Who Are You to Ask Me Who I Am? Two Party Authentication is a Must

Image Source: Article

Image Source: Article

I think we are all well aware of how the trust chain is broken in fraud, even how that applies to cyber-crime. Scam email, phishing, click fraud, there are lots of ways to trick consumers into giving personally-identifiable information (PII) to the wrong people. We have some technologies and processes that have developed over time to deal with some of these issues of identification for both customer and consumer. I would like to address a gap in the trust chain.

Read the full article