about the different risks marketplaces may face— and how to mitigate risk on your platform.
.png)
Webinar recap: Align product and compliance to achieve long-term growth
Check out the key insights from Persona's webinar with Bond on optimizing collaboration between product and compliance teams.

Top AML fines and penalties businesses should know
Read about which AML violations levy the biggest penalties, examples of recent AML fines, and more.

The Anti-Money Laundering Act of 2020 (AMLA) explained
Discover the key provisions and impact of the AML Act of 2020, aimed at combating money laundering and protecting financial systems.

Let's get Personal: Meet Lauren
Learn more about Lauren, our events and brand lead who enjoys skiing, watching Formula 1 races, and collecting disco balls.
.png)
KYC and AML differences: What you need to know
Discover the differences between KYC and AML — and their significance in financial regulations.

Introducing Personally: the Persona Community podcast
Ed, Persona's head of community, shares the inspiration behind our new podcast, previews some of this season's guests, and more.

Customer data protection: How online marketplaces can secure user data
To operate a marketplace, you need to collect and store a lot of personal information about your users. Learn how to keep it safe and secure.
.png)
How age verification systems can help you prepare for CA AADC
There are several steps you can take to prepare for CA AADC before 2024, including internal research, DPIAs, and implementing age verification tools.

People first: An inside look into Persona’s culture
See why our team makes Persona a great place to work.
.png)
AML risk assessments: What are they and how do they work?
AML risk assessments are an essential part of implementing a risk-based strategy as required by law. Learn more.
.png)
Phone verification: An important part of identity verification and fraud prevention
Learn how you can use various phone-related checks to help assess risk, confirm identities, and stop bad actors

What is auction fraud: Protect your business from online scams
Learn about the different types of auction fraud and how they can impact your business.

What is simplified due diligence (SDD)?
Simplified due diligence is a low-friction identity verification process applied to customers who have a low risk of money laundering. Learn more.

Top cryptocurrency theft statistics of 2023
See how cryptocurrency thefts occur, dig into the biggest heists of all time, and get some tips for protecting users.

How email verification can help you confirm identities and prevent fraud
Email verification can help keep your business safe by uncovering suspicious activity. Learn what email verification is and how it can help you.

RegTech: Both a necessity and a differentiator
RegTech can transform compliance from simply a requirement to a point of differentiation. See how.

Sponsor banks & Banking as a Service: The importance of choosing the right tech vendors
BaaS allows fintechs to offer financial products and services without acquiring a banking license. Learn more.

Top healthcare data breach statistics of 2023
The healthcare sector is one of the most targeted industries by cybercrime. See some of the stats.

Video KYC verification: What is it, and how does it work?
Video KYC refers to any KYC process that leverages video in some capability. Learn more.

What is Protected Health Information (PHI)?
Learn what protected health information (PHI) is, who’s subject to HIPAA laws around PHI, what identifiers fall under PHI, and more.

Let's get Personal: Meet Jack!
Learn more about Jack, a member of our sales team who is consistently bested in negotiations by his two-year-old daughter.

The role of AML in the financial industry
Financial institutions are required by law to prevent money launderers from using their platforms. Learn more.

What is passport verification?
Learn what passport verification is, how it works, its benefits and drawbacks, and more.

What is KYC remediation?
KYC remediation involves updating customer documents and other information collected through the KYC process. Learn more.

Marketplace fraud prevention: how to fine-tune your current system
Learn how to mitigate marketplace fraud in your business.

What is address verification?
Address verification can help confirm if a person or business is based at the address they provided.

Unusual activity reports (UARs) vs. suspicious activity reports (SARs)
Find out if you should be filing UARs, why they’re used, and how to streamline the reporting process.

AML screening: Why it's important and how it works
AML screening is the process of checking whether customers pose a specific risk of money laundering. Learn more.

5 questions fraud leaders ask about synthetic fraud
3 experts discuss how generative AI might affect synthetic fraud risk, what data to look at to detect fraud, and more.
.png)
Linked fraudulent accounts: A threat and an opportunity
Spotting a fraudster on your platform is like spotting ants in your kitchen. If you see one, there are probably hundreds or thousands hidden behind the wall.

Cloud security in healthcare: Key considerations
Learn about the key considerations in any healthcare cloud security environment.

Know Your Patient (KYP): How to mitigate healthcare fraud
KYP is a necessary measure of protection for all sectors of the healthcare space. Learn more.

Know Your Customer (KYC) vs. Customer Due Diligence (CDD): What's the difference?
Learn what KYC and CDD are, why they're important, how they differ, and more.

Experts weigh in: How to combat synthetic fraud
Get key takeaways from our roundtable discussion on combating synthetic fraud.

Proof of address — what it is and how it works
Proof of address is generally required for organizations that have to comply with KYC regulations and can help companies prevent fraud and offer targeted services.

How marketplaces like Neighbor design trust & safety programs to mitigate and fight fraud
Learn about key moments when fraudsters are likely to strike, Neighbor’s approach to fighting fraud, and more.
.png)
Social Security number (SSN) verification: What it is and why it matters
Learn about common types of SSN verification — plus the potential shortcomings of relying solely on a person’s SSN for verification purposes.

