{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"How to Spot and Prevent Fake Reviews","datePublished":"2022-01-21T12:09:43+00:00","dateModified":"2024-10-02T10:18:36+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/"},"wordCount":1465,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","inLanguage":"en-US","description":"Find out how to spot fake reviews of your business – or even prevent them."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/","url":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/","name":"How to Spot and Prevent Fake Reviews - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","datePublished":"2022-01-21T12:09:43+00:00","dateModified":"2024-10-02T10:18:36+00:00","description":"Fake reviews hurt consumers and businesses. Let’s see how you can spot them – or, better still, prevent them from being written in the first place.","mainEntity":[{"@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/#faq-question-1642758327154"},{"@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/#faq-question-1642758358868"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"WebSite","@id":"https://seon.io/#website","url":"https://seon.io/","name":"SEON","description":"Fraud Prevention &amp; AML Compliance","publisher":{"@id":"https://seon.io/#organization"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Organization","@id":"https://seon.io/#organization","name":"SEON","alternateName":"seon.io","url":"https://seon.io/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/#/schema/logo/image/","url":"https://seon.io/wp-content/uploads/2024/08/seon-full-1.svg","contentUrl":"https://seon.io/wp-content/uploads/2024/08/seon-full-1.svg","width":94,"height":32,"caption":"SEON"},"image":{"@id":"https://seon.io/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/SEON.FraudFighters/","https://x.com/seon_tech"],"description":"SEON is the AI-powered fraud prevention platform for AML, KYC, and identity verification. Leveraging 900+ real-time data signals, SEON provides a unified platform to detect risk, automate decisions, and onboard customers with confidence. Serving fintech, eCommerce, and iGaming, SEON goes live in 14 days on average with the data depth and expert support that resellers and orchestrators can't match.","email":"info@seon.io","legalName":"SEON Technologies Ltd","foundingDate":"2017-01-01","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"201","maxValue":"500"}}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d","name":"Bence Jendruszak","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/03/cropped-Jendruszak-Bence-114_web-min-96x96.jpg","url":"https://seon.io/wp-content/uploads/2025/03/cropped-Jendruszak-Bence-114_web-min-96x96.jpg","contentUrl":"https://seon.io/wp-content/uploads/2025/03/cropped-Jendruszak-Bence-114_web-min-96x96.jpg","caption":"Bence Jendruszak"},"description":"Bence Jendruszák is the COO and Co-Founder of SEON, leading global operations and advancing its mission to make fraud prevention accessible. A Corvinus University of Budapest graduate, he co-founded SEON in 2017 after tackling fraud issues at a crypto exchange. Bence has since scaled SEON into a global leader in fraud and AML solutions, championing innovation, collaboration, and customer focus across fintech, payments, retail, and iGaming.","sameAs":["https://seon.io","https://www.linkedin.com/in/bence-jendruszak/"],"knowsAbout":["AML Compliance","Fraud Prevention","Payment Fraud","Fintech Fraud"],"jobTitle":"COO & Fraud Fighter","url":"https://seon.io/resources/author/kejbence/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/#faq-question-1642758327154","position":1,"url":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/#faq-question-1642758327154","name":"Are fake reviews illegal?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. Writing a fake review is considered to promote unfair trading, which falls under consumer protection laws.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/#faq-question-1642758358868","position":2,"url":"https://seon.io/resources/how-to-spot-and-prevent-fake-reviews/#faq-question-1642758358868","name":"How to spot a fake review easily?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The easiest way to spot a fake review is to look at the poster’s account details and to look for similar reviews written in the same style. You may be looking at organized groups paid to write reviews, which is why the language will be similar.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Buy Now Pay Later Fraud (BNPL): Risks &amp; Prevention","datePublished":"2021-08-13T08:37:19+00:00","dateModified":"2026-04-07T16:13:56+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/"},"wordCount":1456,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Identify high-risk BNPL customers and prevent never-pays. Learn to spot fraud risks with AML and digital footprint data."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/","url":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/","name":"Buy Now Pay Later Fraud (BNPL): Prevention & Risks | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2021-08-13T08:37:19+00:00","dateModified":"2026-04-07T16:13:56+00:00","description":"Learn how to identify high-risk BNPL customers and prevent never-pays. Explore 7 types of fraud risks, digital footprint analysis and AML monitoring tactics.","mainEntity":[{"@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1688398018796"},{"@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1688398038763"},{"@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1775578075628"},{"@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1775578100312"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1688398018796","position":1,"url":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1688398018796","name":"What is BNPL fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"BNPL fraud involves any fraudulent activity related to buy now pay later systems. It typically falls into two silos: fraudsters attacking payment systems using tactics like account takeover and those exploiting onboarding processes. It often works by someone pretending to be someone else to order goods to a drop address they do not intend to pay for.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1688398038763","position":2,"url":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1688398038763","name":"How do you detect high-risk BNPL customers?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The key to detecting high-risk BNPL customers is to monitor transactions and gather data as soon as possible, starting at the onboarding stage. By using robust device fingerprinting, IP address checks and digital footprint analysis, you can find a wealth of information — such as social media profiles or VPN usage — without adding friction to the customer experience.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1775578075628","position":3,"url":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1775578075628","name":"Can an AML transaction monitoring solution prevent BNPL fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. Feeding enriched data into an <a href=\"https://seon.io/products/aml-transaction-monitoring/\" id=\"https://seon.io/products/aml-transaction-monitoring/\">AML transaction monitoring solution</a> allows you to identify risky users through specific custom rules. By looking at sharp increases in spending or suspicious behavioral patterns, the system can spot potential chargeback fraud and money laundering attempts before a customer disappears without paying for expensive items.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1775578100312","position":4,"url":"https://seon.io/resources/buy-now-pay-later-fraud-risks-and-prevention/#faq-question-1775578100312","name":"How does SEON help BNPL companies reduce chargebacks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"SEON prevents chargebacks by identifying high-risk users and stolen credit cards before an account is even created. If a dispute occurs, <a href=\"https://seon.io/use-cases/automated-chargeback-management/\" id=\"https://seon.io/use-cases/automated-chargeback-management/\">SEON’s automated software</a> instantly triggers a response to gather evidence like delivery proof and billing checks. This creates a bank-compliant evidence package to win up to 2x more disputes and protect your bottom line on autopilot.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/psd2-compliance/#article","isPartOf":{"@id":"https://seon.io/resources/psd2-compliance/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"PSD2 Compliance: What Is It &#038; How It Impacts Your Business","datePublished":"2017-02-06T08:56:01+00:00","dateModified":"2024-05-02T10:02:55+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/psd2-compliance/"},"wordCount":1269,"commentCount":0,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/psd2-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2017/02/psd2.png","articleSection":["Article"],"inLanguage":"en-US","description":"Everything you need to know about PSD2 compliance is right here."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/psd2-compliance/","url":"https://seon.io/resources/psd2-compliance/","name":"PSD2 Compliance: What It Is & How It Impacts You | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/psd2-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2017/02/psd2.png","datePublished":"2017-02-06T08:56:01+00:00","dateModified":"2024-05-02T10:02:55+00:00","description":"What to know what PSD2 is and what it means to your business? We discuss risks and benefits, including how PSD2 compliance is essential for avoiding penalties.","mainEntity":[{"@id":"https://seon.io/resources/psd2-compliance/#faq-question-1639131170727"},{"@id":"https://seon.io/resources/psd2-compliance/#faq-question-1639131193600"},{"@id":"https://seon.io/resources/psd2-compliance/#faq-question-1639131215096"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/psd2-compliance/#primaryimage","url":"https://seon.io/wp-content/uploads/2017/02/psd2.png","contentUrl":"https://seon.io/wp-content/uploads/2017/02/psd2.png","width":1401,"height":800,"caption":"PSD2 Eu directive"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/psd2-compliance/#faq-question-1639131170727","position":1,"url":"https://seon.io/resources/psd2-compliance/#faq-question-1639131170727","name":"What is PSD2 in simple terms?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"PSD2, or the Payment Services Directive 2, is an EU regulation designed to improve security, transparency, and competitiveness in the world of European payments and banking.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/psd2-compliance/#faq-question-1639131193600","position":2,"url":"https://seon.io/resources/psd2-compliance/#faq-question-1639131193600","name":"What are the PSD2 requirements?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Under PSD2, financial institutions must allow customers to grant trusted third parties access to their account data for payments and accessing financial products and services. Payment providers must ensure that cardholders are who they say they are. Brokerages must be transparent about exchange rates. Finally, businesses must remove credit card charges. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/psd2-compliance/#faq-question-1639131215096","position":3,"url":"https://seon.io/resources/psd2-compliance/#faq-question-1639131215096","name":"Who must comply with PSD2?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Any company doing business in EU countries or with European customers must adhere to the PSD2 regulations and controls. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/top-five-fraudster-scam-patterns/#article","isPartOf":{"@id":"https://seon.io/resources/top-five-fraudster-scam-patterns/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Top 5 Fraud Patterns that Risk Managers Should Watch Out For","datePublished":"2017-02-21T18:55:47+00:00","dateModified":"2023-03-22T15:05:10+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/top-five-fraudster-scam-patterns/"},"wordCount":606,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/top-five-fraudster-scam-patterns/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2017/02/pattern.png","articleSection":["Article"],"inLanguage":"en-US","description":"Fraud is always related to a purposeful intent committed by a human being utilizing techniques of deception and trickery. Fraudsters are constantly one step ahead of the game, therefore risk managers have to keep up with the most recent fraud patterns. We have collected five crucial scam elements that fraud managers should be aware of.\n\n\nFraudsters use VPNs or bad proxies\nFraudsters commit the primary error of using a VPN or a bad proxy connection throughout a transaction. They use these tools in order to mask their residential IP address, resulting in an anonymous connection. Not all VPN or proxy users are dishonest clients, therefore several other determinants have to be taken into consideration when analyzing a suspicious situation.\nFraudsters use email addresses with no history\nAnother major mistake that fraudsters tend to make is the use of an e-mail address that is rated to be risky. This means that the e-mail address in use lacks any related social media profiles, may be disposable or is blacklisted. Online customers tend to buy products using their personal e-mail address. This means that the address will be registered to at least a couple of social media websites and will most probably not be disposable. In the case of corporate addresses, checking the creation date of the e-mail address and verifying the domain are also relevant factors. Read more about email analysis here.\nFraudsters buy expensive products\nFraudulent users are likely to buy expensive electronic items that can easily be resold at a later time. Solid State Drives (SSD) and Apple products are generally of high demand in the carding community as they have a high resale value. Vouchers and gift cards are also among the most common digital products to be carded as they can easily be resold for digital currency on the dark net markets. Fraud managers should keep an eye out for these types of goods from popping up on the transaction lists.\nFraudsters spend too little time on the website\nOrdinary consumers tend to browse online throughout their shopping experience. They read reviews, check alternatives before actually placing the order. On the other hand, fraudulent users know what they want and specifically place a single item in their shopping cart, the item that is later going to be chargebacked. Time spent on the website is certainly an important factor to watch out for when monitoring for fraudsters.\nFraudsters tend to commit a series of small transactions\nAfter having bought or stolen a fresh list of credit card (CC) information, dishonest users have to make sure that their cards are actually functioning. Generally they validate this by conducting several low value transactions with different cards after one another. The low fees usually don’t trigger chargebacks from the legit account holders as the these transactions are not conspicuous. It is best to watch out for numerous low fee transactions taking place in a sequence.\n\nFraudsters are using sophisticated methods in order to harm businesses. This results in high manual review times and massive chargeback rates. Nowadays it is crucial for online merchants and payment service providers to rely on third party assistance in order to mitigate their transaction related risk.\n\nThe fraud management system of SEON enables online businesses to gain a deep insight into their transactional fraud patterns. It is vital for fraud managers to use a custom tailored risk scoring solution that enables them to improve their bottom line and boost their conversion rates. If you want to deep dive into the fraud analytics world, you could download our guide to fraud analytics in 2023."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/top-five-fraudster-scam-patterns/","url":"https://seon.io/resources/top-five-fraudster-scam-patterns/","name":"Top 5 Fraud Patterns Risk Managers Should Look Out For","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/top-five-fraudster-scam-patterns/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2017/02/pattern.png","datePublished":"2017-02-21T18:55:47+00:00","dateModified":"2023-03-22T15:05:10+00:00","description":"What are the top five fraud patterns that risk managers should watch out for? What are the telltale signs that you are dealing with a fraudster?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/top-five-fraudster-scam-patterns/#primaryimage","url":"https://seon.io/wp-content/uploads/2017/02/pattern.png","contentUrl":"https://seon.io/wp-content/uploads/2017/02/pattern.png","width":1401,"height":800,"caption":"Fraud patterns"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/psychology-of-fraudsters-101/#article","isPartOf":{"@id":"https://seon.io/resources/psychology-of-fraudsters-101/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Psychology of Fraudsters 101","datePublished":"2017-03-21T09:53:38+00:00","dateModified":"2022-03-22T13:18:39+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/psychology-of-fraudsters-101/"},"wordCount":630,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/psychology-of-fraudsters-101/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2018/01/fraud.png","articleSection":["Article"],"inLanguage":"en-US","description":"Fraudsters can be broken down into two groups based on their behavior: swindlers and impersonators. A swindler is a valid user who purposefully harms the system or the users by applying a technique of misleading. An impersonator is an invalid user who steals the identity of their victims by account theft.\n\nA friendly fraud for example, is conducted by an offender who misleads the organization into thinking that they never received an ordered product. Therefore, the firm is conned into sending a second order or into refunding the swindler.\n\nOn the other hand, an impersonator may deceive a business by using stolen credit card information in order to conduct fraudulent orders. You can read more about ecommerce related fraud in our ebook about chargebacks.\nWhat drives fraudsters to commit crimes?\nThe intrinsic drive to committing fraud may be explained by two simple factors of greed and dishonesty. Although, the case is not this simple as scientists still have not been able to find precise psychological determinants that would serve as indicators in measuring the motivation for an individual to commit fraud. Monetary burdens are factors of motivation in almost every type of fraudulent activity.\n\nThis leads to the point that in several cases, building wealth may be a matter of ego for individuals. Some may consider that when getting rich is a megatrend, to go by any opportunity of becoming prosperous may be considered missing the boat. Another source of motivation may be a choice of a hectic lifestyle filled with drugs, drinking and casinos.\nDo fraudsters have feelings?\nAccording to the hypothesis of 3B’s (babes, booze and bets), the constant stressful effect of the combination of these frantic factors may often times push a person to engage in dishonest financial activities. Some scammers pursue the lifestyle for the thrill of manipulation and achieving the final delight of fooling others. An additional element of the behavior of fraudsters tends to be the rationalization of their wrongdoing in order to deal with their self-consciousness.\n\nIt is of natural human behavior to try to justify a wrongdoing. This act can be defined as the “technique of neutralization”, as an individual feels no guilt if they are able to morally rationalize a deed. Furthermore, the delinquents draw a sharp line between those who they will victimize and those who they will not. It turns out that the criminals often admire law-abiding citizens and may even feel resentment towards significant others that are the victims of an illegal act.\nHow can fraudsters sleep well at night?\nThe technique of neutralization varies based on the type of fraud that was committed by the individual. When a fraudulent act is committed against a large firm, the most common type of self- rationalization is the excuse of “they can afford it”. Another common example of a justification is the thought that when an entity or an individual is open for attack, they deserve to be victims. In this case the delinquent associates a factor of negativity, which makes it easier to treat the other party immorally.\n\nAn additional self-rationalization is that everyone does it; therefore the fraudster lifts the self-guilt by justifying the behavior as normal and acceptable. This technique of neutralization is especially valid for cases of tax and insurance fraud, as the hindrance of these acts is considered to be a naïve behavior.\n\nEven though scientists have still not been able to pin-point the exact psychological determinants that motivates a person to commit fraud, greed and dishonesty certainly play a vital role throughout the act. Fraudsters tend to lift the guilt that follows by different techniques of self rationalization. At the end of the day, nobody wants to deal with a self conciousness that would keep them awake at night."