Resources / Blog / Author

Sarah Hunter-Lascoskie

Sarah Hunter-Lascoskie

Sarah Hunter-Lascoskie serves as the marketing content manager at AuthenticID. With over 10 years of experience in diverse facets of B2B, the nonprofit sector, and business services, she turns big picture strategy into reality.

Sarah Hunter-Lascoskie serves as the marketing content manager at AuthenticID. With over 10 years of experience in diverse facets of B2B, the nonprofit sector, and business services, she turns big picture strategy into reality.

library student

igher education institutions have faced a growing fraud challenge: the “ghost student” epidemic. The trend is alarming, worrying education leaders about its potential impacts regarding institutional reputation, academic integrity, enrollment management, financial aid distribution, and more

use velocity checks to help detect and prevent certain types of identity fraud

Velocity checks can help keep merchants and customers safe from fraud loss, all while adding no or minimal friction to the customer experience.

deep fake image for injection attacks

We take a closer look at the rising threat of deepfake photos and videos, where you’re most likely to come across deepfakes, and some tips for spotting them.

mdl mobile driver's license

We take a look at the rise of mobile driver’s licenses (mDLs), how widely they’ve been adopted so far, and what future trends for digital identity verification might look like.

kyc know your customer trends for banks and financial institutions

In 2025 and beyond, organizations must rethink how they approach customer identity verifications to keep up with changing regulatory requirements and trends in KYC while ensuring a frictionless experience that supports customer satisfaction.

synthetic shopper with synthetic identity commits identity fraud ecommerce retail

As the digital economy grows, retailers and eCommerce are at a critical juncture: a tipping point where proactive measures could either thwart identity fraud or leave vulnerabilities exposed.

child online age verification rules 2024

We explore the current regulatory landscape for age verification laws, upcoming laws, and the challenges posed by digital identity solutions, helping businesses understand the evolving environment.

We’ll outline the key highlights of 2024 Final Rule for AML requirements for investment advisers, as well as how the rule will impact certain registered investment advisers (RIAs) and exempt reporting advisers (ERAs) in the US below

people on phones sim swap biometric authentication identity verification

Real-time payments (RTP) and instant payments are increasingly popular. But with the growing adoption of real-time payments comes the increased risk of identity fraud.

watchlist screening fraud detection

Fraud watchlists help prevent costly fraud by providing organizations with an early warning signal about who they’re getting involved with.

worried man in front of computer identity fraud

Card Not Present (CNP) fraud is quickly becoming one of the most pressing concerns for businesses, financial institutions, and consumers alike- we discuss what it is and how to prevent it.

biometric authentication verification

What exactly is biometric authentication, and what’s the current consumer sentiment in today’s security landscape? As you continue reading through this article, we’ll touch on both topics in further detail and dive deeper into the future of biometric authentication.

bad actors fraudsters are often organized crime or opportunists

In this guide, we’ll examine the different types of fraudsters and emerging tactics and threats to be aware of so you can stay safe and protect your data online.

fake id passport ai technology

The hope is that everyone can use advanced technology like artificial intelligence (AI) responsibly, but this simply isn’t the reality. Case in point–the spike in hyperrealistic fake IDs being made by bad actors with the help of AI.

By prioritizing an identity-first approach, organizations can identify and address potential security threats before they escalate, minimizing the impact of cyberattacks. Taking proactive measures to verify identities is essential and contributes to a more robust risk management framework.

gig economy worker

Gig economy users on either side of the marketplace can become victims of fraud. Take a look at the current state of fraud and trust in the gig economy, and how more robust identity verification systems can help.

people on phones sim swap biometric authentication identity verification

The rising prevalence of SIM swapping incidents underscores the need for more robust identity proofing processes and enhanced security measures in the telecommunications industry.

synthetic shopper with synthetic identity commits identity fraud ecommerce retail

ECommerce sellers face new threats: synthetic identity fraud and synthetic shoppers threaten retailers across multiple channels- discover how to combat this fraud.

Sophisticated cybercriminals are constantly dreaming up ways to breach that initial wall and gain access to the goods — customer data. Learn how account takeover protection can shield against fraudsters and ATO attacks.

Know-your-customer (KYC), sometimes called know-your-client, processes are familiar among banks and financial institutions as they’re a regulatory necessity in the industries. They often involve a mix of physical documentation-based and electronic methods for document verification and customer identification to reduce financial crime. Electronic know-your-customer (eKYC) takes KYC a step further by digitizing the entire process … Read more