What is driver’s license verification?
Learn about this common way to verify someone’s identity or age.

What is AML transaction monitoring?
Learn how transaction monitoring works, why it's important, and more.

What is government ID verification?
Learn how government ID verification works, how it's evolving, and more.

What is identity fraud?
When someone uses a different identity to commit a crime, they’re engaging in identity fraud. Learn how to protect your business..

International KYB: Everything global businesses need to know
Learn what Know Your Business is, the unique challenges of addressing it on a global scale, and some of the laws governing KYB requirements around the world.

eIDV: A better way to protect your business and customers
Discover how to prevent fraud, streamline business operations, and increase conversions by electronically verifying your customers’ identities.

Marketplace fraud: The cost of inaction
Learn about the different types of marketplace fraud — and the negative repercussions that can happen when you don’t proactively prevent marketplace fraud on your platform.

Capture more fraud with less effort using link analysis via Persona Graph
Proactively stop hard-to-catch fraud in its tracks with Persona

Bring your identity verification global with Persona
Verify more users with higher assurance — wherever they are

3 tips for managing risk without sacrificing user experience
Get tips for balancing risk and conversion in your business, learn about emerging trends in the identity space, and more.

Identity management in digital health: protecting patient identities
How can organizations protect their patients and secure private health information? Learn how to master identity management in healthcare.

Why to assemble a trust and safety team for your organization
With instances of fraud on the rise, it's paramount for organizations to assemble trust and safety teams that are equipped to meet modern security demands.

Understanding and implementing FATF’s 40 Recommendations
Learn how FATF's 40 Recommendations to combat money laundering can impact your policies.

Get the best out of both worlds: How thoughtful manual review can enhance your automations
While it may be possible to completely automate your business’s fraud detection processes, it shouldn’t necessarily be your goal to do so. Learn why.

Why your business needs flexible identity infrastructure
Identity verification isn’t one-size-fits-all. Learn how a flexible identity infrastructure can help your business be more resilient.

What is the INFORM Consumers Act?
The INFORM Consumers Act is a law aimed at restricting online shopping fraud, while the SHOP Safe Act is a bill with the same goal. Learn more.

Understanding customer source of funds (SOF) and source of wealth (SOW)
Understanding the source of your customers’ funds and wealth is a crucial aspect of KYC and AML.

How device fingerprinting catches suspicious actors
Device fingerprinting is an effective way for organizations to catch suspicious actors in their tracks. Learn how you can apply it.

Link analysis: How can it help you spot fraud?
Link analysis is a method of analyzing data that allows you to study relationships that aren't visible in raw data. Learn more.

The most mind-blowing money laundering statistics of 2023
Learn more about the scale of this widespread problem.

NFC e-passport verification guide
NFC technology allows for a more secure identity verification process while improving usability. Learn how it works.

How match requirements allow you to fine-tune your IDV processes
Setting name match requirements is an important part of the identity verification process. Learn more about why it’s important to get them right.

What is Know Your Customer’s Customer (KYCC)?
KYCC is a powerful way to protect your reputation and guard against financial crimes.

Mobile KYC: How will it transform compliance?
Improve your verification processes with mobile KYC.
.png)
Student identity verification: How educational institutions can improve their IDV
In an increasingly digitized education space, student identity verification is becoming essential. Learn how it works.

A better customer verification process: How Persona is paving the way with NFC, mDL, and other new technologies
The verification process has never been more efficient thanks to the deployment of new technologies.

Global KYC: A KYC breakdown by countries
Learn how KYC regulations differ by country.

What is reverification, and why does it matter?
Establish trust with your users by implementing reverification at key touchpoints.

Understanding Ultimate Beneficial Owner (UBO) checks
Learn about this essential step in managing your risk and complying with AML regulations.

Power all of your identity operations with Persona's identity infrastructure
Businesses can build and unite any part of their identity operations with Persona’s configurable building blocks.

Document verification: Understanding the whole process
See how document verification works and how it can benefit your business.

Credential stuffing vs. password spraying
Learn how these two attacks differ and how to protect your business.

What is account creation fraud?
Learn what account creation fraud is, what it can look like, how it typically works, and how to protect your business and legitimate users.

Web3 could be huge: How it handles trust and identity will be critical
Web3 just might be able to bridge the gap between an individual’s physical identity and their digital identity.

What is a customer identification program (CIP)?
Learn what a CIP is, how it works, and what requirements CIPs need to meet.

Red Flags Rule: Your business’s role in preventing identity theft
The Red Flags Rule requires businesses to create a plan to identify and prevent identity theft. Find out who this rule applies to and how to comply.

Persona achieves ISO 27001 certification
Learn what this certification means for you and what's next.

Persona named one of the best authentication solutions by Cybernews
See what sets Persona apart from other solutions.

What are suspicious activity reports (SARs)?
Financial institutions must use suspicious activity reports (SARs) to report questionable activity to the appropriate body for legal investigation
Subscribe to Verified with Persona
Learn more about new privacy regulations, KYC/AML, and how to improve the identity experience for users.