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/psychology-of-fraudsters-101/","url":"https://seon.io/resources/psychology-of-fraudsters-101/","name":"Psychology of Fraudsters - Why Do They Commit Crimes?","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/psychology-of-fraudsters-101/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2018/01/fraud.png","datePublished":"2017-03-21T09:53:38+00:00","dateModified":"2022-03-22T13:18:39+00:00","description":"How can fraudsters sleep at night? Do fraudsters they even have feelings? We explore their psychology to understand how to fight them here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/psychology-of-fraudsters-101/#primaryimage","url":"https://seon.io/wp-content/uploads/2018/01/fraud.png","contentUrl":"https://seon.io/wp-content/uploads/2018/01/fraud.png","width":1401,"height":800}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ground-breaking-partnership-to-tackle-the-spanish-market/#article","isPartOf":{"@id":"https://seon.io/resources/ground-breaking-partnership-to-tackle-the-spanish-market/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Groundbreaking partnership to tackle new markets","datePublished":"2018-01-26T12:21:23+00:00","dateModified":"2021-11-17T09:47:32+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ground-breaking-partnership-to-tackle-the-spanish-market/"},"wordCount":307,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ground-breaking-partnership-to-tackle-the-spanish-market/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2018/01/gonet-1.png","inLanguage":"en-US","description":"We are happy to announce our new partnership with GoNetFPI (Fraud Prevention Intelligence). This collaboration will allow SEON to open up towards the Spanish market through a flourishing channel partnership with GoNetFPI. The partnering company is based in Spain, where online retailers suffer an overall loss of 100+ EUR million each year due to consumer fraud. Scam and fraud committed through information and communication technologies ranks the highest amongst cybercrime types in Spain with almost 5000 yearly cases.\n\nGoNetFPI is part of the GoNet group, a global business focusing on providing IT solutions. The company has been a leader in the cybersecurity world for a decade. They offer anti-fraud services and solutions at the most-advanced global level combining intelligence and maximum security. SEON and GoNetFPI will fight together to revolutionize the industry and create a safer environment for online businesses around the world.\nGoNetFPI in Figures\n\n\n40% of Spaniards make Internet purchases every month and online commerce in Spain continues to grow year after year. In parallel online scams are also on the rise. Fraud rates are estimated to account for 0.5-1 percent of the annual turnover for online businesses. Meanwhile around 95 percent of cybercrimes, or offenses related to new technologies, are going unpunished in the country.\n\nIn Spain about 400 cybersecurity incidents occur daily and the consequences can damage important systems and may even completely paralyze an organization. The need for cybersecurity solutions is significant in an environment where the threat landscape is constantly evolving. Especially right now, when the number of attacks is on the rise.\n\nBoth SEON’s and GoNetFPI’s teams are passionate about cybersecurity and are ready to deliver game changing solutions for online businesses. The collaboration of these two companies will bring an even darker future for fraudsters and lead to an overall improvement in the life of e-businesses."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/ground-breaking-partnership-to-tackle-the-spanish-market/","url":"https://seon.io/resources/ground-breaking-partnership-to-tackle-the-spanish-market/","name":"Groundbreaking Partnership to Tackle New Markets - SEON and GoNetFPI","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ground-breaking-partnership-to-tackle-the-spanish-market/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2018/01/gonet-1.png","datePublished":"2018-01-26T12:21:23+00:00","dateModified":"2021-11-17T09:47:32+00:00","description":"We are happy to announce our new partnership with GoNetFPI. This collaboration will allow SEON to open up towards the Spanish market.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ground-breaking-partnership-to-tackle-the-spanish-market/#primaryimage","url":"https://seon.io/wp-content/uploads/2018/01/gonet-1.png","contentUrl":"https://seon.io/wp-content/uploads/2018/01/gonet-1.png","width":1400,"height":800,"caption":"Partnership with gonetfpi"}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab","name":"SEON Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/07/SEON-logo-1.svg","url":"https://seon.io/wp-content/uploads/2025/07/SEON-logo-1.svg","contentUrl":"https://seon.io/wp-content/uploads/2025/07/SEON-logo-1.svg","caption":"SEON Team"},"url":"https://seon.io/resources/author/miklos/"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/news/portfolion-invests-in-cyber-security-press-release/#article","isPartOf":{"@id":"https://seon.io/resources/portfolion-invests-in-cyber-security-press-release/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"PortfoLion invests in cyber security: Press Release","datePublished":"2018-02-15T14:37:38+00:00","dateModified":"2021-03-19T16:01:55+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/portfolion-invests-in-cyber-security-press-release/"},"wordCount":677,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/news/portfolion-invests-in-cyber-security-press-release/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2018/02/portfolion.png","inLanguage":"en-US","description":"PortfoLion and Fiedler Capital are assisting the international expansion of the cyber security startup with a €500 thousand investment.\nUsing the raised funds SEON will be able to open towards new markets and industries.\n\n\nCybercrime damage costs are estimated to soar past $6 trillion annually by 2021. Experts predict that companies will spend over $1 trillion in cybersecurity services from 2017 to 2021 to counterbalance this growing threat. Clearly, cybersecurity will continue to be a major priority for startups and large enterprises alike.\nTamás Kádár and Bence Jendruszák have recognized these trends early on and they didn’t hesitate to establish the company in 2017. SEON’s supercharged fraud prevention system is using Machine Learning to detect fraudulent actions, like credit card fraud, identity theft, account takeover and other abuses. The most common users of SEON’s product are high risk merchants and payment service providers. Contrary to their competitors, SEON’s product is an out-of-the-box solution, because it provides a fully transparent picture of why the surveyed users were given the certain risk classification. With the help of the investment, the Hungarian startup can concentrate on a bigger market and they can gain advantage over their US-based competitors.\nDigital security in all areas of the world has become a key factor. This won’t change in the future either, because cyber security will be a major priority in the economic growth of companies. In parallel the PSD2 regulations have also increased the significance of SEON’s solution and all cyber security services. During SEON’s one year of its existence the startup earned several large international clients and it could constantly extend its team. Due to these facts, PortfoLion also decided -besides the former investors- that the first investment of the OTP Digital Venture Capital Fund will be the cyber security startup. With this collaboration, thousands of companies can create a safe environment for their clients with just a few clicks.\nPortfoLion and OTP Digital Venture Capital Fund\nThe primary investment targets of PortfoLion are early stage fintech and digital technology startups in the CEE region that have already achieved the product-market fit and seek for investment ranging between 100,000 and 1 million euros in size to validate their business model or to develop the product. The OTP Digital Fund was established in 2017 to support OTP group’s digital strategy. PortfoLion’s aim is to support the growth of enterprises in digital technology projects with significant growth potential which can become major players in the digital transformation of the European financial sector in a few years. Investment areas include e-commerce, blockchain, big data, IT infrastructure, financial software, artificial intelligence and machine learning solutions.\nPortfoLion’s principal motivation being significant growth in the value of the enterprises over this time. It treats the existing stakeholders or management as partners, seeking – in collaboration with them – mutual decoupling opportunities at the end of the investment. Through its four VC funds, PortfoLion provides a broad spectrum of support to the enterprises by the challenges in corporate growth and expansion. In addition to the invested capital, PortfoLion provides several opportunities to the selected business like professional knowledge, industry relations and network of the banking group which has presence in 9 countries.\nFiedler Capital is a new seed and early stage venture capital firm that invests in exceptional entrepreneurs from the CEE &amp; Baltic regions building world-changing startups. Fiedler provides cash investments up to €250,000. The CV looks into all verticals, but they have a clear preference for companies with a strong B2B aspect. Fiedler Capital particularly likes platforms, SaaS business models and data analytics.\nFounded in 2000, Fubra is a creative, diverse technology, publishing and investment business with strong values, a committed team and a thirst to create a new future with their partners and clients. Fubra has expanded and grown over the years taking on new challenges and leading the way in technology.  Fubra has the potential to act as an incubator in a joint venture to help startups get to the next level, or alternatively as an equity investor."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/portfolion-invests-in-cyber-security-press-release/","url":"https://seon.io/resources/news/portfolion-invests-in-cyber-security-press-release/","name":"PortfoLion invests in cyber security - SEON press release","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/news/portfolion-invests-in-cyber-security-press-release/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2018/02/portfolion.png","datePublished":"2018-02-15T14:37:38+00:00","dateModified":"2021-03-19T16:01:55+00:00","description":"PortfoLion and Fiedler Capital are assisting the international expansion of the online fraud prevention startup SEON with a €500 thousand investment.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/news/portfolion-invests-in-cyber-security-press-release/#primaryimage","url":"https://seon.io/wp-content/uploads/2018/02/portfolion.png","contentUrl":"https://seon.io/wp-content/uploads/2018/02/portfolion.png","width":1400,"height":801,"caption":"Portfolion by OTP bank"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/gdpr-compliance-in-fraud-detection/#article","isPartOf":{"@id":"https://seon.io/resources/gdpr-compliance-in-fraud-detection/"},"author":{"name":"Christina Brichetto","@id":"https://seon.io/#/schema/person/78a49f752b06e61f2f524036856e0ab7"},"headline":"GDPR Compliance in Fraud Detection &#8211; What You Need to Know","datePublished":"2018-04-20T10:29:50+00:00","dateModified":"2025-08-12T15:27:33+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/gdpr-compliance-in-fraud-detection/"},"wordCount":1436,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/gdpr-compliance-in-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","inLanguage":"en-US","description":"If your company uses Google Analytics, you have probably received a string of emails nudging you to update settings for the upcoming GDPR changes.\n\n\n\n\n\n\n\nThey look pretty serious.\n\n\n\n\n\n\n\n\n\n\n\nGoogle is just one of the many online giants who have been rolling out new terms of services before the new regulation comes into effect. In this post, we’ll see how these changes will affect your businesses, with a special emphasis on your Risk Ops and multi-layered fraud prevention.\n\n\n\nBut first things first:\n\n\n\nWhat Exactly is the GDPR?\n\n\n\nThe General Data Protection Regulation (GDPR) is a law and data protection regulation designed for individuals within the European Union. It builds upon previous EU privacy measures, such as the PSD2 compliance, but is a lot more stringent in a number of ways:\n\n\n\n\nStronger emphasis on user consent: companies will need an explicit statement from users for their data to be collected. It will certainly mean a complete revamping of Terms of Service and the way users interact with your website.\n\n\n\nMore transparency over collected data: users must be able to download all the data a company has gathered on them. This feature has already been rolled out by a number of companies such as Facebook or Google.\n\n\n\nHefty penalty fines: set at 4% of a company’s global turnover (or $20 million - whichever is larger) a violation fine could completely sink a young startup, and put a big dent into an established firm’s net profits.\n\n\n\nWorldwide effect: technically speaking, the GDPR is only enforced for citizens of the European Union. But the global nature of data on the internet means everyone is likely to be affected.\n\n\n\nHard deadline: While there has been a two year transition period since it was adopted, the GDPR comes into full effect on the 25th of May 2018.\n\n\n\n\nWhat Can We Learn From Direct GDPR Quotes\n\n\n\nIf the layman explanation above doesn’t give you all the answers, please read the terms as directly quoted from the regulation documents. They provide fantastic clues as to what is clearly defined, and what gives room to interpretation.\n\n\n\nWhy the GDPR exists:\n\n\n\n“The processing of personal data should be designed to serve mankind” – Recital 4\n\n\n\n\"The scale of the collection and sharing of personal data has increased significantly. Technology allows both private companies and public authorities to make use of personal data on an unprecedented scale in order to pursue their activities.\" – Recital 6\n\n\n\n\"Natural persons should have control of their own personal data.\" – Recital 7\n\n\n\nHow the GDPR defines personal data:\n\n\n\n\"Any information relating to an identified or identifiable natural person; an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person\" – Article 4 (1)\n\n\n\nWhat are considered Online Identifiers:\n\n\n\n\"Natural persons may be associated with online identifiers provided by their devices, applications, tools and protocols, such as internet protocol addresses, cookie identifiers or other identifiers such as radio frequency identification tags. This may leave traces which, in particular when combined with unique identifiers and other information received by the servers, may be used to create profiles of the natural persons and identify them.\" – Recital 30\n\n\n\nOne important concept is the GDPR is that of user consent. It is defined as follows:\n\n\n\n“Any freely given, specific, informed and unambiguous indication of the data subject’s wishes by which she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to her” – Article 4 (11)\n\n\n\nFinally, one of the most contentious points of the GDPR, is the idea that one legal basis for processing data is that of legitimate interest. This is how we get a better idea of what it means:\n\n\n\n\"legitimate interest could exist for example where there is a relevant and appropriate relationship between the data subject and the controller in situations such as where the data subject is a client or in the service of the controller.\" – Recital 47\n\n\n\n\"The processing of personal data strictly necessary for the purposes of preventing fraud also constitutes a legitimate interest of the data controller concerned. The processing of personal data for direct marketing purposes may be regarded as carried out for a legitimate interest.\" – Recital 47\n\n\n\nHowever, there are a few caveats:\n\n\n\n\"provided that the interests or the fundamental rights and “freedoms of the data subject are not overriding\"\n\n\n\n\"a data subject can reasonably expect at the time and in the context of the collection of the personal data that processing for that purpose may take place\" – Recital 47\n\n\n\nHow the GDPR Will Impact the Fraud Industry?\n\n\n\nFraud detection and Risk Ops cannot exist without user data. Some legacy platforms have built their entire system on the ability to share fraudsters’ data to prevent their next actions. This is true whether you want to protect yourself from payment gateway fraud, or to prevent chargeback fraud.\n\n\n\nIn short, if you have yet to choose an anti fraud solution, you should seriously consider the following points:\n\n\n\nHow and why is the data collected:We’re really talking about data quality here. Is it relevant - and justifiably so? Will your company get in trouble for sharing information with the fraud vendor if it is deemed necessary?\n\n\n\nAre the terms of service clear and transparent:Your company’s TOS need to be updated. But what about those of the fraud vendor? Do they take into account right of access without sacrificing efficiency?\n\n\n\nWhat is the retention period:In compliance with the “right to be forgotten”, the data cannot be kept indefinitely. Organizations must ensure information not directly related to fraud isn’t kept for longer than necessary.\n\n\n\nHow safe is the data:Just because fraud detection falls under the umbrella of cybersecurity does not mean the company employs the best practices. Can they guarantee breach prevention as well?\n\n\n\nHow SEON Complies With the GDPR \n\n\n\nAt SEON, we have been fully aware of the GDPR and other regulations such as PSD2 since their inception. This has allowed us to plan accordingly, and to ensure our entire solution was designed around compliance to this new regulation.\n\n\n\nListed below are some of the FAQs we have answered for clients. Feel free to contact us for any additional information.\n\n\n\nMust SEON comply with the GDPR?\n\n\n\nAbsolutely. Our infrastructure including servers and databases are based in the EU (Dublin, Ireland), which we can confirm via certificate.\n\n\n\nCan SEON legally process data?\n\n\n\nYes. We are registered as a data processor at the Hungarian National Authority for Data Protection, and you'll find that detecting fraud is a legal basis for processing data according to the GDPR.\n\n\n\nCan I share user data with SEON?&nbsp;\n\n\n\nWe recommend your TOS should inform their clients about data processing for fraud management services. We are happy to help you draft this document as needed.\n\n\n\nWhat is the data retention policy?&nbsp;\n\n\n\nWe make it very clear that our client data can be stored for up to 1 year, and can be easily purged upon request using our Erase API.\n\n\n\nHow safe is the data I share with SEON?&nbsp;\n\n\n\nAt SEON, we are proud to have an appointed Data Security Officer. The role oversees security and ensures only our Head of Engineering has access to the production database (through dedicated, whitelisted VPN and encrypted keys).\n\n\n\nWhat happens if there is a breach?\n\n\n\nIn the unlikely event that data is hacked, SEON’s standard agreement includes taking responsibility for data privacy, so you can use the platform with complete peace of mind.\n\n\n\nGDPR Compliance in Fraud Detection\n\n\n\nWhile the GDPR would indeed seem to increase users’ online privacy, it inevitably raises a number of questions. Will it actually have a positive effect? Will it lengthen manual reviews? Make things harder for companies - especially small ones who may fall foul of EU regulators? And who will take to blame if data is breached between different data-sharing services?\n\n\n\nWhatever the future holds, there is no doubt the GDPR will profoundly reshape the Internet and customer risk assessment as we know it. Companies in all verticals will need to rethink the way they operate on a daily basis, particularly advertisers, publishers and fraud vendors.\n\n\n\nHopefully, your solution has already taken every step to ensure compliance and will train fraud managers accordlingly - if not, we can only recommend you stay as educated about the GDPR as possible as it comes into effect."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/gdpr-compliance-in-fraud-detection/","url":"https://seon.io/resources/gdpr-compliance-in-fraud-detection/","name":"GDPR Compliance in Fraud Detection & Prevention | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/gdpr-compliance-in-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","datePublished":"2018-04-20T10:29:50+00:00","dateModified":"2025-08-12T15:27:33+00:00","description":"Data protection is a touchy subject in the world of risk. Let's see how your vendor should ensure GDPR compliance in fraud detection.