Resources / Blog / Author

Sarah Hunter-Lascoskie

Sarah Hunter-Lascoskie

Sarah Hunter-Lascoskie serves as the marketing content manager at AuthenticID. With over 10 years of experience in diverse facets of B2B, the nonprofit sector, and business services, she turns big picture strategy into reality.

Sarah Hunter-Lascoskie serves as the marketing content manager at AuthenticID. With over 10 years of experience in diverse facets of B2B, the nonprofit sector, and business services, she turns big picture strategy into reality.

mdl mobile driver's license

We take a look at the rise of mobile driver’s licenses (mDLs), how widely they’ve been adopted so far, and what future trends for digital identity verification might look like.

kyc know your customer trends for banks and financial institutions

In 2025 and beyond, organizations must rethink how they approach customer identity verifications to keep up with changing regulatory requirements and trends in KYC while ensuring a frictionless experience that supports customer satisfaction.

synthetic shopper with synthetic identity commits identity fraud ecommerce retail

As the digital economy grows, retailers and eCommerce are at a critical juncture: a tipping point where proactive measures could either thwart identity fraud or leave vulnerabilities exposed.

child online age verification rules 2024

We explore the current regulatory landscape for age verification laws, upcoming laws, and the challenges posed by digital identity solutions, helping businesses understand the evolving environment.

We’ll outline the key highlights of 2024 Final Rule for AML requirements for investment advisers, as well as how the rule will impact certain registered investment advisers (RIAs) and exempt reporting advisers (ERAs) in the US below

people on phones sim swap biometric authentication identity verification

Real-time payments (RTP) and instant payments are increasingly popular. But with the growing adoption of real-time payments comes the increased risk of identity fraud.

watchlist screening fraud detection

Fraud watchlists help prevent costly fraud by providing organizations with an early warning signal about who they’re getting involved with.

worried man in front of computer identity fraud

Card Not Present (CNP) fraud is quickly becoming one of the most pressing concerns for businesses, financial institutions, and consumers alike- we discuss what it is and how to prevent it.

biometric authentication verification

What exactly is biometric authentication, and what’s the current consumer sentiment in today’s security landscape? As you continue reading through this article, we’ll touch on both topics in further detail and dive deeper into the future of biometric authentication.

bad actors fraudsters are often organized crime or opportunists

In this guide, we’ll examine the different types of fraudsters and emerging tactics and threats to be aware of so you can stay safe and protect your data online.

fake id passport ai technology

The hope is that everyone can use advanced technology like artificial intelligence (AI) responsibly, but this simply isn’t the reality. Case in point–the spike in hyperrealistic fake IDs being made by bad actors with the help of AI.

By prioritizing an identity-first approach, organizations can identify and address potential security threats before they escalate, minimizing the impact of cyberattacks. Taking proactive measures to verify identities is essential and contributes to a more robust risk management framework.

gig economy worker

Gig economy users on either side of the marketplace can become victims of fraud. Take a look at the current state of fraud and trust in the gig economy, and how more robust identity verification systems can help.

people on phones sim swap biometric authentication identity verification

The rising prevalence of SIM swapping incidents underscores the need for more robust identity proofing processes and enhanced security measures in the telecommunications industry.

synthetic shopper with synthetic identity commits identity fraud ecommerce retail

ECommerce sellers face new threats: synthetic identity fraud and synthetic shoppers threaten retailers across multiple channels- discover how to combat this fraud.

Sophisticated cybercriminals are constantly dreaming up ways to breach that initial wall and gain access to the goods — customer data. Learn how account takeover protection can shield against fraudsters and ATO attacks.

Know-your-customer (KYC), sometimes called know-your-client, processes are familiar among banks and financial institutions as they’re a regulatory necessity in the industries. They often involve a mix of physical documentation-based and electronic methods for document verification and customer identification to reduce financial crime. Electronic know-your-customer (eKYC) takes KYC a step further by digitizing the entire process … Read more

what is friendly fraud and how can you combat it

Guard against friendly fraud and chargebacks. Learn about credit card fraud prevention, dispute resolution and protecting your business and customers.

minor access to website age verification regulations for businesses

Age verification not only maintains regulatory compliance but also keeps users safe online and creates an atmosphere of trust. From fines to damages to brand reputation and more, companies can’t take the risk of anything less than full compliance with age-related regulations.

online gaming gambling identity verification

With Know Your Gamer (KYG) policies, gaming companies can accurately verify the identities of those who are active on their sites. By implementing identity verification platforms, these companies can lessen their exposure to bad actors who want to sabotage the game or are looking to defraud the platform or other players.