GovLoop

5 Ways for Government to Modernize Identity Proofing

network cables and hub in data room

This blog post is an excerpt from GovLoop’s recent industry perspective, “Modernizing Identity Proofing in Government.” GovLoop spoke with Keir Breitenfeld, Senior Business Consultant from Experian Fraud and Identity Solutions, to discuss the primary challenges of identity proofing in the public sector and what modernization of identity proofing looks like. Download the full report here.

The sheer range of fraud tactics can impede agencies from achieving security. These threats must be met with a variety of identity-proofing and management tactics. Without monitoring, performance assessments, and tuning, a singular and static identity proofing strategy can be exposed by evolving schemes and the usage of high quality compromised identity data. Traditional verification and validation parameters alone are simply too obtuse and can be easily circumvented by those with criminal intent.

Static rules based on overly simplistic verification and validation checks can easily be circumvented by intelligent fraudsters,” Breitenfeld said. “Conversely, those same static rules must also have built in mechanisms to accommodate true name users that may not initially meet that criteria for identity proofing.”

Vast and diverse populations, heavy regulations and operational as well as data silos all pose significant challenges for government. But there are ways for government to successfully modernize identity proofing.

Modern Fraud & Identity Strategies

There are many emerging trends and best practices for modern fraud and identity strategies, including:

The future of identity proofing in the public sector is more than just verifying individual identities. Government must now use risk-based approaches and mitigation strategies to quickly identity threats and determine the type of fraud before damage is done.

Exit mobile version