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/gdpr-compliance-in-fraud-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/78a49f752b06e61f2f524036856e0ab7","name":"Christina Brichetto","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/06/cropped-Christina-Brichetto-96x96.jpg","url":"https://seon.io/wp-content/uploads/2025/06/cropped-Christina-Brichetto-96x96.jpg","contentUrl":"https://seon.io/wp-content/uploads/2025/06/cropped-Christina-Brichetto-96x96.jpg","caption":"Christina Brichetto"},"description":"Christina Brichetto is a Senior Product Marketing Manager at SEON, with experience scaling impact at startups and global financial institutions. She has launched category-defining products across fintech, blockchain, and fraud prevention. A 3x founding PMM and former Senior PMM at J.P. Morgan’s Kinexys, she brings deep expertise in positioning and narrative design. At SEON, she led the 2025 Digital Fraud Outlook and won the 2024 Revenue MVP award. Christina holds dual degrees in Business and Economics and multiple marketing certifications.","knowsAbout":["AML Compliance"],"jobTitle":"Sr Product Marketing Manager","url":"https://seon.io/resources/author/christinabrichetto/"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/3-signs-of-high-fraud-targets/#article","isPartOf":{"@id":"https://seon.io/resources/3-signs-of-high-fraud-targets/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"3 Signs You Might be a High Target For Fraudsters","datePublished":"2018-05-15T01:37:34+00:00","dateModified":"2025-04-03T09:25:08+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/3-signs-of-high-fraud-targets/"},"wordCount":716,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/3-signs-of-high-fraud-targets/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"In 2017, fake online hotel booking scams reportedly cost consumers nearly $4 Billion. More than a drain on users, these losses impact the margins of hotels themselves. \n\nIf you happen to be scammed, they’re less likely to spend much on your next holidays. This symptom is all part of a larger trend in the cybercrime sphere: fraudster attacks on a growing range of verticals. While certain industries remained relatively unscathed until recent years, it seems these days nobody is safe from online fraud. However, three types of companies are particularly susceptible to attacks.\nAre you a merchant storing high resale value items?\nIf you go to Amazon.com and have a quick look at the priciest things you can order, most of them are in high-end electronics. Apple products, computer hardware, GoPro cameras or cutting-edge TVs are all in high demand by scammers.\n\nWhy? Because buying a kitted-out Macbook Pro ($2,385.95) with a fake credit card and selling it back for half the price can bank you as much as selling 10 smaller items. This is why, according to a report breakdown by MarketWatch, luxury goods and electronics are at the top of the list of most-bought items by fraudsters.\n\nA bit further down the list, you’ll find products such as Best Buy gift cards, iTunes vouchers and World of Warcraft gold. In short, digital goods and gaming goods, but also airline tickets and accommodation bookings.\n\nFinally, it is interesting to note that fraudsters also target business services such as hosting services, logo and web design, and even legitimacy-boosting tools like search engine optimization services and coupons for Facebook ads.\nDoes your business operate as a digital wallet?\nThe good news for P2P (peer-to-peer) payments is that BI Intelligence expects mobile P2P to rise to $336 Billion in 2021. The bad news is that these business models are increasingly targeted by fraudsters.\n\nAs an elegant and simple alternative to cards, a digital wallet also means accessing real funds that are only protected by a password. Fraudsters are increasingly cunning when it comes to securing these passwords, whether it is to access P2P transfer accounts, cryptocurrencies, or any marketplace with a deposit and withdrawal option.\n\nAccording to a report by Gallup, a leading corporate analytics firm, more than 55% of users are still on the fence about digital wallets due to safety concerns. Specifically, users do not enjoy the fact that they might become target of phishing attacks in order to secure their passwords.\nDo you give generous promos or bonuses?\nPromotional offers are a fantastic way of attracting new customers. From free trials to opening discounts, they provide a strong incentive for users who are still undecided about signing up to your offer. In theory, every business should use them.\n\nSadly, fraudsters are adept at finding loopholes and strategies to abuse these offers. If we take the example of a Uber-type service, chances are it offers a free ride to new users. But if fraudsters can multiply accounts to continuously ride without spending a dollar, everybody loses. The company and driver runs at a loss, and there is an opportunity cost where other users cannot find free taxis.\n\nSimilarly, referral fees and affiliate payouts are also a strong target. Continuing with our ridesharing example, if you get a bonus every time a friend signs up, you ought to place a limit on the amount of new accounts that can use the link. Fraudsters certainly have the means, time and incentive to create hundreds or thousands of accounts in order to abuse your generous offers.\nAre You a High Fraud Target? - Final Thoughts\nCompanies and fraudsters are in a constant game of cat and mouse. And the latter will leave no stone unturned when it comes to extorting funds from your business, whether it’s in the form of freebies, actual currency or physical goods.\n\nAs fraudsters become more organized and benefit from larger resources (forums, funds, darknet websites), it is important to implement strong fraud-prevention strategies. This is true regardless of the size of your organization or the value of what you offer.\n\nAt SEON, we cover numerous use cases, combining powerful machine-learning tools and manual fine-tuning to ensure you can detect, prevent and drastically reduce fraud attacks."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/3-signs-of-high-fraud-targets/","url":"https://seon.io/resources/3-signs-of-high-fraud-targets/","name":"Are you a High Fraud Target? - 3 Reasons Your Business Might Be","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/3-signs-of-high-fraud-targets/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","datePublished":"2018-05-15T01:37:34+00:00","dateModified":"2025-04-03T09:25:08+00:00","description":"Fraudsters now target more industries than ever. But is yours on the list? This short list helps you find out if you are a high fraud target, and what to do","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/3-signs-of-high-fraud-targets/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-detection-with-machine-learning/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-detection-with-machine-learning/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"Fraud Detection with Machine Learning &amp; AI","datePublished":"2018-06-08T12:36:35+00:00","dateModified":"2026-02-24T11:34:04+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-detection-with-machine-learning/"},"wordCount":2005,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-detection-with-machine-learning/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how AI and machine learning detect and prevent fraud in real time across industries."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/fraud-detection-with-machine-learning/","url":"https://seon.io/resources/fraud-detection-with-machine-learning/","name":"Fraud Detection Using Machine Learning & AI in 2025 | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-detection-with-machine-learning/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-light.png","datePublished":"2018-06-08T12:36:35+00:00","dateModified":"2026-02-24T11:34:04+00:00","description":"Discover how AI and machine learning power modern fraud detection—spotting deepfakes, synthetic identities, and money laundering in real time.","mainEntity":[{"@id":"https://seon.io/resources/fraud-detection-with-machine-learning/#faq-question-1632313017355"},{"@id":"https://seon.io/resources/fraud-detection-with-machine-learning/#faq-question-1632313037642"},{"@id":"https://seon.io/resources/fraud-detection-with-machine-learning/#faq-question-1632313060894"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-detection-with-machine-learning/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a","name":"Marco Crispin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U07QBKFQPSR-8d5a60c6d3b1-512-96x96.jpeg","url":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U07QBKFQPSR-8d5a60c6d3b1-512-96x96.jpeg","contentUrl":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U07QBKFQPSR-8d5a60c6d3b1-512-96x96.jpeg","caption":"Marco Crispin"},"description":"Marco Crispin, Fraud Consultant at SEON, specializes in risk operations, compliance, and AML strategies. Previously at Block, he optimized merchant onboarding, managed global AML escalations and streamlined fraud resolutions. His earlier roles include a quality assurance analyst at Accenture and a content compliance analyst at BCforward. Marco holds a BA in English Education from the University of North Texas.","sameAs":["https://www.linkedin.com/in/marco-crispin-154208118/"],"knowsAbout":["Risk Operations","AML Compliance"],"jobTitle":"Senior Fraud Consultant","url":"https://seon.io/resources/author/marcocrispin/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-with-machine-learning/#faq-question-1632313017355","position":1,"url":"https://seon.io/resources/fraud-detection-with-machine-learning/#faq-question-1632313017355","name":"What are the best AI-powered fraud detection platforms for fintechs?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The best AI-powered fraud detection platforms for fintechs use real-time data analysis, adaptive machine learning models, and transparent decisioning to detect identity, payment, and transaction fraud. They combine behavioral, device, and network insights to flag anomalies in milliseconds while reducing false positives and supporting compliance requirements.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-with-machine-learning/#faq-question-1632313037642","position":2,"url":"https://seon.io/resources/fraud-detection-with-machine-learning/#faq-question-1632313037642","name":"How is machine learning used for transaction monitoring (AML)?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Machine learning excels at detecting anomalous behaviors that indicate money laundering. By analyzing transaction amounts, frequency, parties, and timing, it establishes customer baselines and swiftly flags deviations for investigation, enhancing AML compliance. AI strengthens defenses against financial crime and adapts to evolving threats, with its effectiveness and sophistication in <a href=\"https://seon.io/resources/aml-transaction-monitoring/\">transaction monitoring</a> continually advancing.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-with-machine-learning/#faq-question-1632313060894","position":3,"url":"https://seon.io/resources/fraud-detection-with-machine-learning/#faq-question-1632313060894","name":"What fraud detection software combines AI with explainable decisions?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud detection software that integrates AI with explainable decisions uses transparent models to show how risk scores are derived. Instead of simply flagging suspicious activity, these systems display the underlying signals and logic influencing each outcome. This transparency helps fraud and compliance teams interpret alerts more confidently, refine detection strategies, and maintain regulatory accountability without compromising speed or accuracy.<br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/online-gambling-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/online-gambling-fraud/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Online Gambling Fraud: What is It &amp; How to Prevent It","datePublished":"2018-06-21T07:47:57+00:00","dateModified":"2026-03-31T11:51:47+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/online-gambling-fraud/"},"wordCount":1511,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/online-gambling-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Online gambling fraud risks security and profits, demanding detection through device intelligence, digital footprints, and behavior monitoring."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/online-gambling-fraud/","url":"https://seon.io/resources/online-gambling-fraud/","name":"Online Gambling Fraud: What is It & How to Prevent It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/online-gambling-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","datePublished":"2018-06-21T07:47:57+00:00","dateModified":"2026-03-31T11:51:47+00:00","description":"Online gambling fraud targets platforms with tactics like multi-accounting and payment fraud. Learn its impact and how to ensure compliance and security.","mainEntity":[{"@id":"https://seon.io/resources/online-gambling-fraud/#faq-question-1631692274504"},{"@id":"https://seon.io/resources/online-gambling-fraud/#faq-question-1631692299947"},{"@id":"https://seon.io/resources/online-gambling-fraud/#faq-question-1631692306170"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/online-gambling-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405","name":"Tamas Kadar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/03/cropped-cropped-Kadar-Tamas-887_web-min-96x96.jpg","url":"https://seon.io/wp-content/uploads/2025/03/cropped-cropped-Kadar-Tamas-887_web-min-96x96.jpg","contentUrl":"https://seon.io/wp-content/uploads/2025/03/cropped-cropped-Kadar-Tamas-887_web-min-96x96.jpg","caption":"Tamas Kadar"},"description":"Tamás Kádár is the CEO and Co-Founder of SEON, a leading fraud prevention and AML company. He launched SEON in 2017 after facing fraud issues at his own crypto exchange. With expertise in fintech, AI, and cybersecurity, he built a platform delivering enterprise-grade tools for businesses of all sizes. Under his leadership, SEON has gained global recognition. A contributor to Forbes Technology Council and HackerNoon, Kádár advocates for the democratization of real-time fraud prevention.","sameAs":["https://seon.io","https://www.linkedin.com/in/tomkadar/"],"knowsAbout":["AML Compliance","Fraud Prevention","iGaming Fraud","Fintech Fraud"],"jobTitle":"CEO & Fraud Fighter","url":"https://seon.io/resources/author/tomkadar/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/online-gambling-fraud/#faq-question-1631692274504","position":1,"url":"https://seon.io/resources/online-gambling-fraud/#faq-question-1631692274504","name":"What are the consequences of gambling chargebacks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Since gambling operators are categorized as high-risk, a high chargeback rate will ultimately impact an operator’s overall revenue and damage their ability to accept credit card payments. Issuing banks might even blacklist you, not letting you pay using Visa or Mastercard, for instance. You can learn more about <a href=\"https://seon.io/resources/chargeback-in-igaming/\">chargebacks in iGaming here</a>.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/online-gambling-fraud/#faq-question-1631692299947","position":2,"url":"https://seon.io/resources/online-gambling-fraud/#faq-question-1631692299947","name":"Has anyone been prosecuted for internet gambling fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Numerous instances of gambling fraud have led to huge fines and even jail time. For instance, in June 2021, a nun in America was sentenced for embezzling more than <strong>$835,000</strong> from a school to pay for personal expenses, which included gambling trips.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/online-gambling-fraud/#faq-question-1631692306170","position":3,"url":"https://seon.io/resources/online-gambling-fraud/#faq-question-1631692306170","name":"How big a problem is identity theft for online gambling?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Identity theft fraud is one of the biggest issues with online gambling fraud since fraudsters look to use stolen identities for bonus abuse, open new accounts, and ultimately launder money.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/travel-industry-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/travel-industry-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Guide to Travel Fraud: How to Detect &amp; Prevent It","datePublished":"2018-07-04T11:39:09+00:00","dateModified":"2025-11-18T16:43:51+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/travel-industry-fraud/"},"wordCount":1606,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/travel-industry-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"The US and UK are hotspots for fraudsters – but where are they exactly?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/travel-industry-fraud/","url":"https://seon.io/resources/travel-industry-fraud/","name":"Travel Fraud: How to Prevent It In 2023 | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/travel-industry-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2018-07-04T11:39:09+00:00","dateModified":"2025-11-18T16:43:51+00:00","description":"Airlines, hotels and other travel industry providers are at high risk from fraud. Learn how to flag travel fraud and what tools give results.","mainEntity":[{"@id":"https://seon.io/resources/travel-industry-fraud/#faq-question-1634128639905"},{"@id":"https://seon.io/resources/travel-industry-fraud/#faq-question-1634128646049"},{"@id":"https://seon.io/resources/travel-industry-fraud/#faq-question-1634128653310"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/travel-industry-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/travel-industry-fraud/#faq-question-1634128639905","position":1,"url":"https://seon.io/resources/travel-industry-fraud/#faq-question-1634128639905","name":"What are the most common types of frauds for airlines?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Stolen loyalty points, stolen/fake payment details (both online and in flight). ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/travel-industry-fraud/#faq-question-1634128646049","position":2,"url":"https://seon.io/resources/travel-industry-fraud/#faq-question-1634128646049","name":"What are the most common types of fraud that online travel agents face?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"ATOs and stolen/fake credit cards are two of the most common but also it's worth considering fake websites that are set up to impersonate their site, with losses to both potential revenue and brand reputation.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/travel-industry-fraud/#faq-question-1634128653310","position":3,"url":"https://seon.io/resources/travel-industry-fraud/#faq-question-1634128653310","name":"How has COVID-19 Impacted travel industry fraud teams?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Since people were not traveling much or using their airline account during the pandemic, fraudsters turned their attention to cracking loyalty accounts.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/tips-train-fraud-managers/#article","isPartOf":{"@id":"https://seon.io/resources/tips-train-fraud-managers/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"5 Tips on Properly Training Fraud Managers","datePublished":"2018-07-23T08:36:23+00:00","dateModified":"2025-04-03T09:24:44+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/tips-train-fraud-managers/"},"wordCount":821,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/tips-train-fraud-managers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"As provider of a fraud prevention tool, we get to visit many business offices around the world. Some of them are small startups, others are global leaders, with dedicated fraud prevention teams of up to 10 people.\n\n\n\nAnd we are constantly amazed by the following: even some of the most advanced tech companies don’t have the right fraud prevention processes in place.\n\nThe reason? They are wasting resources on unnecessary tasks. They lack the right tools. Or worse, the fraud managers don’t have the right mindset. Well today, we’ve compiled a list of the #5 tips your company should follow to ensure fraud doesn’t get a fighting chance.\n\nBe Aware of Relevant Fraud Patterns\nAnd the keyword here is relevant. Yes, fraud managers should know the larger fraud trends of the year, but different industries show different fraud patterns. What appears to point to false positives in, say, the online gambling world, could actually be a false negative in the travel industry.\n\nIn short, fraud managers can’t simply go through a checklist (framework), but they need to dive one level deeper. Investigating different data layers is the only way to flag suspicious data and patterns that might have otherwise appeared benign on the surface. And yes, this means creative thinking to come up with ideas on what to look for.\nTry and Get the Most From Your Existing Tools\n\n“ Why not use a sandbox environment to test the less obvious features in your fraud prevention tool and see if they help shed light on hidden data patterns.”\nOne pattern we’ve seen over and over again is fraud managers underusing their tools. While having too many features in your arsenal can be overwhelming, not utilizing the ones that could enhance your prevention is a waste of resources.\n\nSo how do you make sure you employ a full featureset? Experiment! Why not use a sandbox environment to test those obscure features and see if they help shed light on hidden data patterns. Also: it can help your fraud prevention dollars get a lot further if you don’t need to add tools that are already there for you to use.\n\nEnsure the Correct Reporting is in Place\nStakeholders don’t need to be convinced of the cost of fraud. However, the cost of fraud prevention is another story. Luckily, using the right reporting can kill two birds with one stone. Firstly, it can help you create and track clear KPIs. Secondly, it will also help you analyse patterns and decrease your fraud rates.\n\nFor the first part, it’s about showing the progress of your business processes. For the second, it’s about discovering why fraud rates spike or decrease during certain time periods, or based on geolocation. It can help identify false positives and negatives (although customer support can also be a great help there). Finally, it’s about knowing where to focus your fraud prevention efforts - which are limited by time, resources and budget constraints.\n\nAutomate Data Fetching!