Fraudsters often play the role of a shape-shifting phantom, piecing together bits of personal information from various sources to create synthetic identities. They take over accounts, perform other malicious acts, and then vanish as quickly as they appeared, leaving behind remnants of their destruction.
Fraudsters are relentless and ever-evolving. Luckily, so is your team when leveraging IDVision with iovation’s fraud prevention tools to their fullest potential.
Our Email and Phone Verification solution gives you more insights per transaction, all within our robust device-based reputation technology. Providing additional vectors to detect fraud, email and phone number verification can reduce your risk and protect your organization without adding friction for your good customers.
What’s in an email?
A new email address is a key indicator of fraud. In fact, 32% of new email addresses are used for fraudulent transactions. We can positively identify 96.5% of all email addresses submitted to our system1 and will provide the date in which our system first encountered this address. Then we flag potential risks on any transaction, even if it’s coming from a new account or device.
Beyond the age of the email, our service provides a unique and valuable normalization tool to thwart fraudsters attempting to avoid detection by using special characters in their email address. You can learn if the email is valid, how frequently it appears on sites across the network, and how popular it is on those sites. When analyzed all together, these email characteristics give your team valuable insights for distinguishing between active good customers and the suspicious behavior of fraudsters.
The power of a phone number
Anomalous behaviors of phone numbers should also raise a red flag for potential risk. The Phone Number Risk Score takes into account several indicators including previous fraudulent activity and other attributes such as carrier, SMS capability, and phone type.
The Phone Number Risk Score also detects odd traffic patterns. For example, if a single phone number requests a passcode in five different languages within the same week, this may indicate that the phone is being shared. Velocities can also flag suspicious behavior, such as a particular number or range of numbers showing up repeatedly on one or more web services within a relatively short time frame.
Protection at critical transaction points
Identify the risk associated with an email or phone number to add an extra layer of insight at critical points.
- Account origination: New emails are commonly used for synthetic identity fraud. Assess the risk of submitted email and phone fields at account creation to distinguish the deceptive fraudsters from your good customers.
- Account management: Account takeover attacks frequently attempt to change key contact fields. Check the phone or email details on an account before any account changes are made.
- Checkout: Shipping fraud and payment fraud attacks commonly use new email addresses and burner phone numbers. Evaluate the risk of the email or phone number at checkout, especially on guest purchases.
One vendor. One API.
Unlock all of this data within our device-based reputation software without any need for additional integration or resources. Email and Phone Verification is a new add-on feature that feeds into the same API that is already gathering device data for fraud detection, giving you comprehensive fraud detection with a single vendor and a single API.
Now you can centralize your fraud detection, refine your ability to recognize fraud, and expedite the acquisition of valuable new customer accounts.
1Based on TransUnion’s experience with North America customers