\nAnd as much as possible. We’re still astounded to meet fraud managers who spend hours and hours fetching data manually. For example, a manual review for a transaction would take up to 15 minutes. This is lost time that you could have otherwise used on other processes (like tip #2 and #3 above, for example!).\n\nBut one of the greatest immediate benefits is that actionable data doesn’t get lost, misplaced or accidentally deleted. Automated data fetching tools provide less room for error, especially for complex entry using multiple fields.\n\nDon’t Fear Machine Learning\nRobots aren’t there to steal your job, they’re here to make it easier. And yes, machine learning can seem like a buzzword since it is on so many peoples’ lip, but it doesn’t mean you should discard it as a fad. In our experience, the technology has proved its worth numerous times over, and actually helps fraud managers become more efficient at their job.\n\nThe caveat, of course, is that machine learning is only as good as the fraud managers who use it. The former focuses on digging out knowledge that would otherwise remain undiscovered. Fraud managers need to apply that knowledge. It is only by combining fraud detection with machine learning &amp; human intelligence that you will get the best of both worlds.\nConclusion\nSadly, too many businesses still believe fraud prevention is an optional expenditure. Your fraud managers will know this isn’t the case, but a lot of the time, the burden of proof of efficiency will rest on them.\n\nThis is why ensuring they are trained, prepared, and adaptable is of the utmost importance. And as fraudsters continue to come up with creative ways of eating into company profits, these managers will become more valuable than ever. They just need have the right mindset, tools, and to follow the 5 tips highlighted above!"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/tips-train-fraud-managers/","url":"https://seon.io/resources/tips-train-fraud-managers/","name":"Need to Train Fraud Managers? Here are the 5 Top Tips You Should Know","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/tips-train-fraud-managers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","datePublished":"2018-07-23T08:36:23+00:00","dateModified":"2025-04-03T09:24:44+00:00","description":"You'd be amazed how many fraud managers feel overwhelmed by their job. Here is what they should be doing to stay on top of online fraud and payment scams.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/tips-train-fraud-managers/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/dark-web-travel-tickets/#article","isPartOf":{"@id":"https://seon.io/resources/dark-web-travel-tickets/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"We Tried to Buy Travel Tickets on the Dark Web. Here’s What We Found","datePublished":"2018-08-02T02:16:06+00:00","dateModified":"2025-04-03T09:24:27+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/dark-web-travel-tickets/"},"wordCount":881,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/dark-web-travel-tickets/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"As developers of a fraud prevention tool, we have to know what we’re up against. It’s not enough to create a platform that reduces fraud by detecting patterns: we have to understand exactly how fraudsters operate.\n\nThis is why we went deep on the Dark Web to find answers. Since an increasing amount of clients in the travel industry are impacted by fraud, it’s the vertical we decided to investigate. So what did we find exactly? The results of our search were astonishing. But first, a quick refresher:\nWhat Exactly is The Dark Web?\nThe Dark Web also known as Darknet or Deep Web, is content that uses the Internet but needs to be accessed via specific software. The most common one is Tor browser, which lets people browse anonymously. It is what we used to access some addresses (that of course you can’t find by using search engines like Google). Note that the terms Darknet, Dark Web and Deep Web aren’t exactly interchangeable, but the differences are pretty technical.&nbsp;\nHow Easy Was It to Access it and Start Buying?\nVery easy. All you need is to download a specific browser (we used Tor) and know where to look. There are enough step-by-step guides available on the Clearnet (the internet we use every day) to get started.\nOne thing to note is that the Dark Web is fueled by cryptocurrencies. Being anonymous (or at least very hard to track to a physical address) bitcoins, litecoins and other cryptos are the preferred method of payment for fraudsters and cybercriminals.\nWhat Exactly Could We Buy?\n\nThis is the scary part. Within minutes, we were able to access certain Dark Web forums where sellers offered their wares. One anonymous user in particular gave the following price list:\n\nairline flights sold at 30% of their retail value\nhotel bookings sold at 35% of their retail value\ncar rental at 30% of retail value\ntours and activities at 30% of retail value\n\n\nThe forum users were impressed with this seller's ability to deliver flights bought with stolen credit cards. With over 200 sales, they only had 5-star reviews, some of which included the comments: “Customer service was superb. Delivered promptly and flights went smoothly. Nothing else to ask for in a vendor. Will be using them from here out.\n\nAnother seller also offered flights, hotel and car rental packages at 30% of the retail value. Except they added an extra income stream in the form of illegal drugs.\n\nBut the Dark Net is not just for buying products. You can also kickstart your own fraudster career by acquiring knowledge. For instance, you can purchase:\n\na guide on how to book flights with stolen credit card information ($150)\nhotel carding beginners guide ($150)\n15 chapters ebook on how to use stolen credit cards, including a chapter dedicated to flight tickets\n\nFinally, it’s worth noting that wannabe cybercriminals don’t even need to go as far as joining the Dark Net to find their information. Some Clearnet sites also sell stolen account credentials for online websites, including:\n\nlogin details for major airline operators, hotel booking websites and travel agencies, starting at $0.2 - $1.55 per account\n\n\nThese vendors show you when the credentials were stolen, and the low price lets you know some of them might not work. In fact, there is a whole second hand market of fraudsters selling accounts that do not work as a scam. However, the chances that your customers are at risk from an account takeover attack (ATO) are still multiplied if their credentials happen to be part of the stolen lot.\nSo What can Fraud Managers Do?\nSadly, the Dark Web is not going away. Even if all fraud managers in the world united, you wouldn't be able to take it down. Similarly, hackers, fraudsters and cybercriminals will always find a way to sell their tutorials and services. Being on the attack only seems to help them create new channels and avenues.\nBut in terms of defense, companies benefit from large resources that can really make a dent in their earnings. For instance, machine learning has shown time and time again that advanced technology can detect patterns that fraudsters aren’t aware of. In short, you can’t make them go away, but you can surely make their life harder.\nConclusion\nWe focused on the travel industry but could have easily written an article about other verticals. The point is that fraudsters are everywhere, and they are multiplying. Freedom and low cost of information mean those who want to launch their cybercriminal careers have plenty of resources at their disposal.\nWhat fraud managers have, however, is the ability to extract patterns through data analysis. Using artificial intelligence, clever trend identification and tools like machine learning, they can truly make a difference. Yes, it means staying on top of what’s happening in the criminal underbelly, but it’s worth it to reduce fraud damages to your company (and maybe book your own holiday with complete peace of mind).\n\n\n\n      Fraudsters Won't Stop – But Neither Will We!\n      Combining machine learning, sophisticated algorithms and human intelligence, advanced technology can detect patterns that fraudsters aren’t aware of.\n     \n        Fight Fraud With ML"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dark-web-travel-tickets/","url":"https://seon.io/resources/dark-web-travel-tickets/","name":"Travel Tickets On The Dark Web - Here’s What You Can Buy","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dark-web-travel-tickets/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","datePublished":"2018-08-02T02:16:06+00:00","dateModified":"2025-04-03T09:24:27+00:00","description":"We heard the dark web is full of cheap airline and hotel tickets. We investigated and found that unfortunately you can easily get tickets on the dark web.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dark-web-travel-tickets/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/downside-of-shared-blacklists/#article","isPartOf":{"@id":"https://seon.io/resources/downside-of-shared-blacklists/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"The Downsides of Shared Blacklists","datePublished":"2018-09-18T00:12:33+00:00","dateModified":"2025-05-24T09:19:31+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/downside-of-shared-blacklists/"},"wordCount":877,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/downside-of-shared-blacklists/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2018/09/shared-blacklisting-01.png","articleSection":["Article"],"inLanguage":"en-US","description":"In the market for a fraud prevention tool? You’ll look at various options. Compare providers. And you’ll soon notice most of them proudly offer shared blacklists as a strong selling point. The problem? It’s not always something you want.\n\n\n\nToday, we’ll have a deep look at shared blacklisting to help you decide if it’s a feature you need, or if, on the other hand, it could be detrimental to your fight against fraud.\nWhat Is Shared Blacklisting?\nImagine you own a bakery in a small village. One man comes in every day and tries to steal some bread. Soon enough, you’ll bar him for entering. And you’re probably likely to tell your friends in other shops about the repeating offender. They will also decide to stop the thief from entering their shop.\n\nIt’s exactly how fraud detection tools create their shared blacklists (also referred to as common blacklists).\n\nCompanies collect data about users they refuse to serve, and fraud prevention software aggregates them together. Using a “strength in numbers” approach, the idea is simply that the more data you have, the bigger your blacklists are, and the more precise you can be at blocking unwanted users.\nWhat Attributes Are Used for Blacklists?\nAs fraud prevention tools become increasingly precise in how they collect user data, a growing number of attributes can be used to “block” someone from your site. But historically there are three main ones.\nIP Address\nthe number assigned to every device that connects to the Internet. While IP addresses were once a reliable way of identifying users, it still creates a number of problems in terms of precisions:\n\n \tIP Addresses now rotate quicker than ever between users: Mobile network users, ISPs often sell and recycle IP address ranges to satisfy the huge growth in user numbers.\n \tMultiple users can share the same IP address: This is particularly true in public locations such as colleges, libraries, of networks that offer open WiFi.\n \tNot a static attribute: As you can imagine, using a historical database of IP addresses for your IP blacklist can dramatically increase false positives.\n\nDevice Fingerprint\nA form of ID relating to information about the device used (Windows PC, iOS smartphone etc…). Similarly to IP addresses, the fast evolution of the mobile market has complicated things when using this attribute for blacklisting:\n\n \tNot a permanent attribute: In the past, browsers could inject a “supercookie” or tracker that would be stored permanently on users’ device. Verizon got fined $1.35 M for employing the practice in 2016. Needless to say, supercookies are frowned upon.\n \tBrowser and os updates create new IDs: So once again, not a hugely precise way of tracking user info, especially when the mobile operating system cycle is so fast these days\n \tFactory resets also trigger new IDs: A method fraudsters will surely be aware of. Simply factory resetting the device will give it a new ID.\n\n[bctt tweet=\"300 million new email accounts are opened every year and, for criminals, it’s easier than ever to create an address that matches the name on a stolen ID.\" username=“seon_tech”]\n\nEmail Address\nThe most basic form of identification online, and also the easiest to fake.\n\n \tNot efficient with ID fraud: 300 million new email accounts are opened every year, and for criminals, it’s easier than ever to create an address that matches the name on a stolen ID.\n \tNo social profiling: Most fraud prevention tools don’t utilize possible social profiling methods and don’t provide any additional data about a single email address. This means there is no way of verifying the risk related to the email address and doesn’t necessarily result in appropriate blacklisting.\n\nOther Concerns about Shared Blacklists\nMerchants control their individual blacklists, but their flags could be wrong in the first place. This means information that will corrupt all of the shared blacklists used by dozens if not hundreds of other online services around the world! (And the most cautious of us will even imagine scenarios in which unscrupulous vendors could do it maliciously.)\n\nSimilarly, cybersecurity firms are not there to oversee the quality of the blacklisting. Even if the information is correct, it could become outdated. This is particularly true as we’ve seen that the fast cycle of new mobile devices complicates matters.\n\nFinally, there is a huge data privacy issue. If your business must be GDPR compliant, for instance, who ensures the chain of information doesn’t violate the regulation’s terms? Is it the company who flagged the data? The cybersecurity firm? Or yours, the one that uses it passively?\nEnsuring Shared Blacklists Work for You\nThere is no denying that shared blacklists can be an efficient screening tool. It could be the decisive factor if your process has entered manual review, and you find out that a certain user has been blocked by other companies before you.\n\nStill, looking at the number of potential downsides, it’s best to remain cautious. In fact, any fraud prevention tool worth its salt should let you choose if you want shared blacklists as an option. And more importantly, you should have access to the parameters to ensure you tailor its potential to your needs."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/downside-of-shared-blacklists/","url":"https://seon.io/resources/downside-of-shared-blacklists/","name":"Shared Blacklists - Good or Bad for Fraud Prevention? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/downside-of-shared-blacklists/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2018/09/shared-blacklisting-01.png","datePublished":"2018-09-18T00:12:33+00:00","dateModified":"2025-05-24T09:19:31+00:00","description":"Anti-fraud companies often take pride in their Shared Blacklists feature. As you'll see in this post, it's not always the best tool for your business.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/downside-of-shared-blacklists/#primaryimage","url":"https://seon.io/wp-content/uploads/2018/09/shared-blacklisting-01.png","contentUrl":"https://seon.io/wp-content/uploads/2018/09/shared-blacklisting-01.png","width":1401,"height":800,"caption":"shared-blacklisting"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/micro-fees-vs-chargeback-guarantee/#article","isPartOf":{"@id":"https://seon.io/resources/micro-fees-vs-chargeback-guarantee/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Chargeback Guarantee vs Micro Fees for Chargeback Protection","datePublished":"2018-10-11T08:07:23+00:00","dateModified":"2025-11-18T16:43:25+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/micro-fees-vs-chargeback-guarantee/"},"wordCount":968,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/micro-fees-vs-chargeback-guarantee/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2018/10/chargeback1.png","articleSection":["Article"],"inLanguage":"en-US","description":"One question fraud managers get consistently asked: Are we certain our fraud detection tool is the right one?\n\n\n\nMore often than not, it has to do with the budget. So today, we’ll compare different pricing methods to help you select one that makes sense for your business.\n\n\n\nWhile fraud protection comes in all shapes and sizes, two models tend to be favoured by vendors: micro fees and chargeback guarantee. We’ll describe them in detail and weigh their pros and cons to see which one should work for you.\n\n\n\nWhat Is Chargeback Guarantee?\n\n\n\nA chargeback guarantee model is one where your management tools offer to pay for chargebacks themselves. They guarantee chargeback protection, and prevent and pay for dispute resolution themselves.&nbsp;\n\n\n\nEvery online business knows chargebacks are a pain. Disputes regarding credit card purchases are time-consuming, sometimes complex, and incredibly costly. This is why a vendor with a platform who claims to take care of the fees may seem ideal.\n\n\n\nBreaking down the process to its bare minimum, this is how it would look:\n\n\n\n\nYou create an account with the vendor’s solutions\n\n\n\nThe vendor accepts or denies payments based on analyzed data\n\n\n\nOne payment goes through, but the customer asks for a chargeback\n\n\n\nThe vendor takes care of losses incurred after chargeback\n\n\n\n\nIn short, these management tools are there to relieve you&nbsp;of the expenses, but also the stress associated with them. At least on paper….\n\n\n\nPros of the Model\n\n\n\nBecause the vendor will provide all the work for the chargeback admin, you won’t need a dedicated fraud team (at least if chargebacks are your main concern over declined orders). This makes the chargeback guarantee model ideal for:\n\n\n\n\nSmall e-commerces\n\n\n\nRetail merchants\n\n\n\nMerchants processing high margin goods or services\n\n\n\nStartups who cannot (or don’t want to) pay for a risk prevention team\n\n\n\n\nThe Cons of the Model\n\n\n\n\n“If your fraud prevention vendor spends fortunes handling chargebacks, they have every incentive to decrease their frequency - even by risking more false positives.”\n\n\n\n\n\n\n\n\nOne of the biggest flaws in the model amounts to a conflict of interest. If your fraud prevention vendor spends fortunes refunding chargebacks, they have every incentive to decrease their frequency - even by risking more false positives.\n\n\n\nWhy? Because it is in their interest to decline more payments. Put simply, your vendor could very well calibrate their tool to be highly sensitive to low-risk credit card payments - just to protect themselves and to be on the safe side. This means fewer chargebacks, but also fewer sales and fewer profits for your company. Not to mention putting the value of your customers at risk in the long term - who would want to go back to a site that keeps declining their legitimate payments?\n\n\n\n\n\n\n\nTied to this problem is one of opacity. Vendors who take control over credit card chargebacks have few reasons to be open about their processes. As you lose insight into the mechanisms that govern your business, you are less likely to learn from your mistakes and understand why fraud happens - or how to fight it effectively.\n\n\n\nPaying for Fraud Prevention via Micro Fees\n\n\n\nWorried about all of the above? Maybe you’ll want to check out the micro fees model for chargeback management. The name is self-explanatory: you pay a small amount for each transaction checked by the risk prevention tool.\n\n\n\nThese micropayments for chargeback prevention can vary depending on the kind of API request, and most vendors will usually offer a sliding scale based on the number of monthly transactions. However, the average cost per transaction would be around a couple of cents maximum. This is why it’s the preferred model for high-risk merchants and payment service providers.\n\n\n\nPros of the Micro Fees Model\n\n\n\nThe obvious point - in direct opposition to the other model - is that the fraud detection vendor has 0 incentive to tweak their system behind the scenes. The payment is entirely based on the size and scale of your business.\n\n\n\nWhile it may seem over the top for small businesses, it could end up being cheaper than the alternative. It is also completely transparent, and straightforward. No bad surprises for your budget, and it’s easy to make predictions on your ROI, including chargebacks and friendly fraud, for instance.\n\n\n\nCons of the Micro Fees Model\n\n\n\nPaying through micro fees usually means keeping a risk team on call. This can be an additional expense, but worth it for managing manual reviews of potential fraud and friendly fraud. You cannot just rely on the algorithms to do the job - human intelligence is also necessary.\n\n\n\nAnd talking about the system, it will have to be extremely well-calibrated. Rules must be properly defined for friendly fraud and chargebacks. If the engine isn’t set up properly, you could incur some costs that are hard to justify and slowly eat away at your profits.\n\n\n\nMicro Fees or Chargeback Guarantee?\n\n\n\nAs you have probably figured by now, there is no magic bullet when it comes to paying for prevention. If the solution existed, everyone would use the same model. In short, the best solution has a lot to do with your risk aversion and how much you trust the system.\n\n\n\nJust keep in mind that in fraud prevention, like with any other SaaS, flexibility and scalability is key. You may see noticeable short term benefits in slashing your chargeback rates, but is it really all you should worry about? How about account takeover and friendly fraud and promo abuse? A good fraud solution should let you pay to tackle all the problems at once.\n\n\n\nYou might also be interested in:\n\n\n\n\nChargeback vs Refund: Their Differences &amp; How They Work\n\n\n\nGuide to Chargeback Fraud: Detection and Prevention"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/micro-fees-vs-chargeback-guarantee/","url":"https://seon.io/resources/micro-fees-vs-chargeback-guarantee/","name":"Chargeback Guarantee vs Micro Fees for Chargeback Protection","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/micro-fees-vs-chargeback-guarantee/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2018/10/chargeback1.png","datePublished":"2018-10-11T08:07:23+00:00","dateModified":"2025-11-18T16:43:25+00:00","description":"Chargeback guarantee vs micro fees, which payment method is best for fraud protection? Pros & cons of micro fees & chargeback guarantee model.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/micro-fees-vs-chargeback-guarantee/#primaryimage","url":"https://seon.io/wp-content/uploads/2018/10/chargeback1.png","contentUrl":"https://seon.io/wp-content/uploads/2018/10/chargeback1.png","width":1401,"height":801,"caption":"Comparing micro fee and chargeback guarantee pricing models"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"How Data Enrichment Improves Fraud Detection &amp; Prevention","datePublished":"2018-12-17T07:01:04+00:00","dateModified":"2025-11-18T16:41:51+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/"},"wordCount":957,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"At SEON, we pride ourselves on our data enrichment processes. But the term can be confusing to business owners – and even to some fraud managers.&nbsp;Let's dive into what it means to enrich data and how it can protect your company in the long run.\n\n\n\nManual vs Automated Data Enrichment\n\n\n\nData enrichment is about gathering extra information based on a few data points. A Google search using someone's name, for instance, constitutes manual data enrichment. An automated solution will aggregate extra data automatically from various sources, such as open-source databases or social media networks.\n\n\n\nWhy Gathering Data Is Important in Fraud Detection\n\n\n\nIn fraud detection, the more data you have about your users, the more informed your decisions can be when calculating risk. The process of gathering information often comes from data augmentation, as it allows you to complete a picture without necessarily asking users to submit the information themselves.\n\n\n\n\n\nWhat Kind of Data Enrichment Tools Work to Fight Fraud?\n\n\n\nGetting more data is always good. But not all tools will help you get the right information. Here is a breakdown of the most commonly used data enrichment tools in fraud prevention.\n\n\n\nBut before you go into a deep dive, maybe you would like to see an example. Type your email address or phone number in the field below to see how SEON enriches data to spot potential fraudsters.\n\n\n\n&nbsp;\n\n\n\nEmail Address Data Enrichment\n\n\n\nChances are that all your users will need to sign up with an email address. This simple data field can reveal a lot by comparing it with external databases:\n\n\n\n\nIs the address free or paid?\n\n\n\nIs it disposable?\n\n\n\nIs the domain registered?\n\n\n\nHas it been involved in any data breaches?\n\n\n\nWas it used to register to social media and platforms (Facebook, Instagram, Spotify etc…)?\n\n\n\n\nDeep social media profiling and domain verification, for instance, is a science SEON is proud to offer through our email risk analysis API.\n\n\n\nIP Address Data Enrichment\n\n\n\nSimilar to email addresses, an IP lookup tool can reveal a lot about who your users truly are.\n\n\n\n\nWhere is the user based?\n\n\n\nAre they connecting through open ports - communicating with other servers?\n\n\n\nAre they using proxies, VPNs or TOR?\n\n\n\nIs the IP on any spam blacklists?\n\n\n\nDatacenter IP or residential connection (belonging to a homeowner)?\n\n\n\n\nBIN Number Data Enrichment\n\n\n\nAnother great example of enriching simple data points through external data sources. BIN (Bank Identification Numbers), also known as IIN (Issuer Identification Numbers) can tell us a lot about a card:\n\n\n\n\nWhat bank issued the card?\n\n\n\nWhat kind of card is it?\n\n\n\nWhat is the bank’s phone number?\n\n\n\nWhat is the card’ level (ATM only, Gold, Platinium, World Elite or Infinite depending on the provider)?\n\n\n\n\nDevice Data Enrichment\n\n\n\nThis is what, at SEON, we call Device Fingerprinting. Quite simply, it’s the ability to tell a lot based on the device the user connects to your site with:\n\n\n\n\nHas the user connected with the same device before?\n\n\n\nIs it running a virtual machine?\n\n\n\nWhat kind of browser is installed?\n\n\n\nIs it a mobile or desktop?\n\n\n\n\nThe Differences Between Blackbox and Whitebox Data Enrichment\n\n\n\nOf course, all the points above are easy to fake or enter with stolen information. Which is why data enrichment is only truly valuable in fraud prevention when combined with a solution designed to understand it.\n\n\n\nHow is that possible? In two words: machine learning. Now that we have created a large scale data set, it’s time to feed into a ML model to analyze, report, and reveal insights. At this stage, organizations may create different models based on their needs.\n\n\n\n\nWhitebox solution: A machine learning model that delivers readable rules through a Decision Tree algorithm. Each applied rule creates a new branch where the nodes are clear parameters.\n\n\n\nBlack box machine learning model: relying on complex probability-based classification that remove transparency for the sake of scores.\n\n\n\n\nWhichever the model, by feeding it through an ML system, your simple data point has now been enriched, transformed, and turned into a powerful weapon in your fight against fraudulent users.\n\n\n\nConclusion\n\n\n\nData enrichment isn’t just an option for fraud detection: it is one of the most crucial processes which allows you to get a clear picture of who your users are - whether it’s in the travel industry or for an online gambling platform.\n\n\n\nHowever, gathering data is just one part of the process. It is meaningless without proper analysis. And the only way to pore over this data to turn it into insights is through machine learning tools. Combining data enrichment with machine learning is what improves risk-based decision making, maximizes resources to fight against fraud, and outsmarts malicious users whose goal is to damage your business.\n\n\n\n\n      Protect Your Business from Fraud\n      Improve your risk management with SEON’s real-time data enrichment tools, behavioral checks, and deep device fingerprinting analysis.\n     \n        Book a Meeting\n      \n    \n\n\n\nFAQ \n\n\n\nHow much does data enrichment cost with fraud prevention software? Most fraud prevention software includes data enrichment functions as part of their pricing. However, you may find certain providers break the tools into different modules where you only pay for IP analysis, email address analysis or phone analysis. You usually pay on a per API call basis.  What industries use data enrichment? Data enrichment is useful in fraud prevention, cybersecurity, but also marketing and online retail. It helps to learn more about your users based on as few datapoints as possible.   \n\n\n\nLearn more about:\n\n\n\nBrowser Fingerprinting | Device Fingerprinting |  Fraud Detection API | Fraud Detection with Machine Learning &amp; AI\n\n\n\nSources used for this article\n\n\n\n\nTechcrunch: APIs are the next big SaaS wave\n\n\n\nUniversity of Cambridge: Explainable Machine Learning for Fraud Detection"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/","url":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/","name":"How Data Enrichment Improves Fraud Detection & Prevention | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2018-12-17T07:01:04+00:00","dateModified":"2025-11-18T16:41:51+00:00","description":"Data enrichment is one of the most important aspects of fraud protection. But many do not understand it well for fraud detection.","mainEntity":[{"@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/#faq-question-1631530246164"},{"@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/#faq-question-1631530360637"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/#faq-question-1631530246164","position":1,"url":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/#faq-question-1631530246164","name":"How much does data enrichment cost with fraud prevention software?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Most <a href=\"https://seon.io/resources/comparisons/banking-fraud-detection-software-tools/\" target=\"_blank\" rel=\"noreferrer noopener\">fraud prevention software</a> includes data enrichment functions as part of their pricing. However, you may find certain providers break the tools into different modules where you only pay for IP analysis, email address analysis or phone analysis. You usually pay on a per API call basis.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/#faq-question-1631530360637","position":2,"url":"https://seon.io/resources/how-data-enrichment-improves-fraud-detection-and-prevention/#faq-question-1631530360637","name":"What industries use data enrichment?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Data enrichment is useful in fraud prevention, cybersecurity, but also marketing and online retail. It helps to learn more about your users based on as few datapoints as possible. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/what-can-an-email-address-reveal-about-your-users/#article","isPartOf":{"@id":"https://seon.io/resources/what-can-an-email-address-reveal-about-your-users/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Email Profiling: What Can An Email Address Reveal About Your Users?","datePublished":"2019-01-08T07:56:45+00:00","dateModified":"2025-11-18T16:40:58+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/what-can-an-email-address-reveal-about-your-users/"},"wordCount":1155,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/what-can-an-email-address-reveal-about-your-users/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Email profiling is becoming more and more sophisticated. Today, we’ll see how it works, and how you can leverage its power to improve fraud detection.&nbsp;\n\n\n\nTry our tool below for free to see what it can reveal about your email address:\n\n\n\n\n\n\n\n\n\nWhat is Email Profiling?\n\n\n\nEmail profiling, or any kind of profiling done based on a single data point, relies on a process called data enrichment. Here are the basics, of what it is:\n\n\n\n\nA user submits their email address to your system\n\n\n\nYour data enrichment tool checks and compares it against known databases\n\n\n\nThe solution lets you know if the email address is suspicious or not\n\n\n\n\nIt is worth noting that data enrichment can be done manually. For instance, you could paste the email address into Google and see if any interesting results come up.\n\n\n\nBut of course, manual data enrichment is time consuming, difficult, and doesn’t really scale. Moreover, you might struggle to access certain databases, which is where a good fraud prevention tool can make all the difference.\n\n\n\n\n      What Can an Email Address Reveal?\n      Learn how reverse email lookup works, what data it uncovers, and how it helps detect fraud, verify identities, and analyze risk.\n      \n        Read more\n      \n    \n\n\n\nWhat Kind of Info Can be Collected from Email Profiling?\n\n\n\n\n\"...if you think about your own email address, it’s probably used to sign into a number of services, especially social media platforms. These are great places to investigate in order to validate the emails address usage.\"\n\n\n\n\nThe first thing we will want to check is that the email address is real. This is done via:\n\n\n\n\nSMTP check: This is a simple, yet technical process that will ping the email server and returns a basic answer: Does it exist or not?\n\n\n\n\nHowever, it’s extremely easy to create disposable email addresses hosted on real servers. A quick Google search will bring up hundreds of temporary or throwaway email address services. You simply log on and use it like a regular email platform, but the address is only valid for a limited period of time.\n\n\n\n\n\n\n\nMoreover, fraudsters can bulk buy large numbers of real email addresses from official platforms such as Gmail or Hotmail. Some can even match a person’s stolen ID name, to make it look more official.\n\n\n\nSo a search should also let you know the following:\n\n\n\n\nDisposable address: By ensuring the domain is not one offered by temporary email services, we can lower the users’ risk score.\n\n\n\nDomain information: Is it a free domain? When was it created? Does it require SMS or any other verification to open it? How about recent updates? Just a number of data points that can give great insights into an email address validity.\n\n\n\n\nNow if you think about your own email address, it’s probably used to sign into a number of services, especially social media platforms. These are great places to investigate in order to validate the emails address usage.\n\n\n\n\nSocial Media Profiling: This process will essentially check if the email address has been used to sign on platforms such as LinkedIn, Instagram, Facebook, etc…\n\n\n\n\nThen there are databases, both internal and external, useful for fraud prevention. So it’s important to check if the email address is associated with:\n\n\n\n\nData breaches: Are the credentials openly available? Some services track all stolen account info, which makes it easy to see if an email address has potentially been released in the open before.\n\n\n\nBlacklists: Is this user a repeat offender? Have they been caught before? By sharing and cross referencing other blacklists, it should be easy to see if the user is legitimate or fraudulent.\n\n\n\n\nLast but not least, some subtle data points that can reveal a lot about an email address. They all have to do with the string of letters, numbers and characters used in the actual email address name.\n\n\n\n\nEmail risk assessment: Does the name on the email address resemble the user name? Does it use a number of suspicious characters or nonsensical words? Too many vowels vs consonant ratio? In short, this part of the system is trying to answer the question: Does this email address look fishy or not?\n\n\n\n\nWhat About Fraud Risk Scores?\n\n\n\nAll the data enrichment above is great, but if you have to manually check it, you still end up doing a lot of the hard work. Which is why a good email profiling solution should also generate insightful fraud scores designed to let you mitigate fraud risk yourself.\n\n\n\nEssentially, these will speed up the review process for you. But if you were to manually generate them, it would be a complex and tedious task. Which is why at SEON, we let machine learning algorithms do the hard work.\n\n\n\nBy combining the power of AI-driven systems and clear, human-readable results, we believe companies large and small have more control over how they manage fraud on their platforms.\n\n\n\nIs Data Enrichment Legal?\n\n\n\nYes – provided it complies with data protection regulations. Which is why the SEON Intelligence extension and Email modules only use open source databases to cross check information.\n\n\n\nHow Can I Profile my Users’ Email Addresses?\n\n\n\nAt SEON, we have a number of flexible solutions that can be tailored to the way you fight fraud. The  chief way that you can use SEON’s email verification software capabilities to combat fraud is by running a user’s email address into the software’s social profile lookup function.\n\n\n\nThis allows you to view SEON’s results after it’s run an online check to see which, if any, social media/general online accounts the given email address is registered to. This can help you determine the extent to which the email address is either suspicious or trustworthy – with a non-existent online presence being the most dubious result. After all, how many people don’t at least have a Netflix profile nowadays?\n\n\n\nConclusion\n\n\n\nAn email address is a lot like a digital passport. Since 51% of internet users have kept theirs for more than 10 years, it’s easy enough to quickly confirm their identity. But like real passports, it’s easy to fake them.\n\n\n\nLuckily, a good email analysis tool will put all the odds in your favour to intelligently detect suspicious email addresses. Combined with other tools such as device fingerprinting or IP analysis, it’s easy to see how fraudsters are increasingly hindered by SEON.\n\n\n\n\n      Get actionable data with our email lookup\n      Working with SEON gives you complete user profiles in an instant, helping you to reduce fraud rates.\n\n      \n        Ask an Expert\n      \n    \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON: When Should You Deploy a Customer Risk Assessment Tool?\n\n\n\nSEON: The Ultimate Fraud Risk Assessment Checklist\n\n\n\nSEON: How an Email Data Breach Helps you to Verify Users\n\n\n\n\nLearn more about:\n\n\n\nBrowser Fingerprinting | Device Fingerprinting |  Fraud Detection API | Fraud Detection with Machine Learning &amp; AI"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/what-can-an-email-address-reveal-about-your-users/","url":"https://seon.io/resources/what-can-an-email-address-reveal-about-your-users/","name":"Email Profiling | What Can An Email Address Reveal? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/what-can-an-email-address-reveal-about-your-users/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","datePublished":"2019-01-08T07:56:45+00:00","dateModified":"2025-11-18T16:40:58+00:00","description":"Email profiling is the latest SEON technology used to glean info on your users. Find out how much you will learn with a simple email address.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/what-can-an-email-address-reveal-about-your-users/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6","name":"Katy Chrisler","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/06/cropped-Katy-Chrisler-96x96.jpg","url":"https://seon.io/wp-content/uploads/2025/06/cropped-Katy-Chrisler-96x96.jpg","contentUrl":"https://seon.io/wp-content/uploads/2025/06/cropped-Katy-Chrisler-96x96.jpg","caption":"Katy Chrisler"},"description":"Katy Chrisler is Head of Content at SEON, leading content strategy and editorial to elevate the brand in fraud prevention. With 10+ years of experience in SaaS, blockchain, and tech startups, she’s held senior roles at Data Gumbo, Tegus, and Treble. Katy specializes in messaging, storytelling, and executive communications, driving brand growth and thought leadership. Based in Austin, she holds two MFAs from the Iowa Writers’ Workshop and Goucher College, blending creative rigor with operational focus.","sameAs":["https://www.linkedin.com/in/katy-c-4853586/"],"knowsAbout":["Fraud Prevention"],"jobTitle":"Head of Content","url":"https://seon.io/resources/author/katychrisler/"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/device-fingerprinting/#article","isPartOf":{"@id":"https://seon.io/resources/device-fingerprinting/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"What Is Device Fingerprinting and How Does It Work?","datePublished":"2019-01-28T01:29:37+00:00","dateModified":"2025-11-18T16:40:10+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/device-fingerprinting/"},"wordCount":1997,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/device-fingerprinting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Device fingerprinting uses unique device attributes to identify users and detect fraud through hardware, software, and behavior analysis."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/device-fingerprinting/","url":"https://seon.io/resources/device-fingerprinting/","name":"What Is Device Fingerprinting & How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/device-fingerprinting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2019-01-28T01:29:37+00:00","dateModified":"2025-11-18T16:40:10+00:00","description":"Device fingerprinting uses unique device signals to detect suspicious activity, prevent fraud, and protect online interactions.","mainEntity":[{"@id":"https://seon.io/resources/device-fingerprinting/#faq-question-1631102470245"},{"@id":"https://seon.io/resources/device-fingerprinting/#faq-question-1675267612776"},{"@id":"https://seon.io/resources/device-fingerprinting/#faq-question-1631102492629"},{"@id":"https://seon.io/resources/device-fingerprinting/#faq-question-1680164658593"},{"@id":"https://seon.io/resources/device-fingerprinting/#faq-question-1745165753810"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/device-fingerprinting/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/device-fingerprinting/#faq-question-1631102470245","position":1,"url":"https://seon.io/resources/device-fingerprinting/#faq-question-1631102470245","name":"Can device fingerprinting detect device spoofing?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"For the most part, yes. For instance, a JavaScript injection can be identified using a simple string comparison and other errors and inconsistencies also point to fraudulent usage. <br />The latest device fingerprinting tools should be able to find red flags – for instance, by creating graphical challenges, as seen with Google’s Picasso method. This asks the devices to replicate some graphics and measures any inconsistencies to confirm whether the device data actually matches that of a real browser and operating system. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/device-fingerprinting/#faq-question-1675267612776","position":2,"url":"https://seon.io/resources/device-fingerprinting/#faq-question-1675267612776","name":"Is device fingerprinting legal?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. Although it’s a contentious subject with privacy advocates, the US doesn’t have specific laws on data protection and the EU’s General Data Protection Regulations (GDPR) only requires companies to gain consent from users before tracking them with cookies. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/device-fingerprinting/#faq-question-1631102492629","position":3,"url":"https://seon.io/resources/device-fingerprinting/#faq-question-1631102492629","name":"Is device fingerprinting GDPR compliant?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. A business simply must state its intentions through a terms and conditions section. Recital 47 of the GDPR legislation, as well as the UK GDPR, details: <br /><em>“The processing of personal data strictly necessary for the purposes of preventing fraud also constitutes a legitimate interest of the data controller concerned. The processing of personal data for direct marketing purposes may be regarded as carried out for a legitimate interest.” </em><br />Therefore, businesses must ensure that they are transparent about the information they will be processing; otherwise, they will become liable to further consequences.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/device-fingerprinting/#faq-question-1680164658593","position":4,"url":"https://seon.io/resources/device-fingerprinting/#faq-question-1680164658593","name":"What is cross-device fingerprinting?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Cross-device tracking refers to tracking a user's activity across multiple devices by identifying persistent signals that remain the same even when switching between phones, computers, or tablets, often without needing the user to be logged into any account.<br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/device-fingerprinting/#faq-question-1745165753810","position":5,"url":"https://seon.io/resources/device-fingerprinting/#faq-question-1745165753810","name":"What is a device fingerprinting API?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A device fingerprinting API is a tool that identifies devices based on details like browser type, operating system, and hardware configuration. By creating a unique ID for each device, it helps businesses recognize returning users, spot unusual activity, and prevent fraud. It’s more reliable than cookies, which can be deleted or blocked, making it a popular choice for strengthening online security and compliance.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/#article","isPartOf":{"@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Meeting PSD2 SCA Requirements with SEON","datePublished":"2019-02-27T02:58:41+00:00","dateModified":"2025-04-29T16:46:44+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/"},"wordCount":1957,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2019/02/psd2.png","keywords":["PSD2"],"articleSection":["Article"],"inLanguage":"en-US","description":"The EU's SCA requirements can be worrying for businesses. \n\n\n\nThe European Union created the PSD2 regulation, to further promote positive competition and innovation within the payments industry as well as further secure transactions. \n\n\n\nWe'll go over what your risk management team should keep an eye on, how the different elements work including 3DS2 and how SEON can support you in ensuring compliance.\n\n\n\nThe Second Payment Services Directive\n\n\n\nThe latest directive from the European Union. This Second Payment Service Directive forces banks to share their collected user data. If you, as a customer, authorize data sharing, third-party services can use it for a variety of services and financial products.\n\n\n\nThe directive also pushes for Payment Initiation Services (PIS). These online services can access a user’s payment account to initiate payment directly, as long as authentication is checked and consent is given.\n\n\n\nWhat Is SCA in Relation to PSD2?\n\n\n\nShort for strong customer authentication, SCA is a requirement under the European Union's PSD2 that seeks to improve the security of online payments by ensuring the cardholder identifies themselves by at least two types of authentication.\n\n\n\nIn simple terms, this means that when the customer wants to buy something online, they will be asked by the issuer bank for more information: Not just to input their card number (something they own) but to type an additional PIN or password (something they know), fingerprint (something they are) or even an additional one-time password from an authentication application or sent to their mobile device (something they own). Thus, in total, there will be two factors that authenticate their identity.\n\n\n\nHowever, SCA is not always needed per PSD2. Where the customer is known and has identified themselves in other manners – e.g. by logging into a verified account using a password – SCA measures such as 3-D Secure can be circumvented without compliance concerns. This reduces some friction and encourages customers to form closer ties with certain businesses they return to often.\n\n\n\n\n      Meet PSD2 SCA Requirements with SEON\n      Partner with SEON and stay compliant to the Payment Services Directive 2 (PSD2). Learn more today with SEON.\n     \n        Ask an Expert\n      \n    \n\n\n\n\n\n\n\nWhat Does PSD2 Say About SCA?\n\n\n\n\n“Payment service providers shall have transaction monitoring mechanisms in place that enable them to detect unauthorised or fraudulent payment transactions.”\n\n\n\n\nAll online payments made by customers in the EU need to be secured through the appropriate technology. In PSD2, it is referred to as strong customer authentication (SCA).\n\n\n\nArticle 2(1) of the PSD2 clearly stipulates that: “payment service providers shall have transaction monitoring mechanisms in place that enable them to detect unauthorized or fraudulent payment transactions”.\n\n\n\nThe minimum requirements for payment transaction analysis are further explained in Article 2(2). These include:\n\n\n\n\nChecks against lists with compromised or stolen authentication elements\n\n\n\nChecks against known fraud scenarios\n\n\n\nDetection of malware infection of the authentication device\n\n\n\nDeviations in the amount of the transaction\n\n\n\nAnalysis of the device/software, when provided by the PSP\n\n\n\n\nWhat Is the Goal of PSD2 SCA?\n\n\n\nFinancial products and services vary greatly across Europe, both in quality and price. The EU's PSD2 directive aims to reduce domestic frameworks and harmonize local regulations. This helps third party financial services scale across the continent, fosters international ecommerce, and attracts new ventures wishing to tap into a larger, unified market.\n\n\n\nPSD2 SCA in particular aims to build trust among consumers when it comes to paying with their cards online, over the phone and in person – as well as, of course, to protect cardholders and banks from data breaches, counterfeiting, and other cyber threats.\n\n\n\nThe PSD2 also simplifies the current payment chain. PIS cut down on middlemen by potentially removing bank card companies, acquirers and payment gateways, allowing banks to deal directly with merchants. It will significantly reduce transaction costs.\n\n\n\nWe should mention that the EU is currently in the process of creating the new version of PSD2, dubbed PSD3, following consultations in the summer of 2022. PSD3 will look to expand on PSD2, bringing it up to date and taking additional considerations into account. \n\n\n\nThere is no known implementation timeline at the time of writing, although it is going to be a lengthy process. Ultimately, PSD3 is not likely to be fully enforced before 2026. \n\n\n\n\n\n\n\nHow to Authenticate a Payment with SCA\n\n\n\nTo pass through strong customer authentication (SCA), a shopper will have to provide more than their card or card number. This normally takes the form of these steps when the payment is online:\n\n\n\n\nAt checkout, the shopper enters their card details, inclusive of the CVV number and card expiry date.\n\n\n\nA prompt pops up connecting them directly to their card issuing bank. The prompt asks them for one or more of the following:\n\nto enter a one-time password sent to them on their phone\n\n\n\nto provide a keyphrase they have defined at an earlier date. This serves the same purpose as a password.\n\n\n\nto look at their mobile selfie camera and blink\n\n\n\nto submit their fingerprint via fingerprint reader\n\n\n\n\n\nThe submitted data is cross-referenced with the data on file for the person and, if it matches, the payment goes through.\n\n\n\n\nMany in-person payments already involve two factors: Having the card as well as knowing its PIN. Contactless payments are often exempt. However, even for contactless low-value payments, a cardholder will be prompted to insert their card and input their PIN occasionally.\n\n\n\nPSD2 Exemptions\n\n\n\nIn the respective legislation, the EU's competent bodies have defined that certain types of transactions are PSD2 exempt. In general terms, they can occur when the risk is low, be it because of pre-established trust or low risk. \n\n\n\nIt is important to note that PSD2 exemptions we list below are not absolute and can be subject to limitations and conditions. They can also vary depending on the country.\n\n\n\nPSD2 exemptions defined by the EU include:\n\n\n\n\nTransactions below a certain amount: Because they are considered to involve a low risk of fraud, transactions of particularly low value (typically less than €30) are exempt.\n\n\n\nTransactions between trusted parties: Whenever all parties involved in a transaction have demonstrated themselves to be trustworthy, as well as that they are who they say they are, this transaction can be exempt. For example, a returning customer to Amazon who has paid with the same card before may not need to complete the SCA step reserved for new customers or new payment cards. \n\n\n\nRepeat payments: Repeat payments are deemed to be similar to transactions between trusted parties and can thus be exempt.\n\n\n\nTransactions that only involve certain types of providers: When a transaction only involves PSPs, PISPs and AISPs – companies that provide payment services, payment initiation and account information services – then it is exempt from certain PSD2 requirements.\n\n\n\nOne-leg transactions: When only one leg of the payment is within the EU area, it is considered low risk and is exempt. This can happen either when the payer or the payee is not in the EU.\n\n\n\nCorporate payments: Some corporate payments are exempt, including the payment of staff salaries, as they are between known parties. However, this varies per country and is best confirmed by a legal expert.\n\n\n\nRemote payments: Specific types of remote payments are also exempt. These include contactless payments. \n\n\n\nDeemed safe after transactional risk analysis (TRA): The EU also defines how TRA exemptions work, which are a category in themselves. They refer to transactions that may not belong to the above types of exemptions but have nevertheless been demonstrated to be safe by risk analysis. Normally, the merchant's fraud rates have to be low. The exact percentage correlates to the amount of the payment, but there are no TRA exemptions for transactions over €500.\n\n\n\n\n\n\n\n\n\n\n\n\nHow Does 3-D Secure 2.0 Work With PSD2?\n\n\n\n3-D Secure is the standard designed by EMVCo and major credit card schemes. 3-D Secure 1.0 usually required a static token (like a password) to complete a card payment, but 3-D Secure 2.0 increases the number of data point checks to improve payment security.\n\n\n\nThe previous version was notoriously clunky. US merchants reported decreased conversion rates of up to 45% because of the friction it creates for users. So yes, it might help reduce chargeback fraud, but also overall profits.\n\n\n\nThe 2.0 version will enable a more frictionless payment method by enabling dynamic 2FA which provides multiple data points from the merchant to the issuer. So these data points can reduce fraud for PSD2-based payments while meeting requirements.\n\n\n\nHowever, contrary to popular belief, 3-D Secure is not mandatory to pass the SCA requirements. Firstly, there are a number of exemptions (low-value or low-risk transactions, subscriptions, whitelisted merchants, etc..). \n\n\n\nSecondly, the right fraud authentication tool can help you achieve the same – if not more – than 3-D Secure to meet PSD2 authentication standards without going into manual reviews.\n\n\n\nBelow is our breakdown of the SCA requirements, and how a risk management tool like SEON can meet them.\n\n\n\nHow SEON Can Help You Meet PSD2 SCA\n\n\n\nSEON's industry-agnostic, modular solutions can help merchants meet PSD2 SCA in various ways. Namely, by utilizing our software, you will be able to:\n\n\n\n\nQualify for TRA exemptions: SEON’s platform can be easily set up to implement TRA exemptions along with their limits and categories, which depend on the sum spent.\n\n\n\nReduce payment friction safely: SEON will conduct the transactional risk analysis for you and exempt provably good users from having to complete an SCA step.\n\n\n\nIncrease customer loyalty: Provide friction-free experiences to your loyal, legitimate customers by marking them as exemptions to any risk rules you implement for SCA. This way they will not have to do SCA every time, and are more likely to be returning customers.\n\n\n\nStop account takeovers: Using in-depth device fingerprinting, unique digital footprint analysis, velocity checks and real-time monitoring, SEON will flag or block suspicious logins that could result in account takeovers, to minimize the chance of a fraudster gaining access to a legitimate customer’s account.\n\n\n\nFlag common fraud scenarios: See a user’s fraud score and explanations of how exactly it is reached, make adjustments based on your risk tolerance and get machine learning suggestions on stopping fraud even more efficiently.\n\n\n\nDetect fraudster tools and software: SEON identifies methods and applications employed by fraudsters to evade your defenses, including spoofing tools, VPNs, Tor, proxies, specialty browsers and more.\n\n\n\n\n\n      Reduce fraud rates up to 99%\n      Partner with SEON to reduce fraud with real-time data enrichment, clearbox machine learning, and advanced APIs – while staying compliant.\n     \n        Ask an Expert\n      \n    \n\n\n\nConclusion – PSD2, SCA and Fraud Authentication\n\n\n\nPSD2 is a strongly consumer-focused directive from the European Union. Everyone, on paper, should benefit from decreased transaction fees, reduced payment friction, and increased authentication security.\n\n\n\nHowever, this security point may be challenging for Risk Ops teams in the same way the GDPR and fraud detection appear at odds with each other. \n\n\n\nIt might require you to train fraud managers, who might feel they have to jump through hoops to help remain their organizations compliant. Luckily, at SEON, we firmly believe implementing our series of fraud authentication tools can cover all those legal requirements, while future-proofing your business.\n\n\n\n\n\n\n\nFAQ\n\n\n\nWhen is the PSD2 SCA deadline for implementation? Deadlines for PSD2 SCA for online merchants depend on their country. For example, in Spain, all transactions had to be SCA compliant by March 1, 2021, and in Belgium by May 18, 2021. In the UK, the country's FCA extended the implementation deadline, which eventually passed on March 14, 2022.  What are the PSD2 SCA regulations? These EU regulations specify that for all card-not-present payments that exceed a minimum of €30 should be authenticated using at least two factors. For instance, a factor can be a password or a fingerprint. This method of providing strong customer authentication is often known as 2FA or MFA.  \n\n\n\nSources\n\n\n\n\nAI Editorial: Is 3-D Secure a Conversion Killer?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/","url":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/","name":"Understanding & Meeting PSD2 SCA with SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2019/02/psd2.png","datePublished":"2019-02-27T02:58:41+00:00","dateModified":"2025-04-29T16:46:44+00:00","description":"PSD2 is supposed to reduce fraud and improve transaction monitoring. It also ads friction. Let's see how SEON helps with the matter.","mainEntity":[{"@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/#faq-question-1673531901227"},{"@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/#faq-question-1673532065710"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/#primaryimage","url":"https://seon.io/wp-content/uploads/2019/02/psd2.png","contentUrl":"https://seon.io/wp-content/uploads/2019/02/psd2.png","width":1401,"height":801,"caption":"psd2 sca fraud prevention"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/#faq-question-1673531901227","position":1,"url":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/#faq-question-1673531901227","name":"When is the PSD2 SCA deadline for implementation?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Deadlines for PSD2 SCA for online merchants depend on their country. For example, in Spain, all transactions had to be SCA compliant by March 1, 2021, and in Belgium by May 18, 2021. In the UK, the country's FCA extended the implementation deadline, which eventually passed on March 14, 2022.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/#faq-question-1673532065710","position":2,"url":"https://seon.io/resources/meeting-psd2-sca-requirements-with-seon/#faq-question-1673532065710","name":"What are the PSD2 SCA regulations?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"These EU regulations specify that for all card-not-present payments that exceed a minimum of €30 should be authenticated using at least two factors. For instance, a factor can be a password or a fingerprint. This method of providing strong customer authentication is often known as 2FA or MFA.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/using-ai-to-promote-responsible-online-gambling-and-self-exclusion/#article","isPartOf":{"@id":"https://seon.io/resources/using-ai-to-promote-responsible-online-gambling-and-self-exclusion/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Promoting Responsible Online Gambling and Self Exclusion","datePublished":"2019-03-16T08:46:50+00:00","dateModified":"2025-04-30T13:31:53+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/using-ai-to-promote-responsible-online-gambling-and-self-exclusion/"},"wordCount":741,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/using-ai-to-promote-responsible-online-gambling-and-self-exclusion/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2019/03/exclusion1.png","articleSection":["Article"],"inLanguage":"en-US","description":"Self exclusion and responsive playing are big topics in the gambling industry these days. Let’s see how AI can help protect those players most at risk.\n\n\n\nWhile there is no shortage of research on problematic gambling, the digital landscape has opened the door to new fears about addictive behaviors. To remedy the problem, online gambling operators, casinos and platforms should promote safe gambling by:\n\n\n\n\nProtecting vulnerable gamblers\n\n\n\nPreventing underage gambling\n\n\n\nCreating a secure online environment\n\n\n\nMarketing ethically and responsibly\n\n\n\n\nMost of the points above can be covered by the appropriate self-exclusion program.\n\n\n\nWhat Are Self Exclusion Programs?\n\n\n\nSelf-exclusion programs are a legal requirement in a growing number of jurisdictions. Their goal is indeed to provide options for those with potential addiction issues, in order to to avoid further problematic gambling.\n\n\n\nThe key point is in the word “self”. While online gambling platforms and operators must implement an option, it is users who have to commit to the programs. The responsibility is on the individual, and they risk bans or penalties if they fail to meet self-imposed requirements.\n\n\n\nDo Self Exclusion Programs Work?\n\n\n\nWorldwide assessments of these kinds of programs have found that participants report lower gambling spends, improved financial circumstances, and a decrease in gambling frequency and time.\n\n\n\nResearch overwhelmingly points to positive results. According to a Canadian study published in 2014, 95% of problem gamblers had positive experiences with a self excluding initiative. Participants indicated that they had self-excluded:\n\n\n\n\nas a preventive measure (63 %),\n\n\n\nbecause they’d lost too much money (52 %)\n\n\n\nTo avoid spending too much time on the site (36 %).\n\n\n\n\nWorldwide assessments of these kinds of programs have found that participants report lower gambling spends, improved financial circumstances, and a decrease in gambling frequency and time.\n\n\n\nAs to why the programs work, there are complex psychological factors at play. Primarily, researchers believe a public commitment to reduce gambling is a strong enough incentive, increasing potential embarrassment if they break their agreement.\n\n\n\nLeveraging KYC, and Fraud Tools for Self-Exclusion Programs\n\n\n\nAs we predicted in our list of fraud trends for the year, customer authentication will become increasingly stringent for online businesses. PSD2 is already shaking things up, and online gambling operators aren’t excluded. And fraud prevention tools are already your best bet for meeting legal requirements pertaining to KYC and strong customer authentication.\n\n\n\nThe questions is therefore the following: why not employ the same tools to deliver self-exclusion programs?\n\n\n\nThe crossovers are numerous. First, fraud and KYC tools are generally implemented at core authentication points (login, registration, deposit, withdrawal). These are the ideal touchpoints to reach out to gamblers.\n\n\n\nThen, your online gambling platform already has all the customer info needed to flag users as needed. Customer name similarity, date of birth, phone number etc… and the picture becomes even more precise when you can implement strong email address profiling, or device fingerprinting solutions.\n\n\n\nThe Final Step - Filtering Problem Gamblers\n\n\n\nNow that you can confidently picture who your players are, it’s time to analyse behavior to recommend the self exclusion programs. Combining human intelligence and machine learning, your platform can track suspicious user behavior - so why not create filters to flag users whose gambling could be problematic?\n\n\n\nFor instance, our SEON self-exclusion feature uses the same powerful data analysis as for fraud prevention, but offers to flag users based on increasing daily or weekly deposits, and hours spent on games.\n\n\n\nMoreover, we provide a clear button to instantly mark users wishing to be self-excluded. It adds specific data points to a flag list and matches new registrations to the database, leveraging machine learning to tag suspicious / at-risk players.\n\n\n\n\n\n\n\nConclusion\n\n\n\nOnline gambling operators will be under increasing scrutiny from regulators to deliver a safe, positive experience for users. Self-exclusion programs appear to be a successful step in the right direction, but implementing them isn’t without increasing potential friction, costs, and complexity for the platform.\n\n\n\nLuckily, it’s easy to meet two standards at once with the right fraud-protection solution. At SEON, we are proud to do our part to promote safe gambling. All while making it easier for your online gambling company’s fraud and legal team thanks to our out-of-the-box self-exclusion feature.\n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON:  How to Prevent iGaming Fraud: Its Types, Consequences &amp; Methods\n\n\n\nSEON:  Online Gambling Fraud: How It Works &amp; How to Stop It\n\n\n\nSEON:  Would You Flag Santa as a Fraudster?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/using-ai-to-promote-responsible-online-gambling-and-self-exclusion/","url":"https://seon.io/resources/using-ai-to-promote-responsible-online-gambling-and-self-exclusion/","name":"How AI Can Help With Self Exclusion and Responsible Gambling","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/using-ai-to-promote-responsible-online-gambling-and-self-exclusion/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2019/03/exclusion1.png","datePublished":"2019-03-16T08:46:50+00:00","dateModified":"2025-04-30T13:31:53+00:00","description":"Online gambling platforms are under increasing scrutiny from regulators. Self exclusion programs must be implemented to promote responsible gambling.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/using-ai-to-promote-responsible-online-gambling-and-self-exclusion/#primaryimage","url":"https://seon.io/wp-content/uploads/2019/03/exclusion1.png","contentUrl":"https://seon.io/wp-content/uploads/2019/03/exclusion1.png","width":1401,"height":801,"caption":"self-exclusion programs for gambling"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#article","isPartOf":{"@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Payday Loan Fraud &amp; Identity Theft: Why It Happens and How to Prevent It","datePublished":"2019-04-10T00:42:31+00:00","dateModified":"2025-11-18T16:39:30+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/"},"wordCount":1625,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Chinese payday loan company Qudian made a splash in 2017 with its $900M IPO. Whether in Southeast Asia, Europe or Latin America, there sure is money to be made in personal credit. But there’s also money to be lost due to fraud.\n\n\n\nIt is all part of a larger increase in attacks against online businesses in any vertical. As we’ll see, payday loan companies are a particularly high target. This post examines why and tries to offer a solution to the problem.\n\n\n\nHow Does Payday Loan Fraud Work?\n\n\n\nA key challenge for payday loan companies is flagging real from stolen IDs. These stolen documents tend to originate from four different places:\n\n\n\n\nCriminal marketplaces: Clear and dark web sites offer plenty of platforms where you can sign in anonymously, pay with untraceable crypto, and bulk buy IDs to use for any of your fraudulent goals.\n\n\n\nData breaches: While cybercrime isn’t necessarily organized, fraudsters benefit from actions by other hackers as a data breach means access to legitimate IDs and passwords. These can be used to recover other information to create a full stolen ID profile.\n\n\n\nPhishing: The old days of mass-sending emails are over. These days, fraudsters use increasingly sophisticated methods, such as creating fake job posts to steal ID, targeting the clean credit history of children profiles, and personalised phishing - also referred to as spear phishing.\n\n\n\nRent and ID service: We've seen an increase in individuals willingly renting out their official documents (in exchange for payment). This goes directly to fraudsters and makes it very hard to track.\n\n\n\n\nEven more specific: fraudsters can filter stolen IDs based on credit score. It’s also easy to check it manually, using sites that let you consult a credit score by making a card payment.\n\n\n\n\n\n\n\nHow Can You Spot These Payday Loan Scams?\n\n\n\nWe all know how creative fraudsters can be but some of the more common ways to detect a potential loan fraud include: \n\n\n\n\nPayments - if the lender requests some form of payment/deposit/insurance, this is a clear red flag. \n\n\n\nSuspicious processes - there is a clear lack of emphasis in verifying your identity or your credit history.\n\n\n\nTheir communication and threats - are they pressuring you to act immediately? Are they aggressively chasing you across different channels and threatening legal action? \n\n\n\nCustomer due diligence - simply checking to see if the lender is located in your area and if they a registered/licensed company.\n\n\n\nSpelling and grammar - quite an obvious sign to any scam!\n\n\n\n\nWhat Are the Consequences of Payday Loan Fraud?\n\n\n\nThe immediate consequence of lending money out to a fraudster is that you'll never see it back. These criminals are adept at building trust, sometimes paying back initial loans to lull you into a false sense of security. Then one day, they vanish from the face of the earth. You're left in debt, and collection agencies fail to contact an individual.\n\n\n\nThere are worse issues. In terms of compliance, you're essentially putting yourself at the mercy of regulators, and in danger of paying hefty KYC or AML fines. \n\n\n\nLast but not least, an afflux of fraudsters on your platform will damage your bottom line. Some of our customers in the vertical almost had to cancel launching their products in fraudster-heavy markets – until they managed to mitigate risk with financial risk management tools. \n\n\n\n\n      Are you lending money to fraudsters? Find out with SEON\n      SEON is more than just a software solution, it is your business partner in fraud fighting\n \n        Ask an Expert\n      \n    \n\n\n\nHow to Protect Yourself from Payday Loan Scams\n\n\n\nResearch. Often payday loan scams will look to manipulate victims and pressure them into making a decision however asking for specific information can quickly uncover a fraudulent scheme. \n\n\n\nAsking for written, verified confirmation of the company as well as getting the name, phone number and other personal information of the person who is calling can help gauge the legitimacy. A fraudster will categorically not want people checking on them so they won’t give you this information.\n\n\n\nDue diligence through authorized registers, such as the FCA in the UK or The Consumer Financial Protection Bureau in the US, and online information/reviews might help you spot potential risks.\n\n\n\nWhy Are Payday Loans Companies Highly Targeted by Fraud?\n\n\n\nFraudsters flow towards money. And in the criminal world, very few industries offer as quick an access to money as online lending. But there's more to it than simply smelling blood. Fraudsters also take advantage of a competitive market, new technologies and access to more data than ever before. Let's break it down below.\n\n\n\nPayDay Loan Companies Are Increasingly Numerous and Competitive\n\n\n\nAs more and more companies compete for their slice of the pie, there's only one way to stand out: offering fast, frictionless lending. This means accelerating credit scoring, at the risk of losing customers if it takes too long to process.\n\n\n\nAs you can imagine, this is the perfect opportunity for fraudsters. Faster credit scoring means fewer verifications. Fewer verifications mean more ways to take advantage of the lender.\n\n\n\nLending Industry = Immediate Cash Access\n\n\n\nLending is a 100% financial service. There are therefore fewer barriers between fraudsters and their access to money. While, say, cloning credit cards incurs numerous steps, the results from targeting a payday loan company are immediate. If it works, they get paid. If it doesn’t they move on.\n\n\n\nRisk-Free Applications\n\n\n\nWider Internet access, worldwide increase in mobile use, and cheaper consumer tech all contribute to a growing market for online lending companies. It also creates a fruitful and risk-free environment for fraudsters, who can switch devices, IDs or even IP addresses as they please to multiply their loan applications.\n\n\n\nEasy Access to Stolen IDs\n\n\n\nScreenshot from the SecondEye website, which provides photoshopped documents for ID verification\n\n\n\nDo you believe photo ID verification works? For fraudsters, it is but a minor inconvenience. They can Simply log into a service like Secondeye, order a tailored, photoshopped document, and bypass secondary ID checks in no time.\n\n\n\nThen there are all the other options we mentioned in our introduction: phishing, rent-an-ID services, and, of course, huge data leaks.\n\n\n\nIneffective ID Verification Process\n\n\n\nYou wouldn't dream of setting up a lending company without some kind of verification. The problem is that most thirds party services rely on stale database, built from previously shared blacklists. Yes, they may catch the less sophisticated fraudulent attempts, but criminals are fast, agile and wise to most KYC checks.\n\n\n\nTo make matters worse, you're often left relying on credit bureaus. But how does it work in a market with a high percentage of unbanked people? Or in a country where financial information is scarce? In short, it's not a lack of verification steps that makes lending a target, but often relying on ineffective tools instead.\n\n\n\nMore Digital Banking Options to Store Funds\n\n\n\nHistorically, receiving and storing funds was one of the biggest headaches for fraudsters who managed to successfully apply for a loan. This is now a thing of the past as modern digital banking solutions have created a market for cheap, disposable accounts.\n\n\n\nThe Bitify website lets anyone signup and purchase online bank accounts\n\n\n\nFraudsters can simply purchase a legitimate online bank account from TransferWise, Revolut, or any other fintech to store the fiat. It’s then easier than ever to buy cryptocurrencies, which can then fund their next fraudulent venture.\n\n\n\nA Solution to Prevent Fraud and Mitigate Risk\n\n\n\nThe lending industry is intrinsically based on risk. Interest rates are calculated on risk. Credit scores evaluate risk. Taking risks increases competitive advantage.\n\n\n\nModern fraud prevention tools can be integrated both as KYC processes and risk-model management solutions. Four of the top features include:\n\n\n\n\nFull digital ID profiling solutions to improve accuracy using an alternative credit scoring\n\n\n\nDevice fingerprinting to flag suspicious connections\n\n\n\nEmail profiling (email lookup) to get an accurate view of your borrowers\n\n\n\nPhone Number analysis for even better risk scores.\n\n\n\n\nThe good news is that risk is a measurable factor. This makes it easier to integrate services or processes that mitigate it, while calculating your ROI.\n\n\n\n\n      Protect your business from payday loan fraud\n      SEON offers a complete set of fraud fighting tools that grow with your business\n \n        Ask an Expert\n      \n    \n\n\n\nFrequently Asked Questions\n\n\n\nWhat is a payday loan call scam? Payday loans are a form of immediate credit from an organization. Fraudsters use techniques such as making fake domains to gain personal information about you and then use that data in some form of manipulation. Examples would include demanding repayment for a fake debt or selling the information on the dark web.  How can payday loan fraud be prevented? A key solution is to rely on alternative user data as well as credit bureau data. OSINT tools and live data enrichment solutions offer useful alternative data such as their digital footprint.  Why is payday loan fraud so common in the lending industry? Fraudsters target loan companies because it's a quick route to access money. Companies sacrifice security over onboarding more users, which fraudsters see as an opportunity to pass KYC verification with stolen or falsified documents.  \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON:  How to Apply for a Loan with Stolen ID in 7 Steps\n\n\n\nSEON: Guide to Loan Fraud: What is it and How to Avoid it\n\n\n\nSEON:  Predict Customer Defaults of Online Loans Thanks to Data Enrichment\n\n\n\nSEON:  Alternative Credit Scoring: What is it &amp; How it Works\n\n\n\n\nSources used for this article\n\n\n\n\nThe Lowdown - The gold rush in Indonesian payday loan market\n\n\n\nForbes - How online fraud is a growing trend"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/","url":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/","name":"PayDay Loan Fraud & Identity Theft: Why & How it Happens | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","datePublished":"2019-04-10T00:42:31+00:00","dateModified":"2025-11-18T16:39:30+00:00","description":"Payday and online loan companies are increasingly targeted by loan fraud. See here how to prevent & detect all these attacks.","mainEntity":[{"@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#faq-question-1638546908723"},{"@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#faq-question-1630576471596"},{"@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#faq-question-1630576324387"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#faq-question-1638546908723","position":1,"url":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#faq-question-1638546908723","name":"What is a payday loan call scam?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Payday loans are a form of immediate credit from an organization. Fraudsters use techniques such as making fake domains to gain personal information about you and then use that data in some form of manipulation. Examples would include demanding repayment for a fake debt or selling the information on the dark web.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#faq-question-1630576471596","position":2,"url":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#faq-question-1630576471596","name":"How can payday loan fraud be prevented?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A key solution is to rely on alternative user data as well as credit bureau data. <a href=\"https://seon.io/resources/comparisons/osint-software-tools/\" target=\"_blank\" rel=\"noreferrer noopener\">OSINT</a> tools and live data enrichment solutions offer useful alternative data such as their digital footprint.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#faq-question-1630576324387","position":3,"url":"https://seon.io/resources/payday-loan-fraud-and-identity-theft-prevention-and-detection/#faq-question-1630576324387","name":"Why is payday loan fraud so common in the lending industry?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraudsters target loan companies because it's a quick route to access money. Companies sacrifice security over onboarding more users, which fraudsters see as an opportunity to pass KYC verification with stolen or falsified documents.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/#article","isPartOf":{"@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Best Forensic Email Analysis Software &amp; Tools in 2023","datePublished":"2019-05-01T01:28:17+00:00","dateModified":"2026-03-26T15:35:18+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/"},"wordCount":1339,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Emails and email addresses can reveal a surprising amount information about your users. Let's see what can be gleaned from that data, and how can use it as part of their business operations.\n\n\n\nWhat Is An Email Analysis Tool?\n\n\n\nAn email analysis tool extracts as much data as possible from an email or email address. It helps you learn more about the sender and their intention. But there are very different reasons for using these tools. Let's break them down below.\n\n\n\nAnti-Fraud Email Analysis Tool\n\n\n\nThe third category or email analysis tools help you learn more about how risky a user is based on their email address. This is done by answering question such as:\n\n\n\n\nis the email address from a free or temporary domain?\n\n\n\ncan you sign up to the domain without 2FA verification?\n\n\n\ndid the email address appear on spam blacklists\n\n\n\netc...\n\n\n\n\nThis approach, often referred to as email intelligence for fraud prevention, allows businesses to use enriched email data to identify risk signals early.\n\n\n\nExamples:\n\n\n\n\nSEON offers full email data enrichment analysis based on a single email address. \n\n\n\n\n\nEmailage also focuses on enriching data from email addresses.\n\n\n\n\nAn Email Activity Analysis Tool\n\n\n\nThe first kind of email analysis tools are related to email analytics. Put simply, they let you measure metrics such as:\n\n\n\n\nthe number of emails sent per day\n\n\n\ntop senders and recipients\n\n\n\naverage email response time\n\n\n\nand more\n\n\n\n\nThese are productivity tools, often deployed by companies who want to learn more about their internal messaging statistics or to measure employee efficiency.\n\n\n\nExamples:\n\n\n\n\nRight Inbox is used by companies such as Uber, Salesforce and Netflix to track engagement and email open rates, amongst others\n\n\n\nMailtrack allows companies to track engagement from a dashboard, specialising in tracking Gmail data\n\n\n\n\nA Forensic Email Analysis Tool\n\n\n\nEmail forensic tools help analyze, aggregate and display information relating to the email address, its content, and how and when it was sent. Examples include the ability to:\n\n\n\n\nsearch for keywords in multiple languages\n\n\n\nmanage date logs\n\n\n\nstandardise email content and export in different file formats\n\n\n\netc..\n\n\n\n\nThis is particularly useful when searching through huge databases of emails with granular detail. If you are an investigator, journalist or an IT administrator who needs to parse email data and present it in a specific way, you'll need a good forensic email analysis tool.\n\n\n\nExamples:\n\n\n\n\nAid4Mail allows you to extract email data for computer forensics and e-discovery\n\n\n\nXtraxtor is a company that specialises in pulling out specific data from emails such as addresses and phone. numbers\n\n\n\n\n\n      Protect your business from fraud with email lookup\n      Improve your risk management with SEON's real time data enrichment tools\n \n        Ask an Expert\n      \n    \n\n\n\nWhy Should we Use Email Analysis Tools for Fraud Protection?\n\n\n\nA key component of fraud prevention Is device fingerprinting, which gathers data about hardware and software used by your website visitors. It is a fantastic tool to get an idea of how visitors access your pages. \n\n\n\nThe only downside? Device fingerprinting has been around a long time. In fact, the technology used to track browser configuration today has been around for at least a decade. To its credit, it is still a basic, yet efficient fraud-reduction measure.\n\n\n\nUnfortunately, the world of online fraud is fast-paced, innovative, and resourceful. This means fraudsters had plenty of time to prepare, test and implement ways to bypass device fingerprinting on their own terms.\n\n\n\nFor instance, one technique we’re seeing more and more these days involves full profile packages. Sellers on questionable marketplaces offer platform login details combined with portable browser cache and cookies.\n\n\n\nIn other words: fraudsters are getting smarter. Businesses are left straddling behind in this constant game of cat and mouse. Our suggestion? Building a portfolio of fraud prevention tools that create a stronger line of defense against attacks.\n\n\n\nAnd one of the most powerful and innovative tools we’ve developed in recent years is email analysis.\n\n\n\nHow and Why Email Analysis Tools Work to Reduce Fraud Rates\n\n\n\n[bctt tweet=\"Email addresses provide data that is a lot more specific and unique than that from a widely-available browser or mass-produced smartphone.\" username=\"seon_tech\"]\n\n\n\nGathering customer analytics based on their email address is a fresh trend (known commonly as email lookup) that is proving to be highly effective. Opening an account online is virtually impossible without an email address. Email addresses provide data that is a lot more specific and unique than browsers or mass-produced smartphone.\n\n\n\nMoreover, innovations in data enrichment can extract more than a name and domain. Using the right tools, an email address will tell more about a user than an IP or device can. Specifically, we can see:\n\n\n\n\nValidity. through SMTP checks, we can ping the server and see if it exists or not based on the feedback.\n\n\n\nUsage. We check if the domain comes from temporary email services. If it is, the risk score increases.\n\n\n\nDomain quality. Is it free? When was it created? Does it require SMS or other verification to open it? How about recent updates? Just a number of data points that can give great insights into an email address validity. For instance, gmail is free, but does require verification.\n\n\n\nAddress quality. Using string analysis, we compare it to the user name and get a good guess on whether the name makes sense or if its content is gibberish.\n\n\n\nStolen addresses. A simple cross check against known email data breaches can reveal a lot.\n\n\n\nBlacklisted. It's easy to see if the email address belongs to someone who has been barred from another platform.\n\n\n\n\nLast but not least: we can tell if the email address is used with social media accounts. According to our own SEON Intelligence analytics for the lending industry, 76% of defaulting customers had no social media presence.\n\n\n\n\n\"According to our own SEON Intelligence insights, 76% of defaulting customers in the lending industry used email addresses with zero social media presence.\"\n\n\n\n\nThis is an extremely high correlation, which fraud managers in every industry can now leverage to calculate their risk scores – and the precision increases with every other data point available.\n\n\n\nConclusion - Email Analysis Tools for Risk Management\n\n\n\nCompanies are still very much focused on limited methods for identifying their users. Fraudsters are therefore at an advantage, because they’re constantly on the lookout for loopholes and new innovative ways to defraud these merchants.\n\n\n\nIn short, fraud prevention must also evolve. And at the minute, an email address, which is synonymous with a global unique identifier on the internet is one of the strongest data points you can check to boost your fraud prevention results.\n\n\n\nSEON Intelligence is specifically designed to offer a combination of features that analyze data and reduce fraud, including a powerful email analysis tool. It’s also a modular solution, which means you can add it to your existing fraud prevention method to get the final boost it needs\n\n\n\n\n      Still not sure if our email tool solution helps you?\n      Why not book a demo and see us in action\n \n        Ask an Expert\n      \n    \n\n\n\nFrequently Asked Questions About Email Analysis Tools\n\n\n\nHow do you analyze an email? There are various ways to analyse email data based on your desired result. For forensics you can extract the email content. For analytics, you can look at the engagement rate. For risk management, you can see if the email address points to a risky user.  Are email analysis tools legal? Yes, you can extract information legally and even connect it to open-source databases for investigation that meets data protection standards.  \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON: What Can An Email Address Reveal About Your Users?\n\n\n\nSEON: How Email Risk Assessment Can Help Your Business Grow Safely\n\n\n\nSEON: How to find Social Media Accounts by Email Address Only\n\n\n\nSEON: Top 10 Email Verification Software &amp; Tools 2023\n\n\n\n\nLearn more about:\n\n\n\nData Enrichment | Browser Fingerprinting |  Fraud Detection API | Fraud Detection with Machine Learning &amp; AI\n\n\n\nSources used for this article:\n\n\n\n\nJavelin: 2017 Financial Impact of Fraud Study"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/","url":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/","name":"Top Forensic Email Analysis Software & Tools | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-green.png","datePublished":"2019-05-01T01:28:17+00:00","dateModified":"2026-03-26T15:35:18+00:00","description":"Want to protect your business? Don't just rely on one method. Add an email analysis tool to your arsenal. Here’s how and why it works so well.","mainEntity":[{"@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/#faq-question-1631535620647"},{"@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/#faq-question-1631535702794"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/#faq-question-1631535620647","position":1,"url":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/#faq-question-1631535620647","name":"How do you analyze an email?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"There are various ways to analyse email data based on your desired result. For forensics you can extract the email content. For analytics, you can look at the engagement rate. For risk management, you can see if the email address points to a risky user.<br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/#faq-question-1631535702794","position":2,"url":"https://seon.io/resources/email-analysis-tools-and-why-to-use-them/#faq-question-1631535702794","name":"Are email analysis tools legal?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, you can extract information legally and even connect it to open-source databases for investigation that meets data protection standards.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/gambling-operators-increasing-conversion-reducing-risk/#article","isPartOf":{"@id":"https://seon.io/resources/gambling-operators-increasing-conversion-reducing-risk/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Gambling Operators: Here’s What a Risk-Free and Balanced User Journey Looks Like","datePublished":"2019-06-04T02:53:45+00:00","dateModified":"2025-04-03T09:22:57+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/gambling-operators-increasing-conversion-reducing-risk/"},"wordCount":930,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/gambling-operators-increasing-conversion-reducing-risk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2019/06/seon-blog-gambling_06_01_3.png","articleSection":["Article"],"inLanguage":"en-US","description":"However you measure the success of your online gambling website, at some point or another, you’ll need to focus on the best conversion processes.\n\n\n\nFor some, a successful conversion is a sign up. For others, it’s a deposit of funds. What we’d like to point out today is that all the steps of a gambling player’s journey are interconnected.\n\nAnd regardless of your metric, we believe there are three key points to focus on in order to maximize any kind of conversion:\n\n \tReduce user friction as much as possible\n \tEnsure player legitimacy\n \tGain a complete view of the user journey and experience\n\nWe’ll later point out how fraud prevention tools can help with all three of these key points. But before we get ahead of ourselves let’s look at the typical user journey.\nThe Typical Online Gambling User Journey\nIt can roughly be summed up in the following steps:\n\n \tUsers visit an affiliate partner website, which points to your platform\n \tThey register on your platform\n \tThey are logged in\n \tThey deposit, usually taking advantage of a first-time bonus\n \tThey play games\n \tIf lucky, they withdraw their winnings\n\nWhere Risk Lies for Gambling Operators\nNow a key point is that risk exists - and is detectable - at every stage of the aforementioned journey. For instance, it is entirely possible that your highest risk factor is a bad affiliate who sends you damaging traffic.\n\nSimilarly, every stage thereafter is potentially just as dangerous. Here’s what could happen:\n\nUser registration:\n\n \tFake accounts: are your users really who they say they are?\n \tMulti accounting users: are users creating multiple accounts?\n\nUser login:\n\n \tAccount takeover: have your legitimate users’ account been stolen and used by fraudsters?\n\nUser deposit through bonus offer:\n\n \tBonus abuse: are they using the bonus to exploit your platform?\n \tPayment fraud: is the credit card information stolen? Or is it friendly fraud?\n\nWinnings withdrawal:\n\n \tBonus abuse: will you lose more than you gain with these user?\n\nReducing Risk - The Existing Solutions\n\n\nAs we’re sure you’re already aware, online operators currently have a good range of available tool sets to reduce fraud. First, there are two forms of KYC processes:\n\n \tHeavy KYC: more thorough, but also bothersome for users\n \tLight KYC: riskier, but offering a smoother user experience\n\nOn the heavy KYC side, we will find security measures such as:\n\n \tID verification: (submission of selfie with official documents, photo + username, photocopies of bills, passport pictures etc…)\n \t2FA: 2 factor authentication, which uses an external device (phone login, or SMS verification, amongst others)\n \tCredit card preauthorization: using a temporary “hold” of funds for a set number of days to ensure the card is valid and detect fake card data.\n\nIn the light KYC camp, we find methods designed to assess a user’s digital identity. These include:\n\n \tEmail analysis: checking if the used email address has been used before on social media, if it has been newly created, and if the domain is trustworthy\n \tReverse phone lookup: checking the validity, the country of carrier,  social media presence, etc.\n \tIP analysis: understanding if the traffic comes from a VPN, TOR, and where the connection comes from.\n \tDevice fingerprinting: learning how users access your platform. Are they suspiciously switching browsers? Using emulators to spoof mobile devices?\n\nBalancing Light and Heavy KYC\n[bctt tweet=\"Most gambling operators take a one-size-fits-all approach to fraud prevention. This either makes their processes too heavy-handed, or largely inefficient.\" username=\"seon_tech\"]\n\nThe problem? Most gambling operators take a one-size-fits-all approach to fraud prevention. This either makes their fraud prevention processes too heavy-handed, or largely inefficient. Here is what we believe is the optimum way to reduce friction while maximizing prevention:\n\n \tAt the point of registration: collect several digital identity data points. Using light KYC factors helps users register fast, and seamlessly. Conversion is kept high.\n \tIf the user appears suspicious (using a disposable email domain, device emulator, previously used IP), the system remains on high alert, ready for heavy KYC to kick in.\n \tAt login: you want your KYC to be light. Yes, account takeover remains a factor, but suspicious data will be stored and cross checked to calculate an accurate risk factor later.\n \tAt the withdrawal / bonus validation stage: Heavy KYC must be employed here. It is a regulatory requirement. But once again, we can use previous risk calculation to determine how heavy the ID verification should be. Our good users enjoy a flawless experience. Suspicious users need to amp up their ID confirmation efforts.\n\nConclusion\nFraudsters often succeed because of their agility. This means gambling operators must be equally flexible in how they flag suspicious users - especially if they don’t want to increase conversion by improving the legitimate players’ experience.\n\nIdeally, a good fraud prevention tool should give you enough flexibility to alternate between light and heavy KYC processes. Moreover, gaining a full picture of the user journey helps improve risk scoring and accuracy in fraud detection.\n\nBut there’s more. For instance, using a complete, end-to-end fraud prevention platform like SEON will have more benefits:\n\n \tYou can determine which affiliates are fraudulent and send questionable traffic. This will allow you to increase budget for the good sources, and remove bad ones.\n \tDetect fraudulent payment and prevent chargebacks before they can happen.\n \tUse saved data to dispute chargebacks and discover friendly fraud\n \tIncrease player trust and loyalty by avoiding account takeovers\n\nSee how SEON can help you prevent fraud in your online gambling business."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/gambling-operators-increasing-conversion-reducing-risk/","url":"https://seon.io/resources/gambling-operators-increasing-conversion-reducing-risk/","name":"Gambling User Journeys - Improving Conversion and Reducing Risk","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/gambling-operators-increasing-conversion-reducing-risk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2019/06/seon-blog-gambling_06_01_3.png","datePublished":"2019-06-04T02:53:45+00:00","dateModified":"2025-04-03T09:22:57+00:00","description":"Gambling operators need to increase conversion. They also must risk associated with fraud. Here's how to balance them through light and heavy KYCs.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/gambling-operators-increasing-conversion-reducing-risk/#primaryimage","url":"https://seon.io/wp-content/uploads/2019/06/seon-blog-gambling_06_01_3.png","contentUrl":"https://seon.io/wp-content/uploads/2019/06/seon-blog-gambling_06_01_3.png","width":1400,"height":800,"caption":"risk free gambling user journey"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"How Fraudsters Take Out Loans with Stolen IDs (And How To Stop Them)","datePublished":"2019-07-25T01:32:43+00:00","dateModified":"2025-12-30T15:31:08+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/"},"wordCount":1720,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Online lending has gained significant popularity recently due to its accessibility, speed, convenience and competitive rates. However, it has also attracted the attention of fraudsters who exploit the digital nature of transactions. \n\n\n\nThe online lending environment provides ample opportunities for criminals to acquire cash quickly by blending in with legitimate customers, taking out loans with no intent to repay or impersonating others using stolen identities. In the UK, according to the Department for Business and Trade – approximately 11% of loans, equivalent to £5 billion ($6.4 billion US), were obtained through fraudulent means.\n\n\n\n\n\n\n\nTo combat fraud, online lenders must gather more customer information and examine alternative signals to better identify defaults and fraudulent intent. Understanding how fraudsters use stolen IDs to secure loans is crucial. \n\n\n\nThis guide explains their techniques to evade detection and exploit system vulnerabilities. By learning these steps, lenders can implement strategies to identify and prevent loan fraud, safeguarding their operations and protecting legitimate customers.\n\n\n\nStep 1: The Dark Web for Stolen IDs\n\n\n\nLike many other illicit online activities, most loan fraud starts with stolen IDs procured on the dark web or illegal marketplaces. In these areas, anonymity is prized. To maintain privacy, fraudsters employ the Tor Browser, a free, open-source web browser designed to enable anonymous communication and protect users’ privacy and freedom online, or fraudsters will use I2P, which stands for the Invisible Internet Project.&nbsp;\n\n\n\nThis overlay network uses peer-to-peer-like routing structures designed to protect the privacy and identity of users while they communicate over the internet. Once veiled with privacy, fraudsters will head to darknet marketplaces to purchase stolen IDs. If fraudsters are not familiar with these steps, they will often find detailed instructions on private forums, including plenty of beginner guides to fraud.\n\n\n\nHow to Stop These Actions: Fraud prevention software uses device intelligence – including cookies, browsers and device hashes – and digital footprint analysis to identify whether applicants use Tor or another privacy tactic to hide their actions. By recognizing these signals, lenders can flag suspicious activity and require additional verification steps.\n\n\n\nStep 2: Buying Fullz\n\n\n\nFraudsters have coined the term “fullz” to refer to a complete set of an individual’s personal information, often used for harmful purposes. Typically, a fullz package includes a full name, address, date of birth, social security number (SSN), bank account information, credit card information, email address, phone number and driver’s license number. With this comprehensive information, fraudsters can convincingly impersonate victims to obtain loans.\n\n\n\nHow to Stop These Actions: Fraudsters operating with fullz typically cannot access a victim’s email account and will sign up for a new account through a free provider. SEON’s digital footprint solution looks at email accounts associated with an address to check for involvement in data breaches, establish the duration of existence and verify social signals associated with an email address to confirm its validity. A new email address with no known history is a common indicator of fraud. Monitoring for unusual account creation patterns and cross-referencing with known data breach information can also help identify fraudulent attempts.\n\n\n\nStep 3: Purchasing Credit Information\n\n\n\nTraditionally, online lenders protect themselves by deploying credit scoring systems. However, fraudsters have found ways to circumvent these protections by purchasing credit information on individuals with high credit scores and using those stolen identities for their loan applications. They often pay for this information using stolen credit cards to avoid detection.\n\n\n\nSome of the more sophisticated cybercriminals use social security numbers stolen from children, as these records are typically clean and unmonitored. Then, they create synthetic identities, which combine stolen and fabricated information to present a convincing front.\n\n\n\nHow to Stop These Actions: SEON combats the use of stolen credit information by creating a digital footprint of loan applicants using their email address. A legitimate email is typically linked to many social media accounts and apps, unlike a fraudster's email. Additionally, velocity checks can detect and flag multiple applications from the same identity within a short time. By combining digital footprint analysis with velocity checks, lenders can more effectively prevent fraudulent loan applications.\n\n\n\nStep 4: Obtaining a Bank Account\n\n\n\nFraudsters need a bank account that is not linked to their real identity to receive their loan. Instead of setting up a new account, they may conduct an account takeover on a lending platform or purchase a hacked account from a dark marketplace.\n\n\n\nHow to Stop These Actions: SEON supports the banking industry by helping digital banks and traditional institutions shut down fraud throughout the entire customer journey. By protecting against from the moment of sign-in, through onboarding, and during transactions, we ensure a trusted environment for all banking activities.\n\n\n\nStep 5: Generating a Verified Phone Number\n\n\n\nMulti-factor authentication is ubiquitous in fintech, and it often uses a one-time password to authenticate the account owner. This presents another challenge for fraudsters, who need to provide an actual phone number to link to their application to mimic the behavior of a legitimate applicant.\n\n\n\nHow to Stop These Actions: By mapping an applicant’s digital footprint using their phone number, SEON can help lending companies identify potentially fraudulent applications. Our customizable data rules allow lenders to set a default risk score that matches their risk appetite, helping to determine the likelihood of default. This process ensures that even if fraudsters generate a verified phone number, their overall digital footprint and risk indicators will reveal inconsistencies, effectively identifying fraudulent attempts.\n\n\n\nStep 6: Loan Application and Manipulation\n\n\n\nOnce equipped with stolen IDs and fullz, fraudsters will apply for loans by manipulating or falsifying additional documents, such as pay stubs or bank statements, to substantiate their false identities. They often submit multiple applications across different lenders to maximize their chances of success. Fraudsters may target loan companies with less rigorous aff affordability checks or due diligence procedures, but no lender is entirely safe from these schemes.\n\n\n\n\n\n\n\nHow to Stop These Actions: Lenders can combat this by implementing multi-layered verification processes, including document verification, biometric checks and cross-referencing information with external databases. Leveraging alternative data points such as utility and rent payments, employment and income data, and digital footprint analysis can enhance fraud detection. Advanced machine learning models can detect anomalies and inconsistencies in application data, while real-time monitoring can flag suspicious activities, such as multiple applications from the same identity. These measures help identify and prevent fraudulent loan applications effectively.\n\n\n\nStep 7: Cashing Out\n\n\n\nOnce a loan is approved, fraudsters quickly cash out the funds. They might transfer the money to multiple accounts or withdraw it through ATMs to minimize traceability. Another common tactic is using money mules, individuals hired to move money through various accounts. This makes it challenging for law enforcement and financial institutions to trace the funds to the original fraudulent activity.\n\n\n\nHow to Stop These Actions: Implementing advanced transaction monitoring systems is crucial for detecting unusual withdrawal or transfer patterns. Real-time analytics can identify and flag suspicious activities, such as large withdrawals immediately after a loan disbursement or multiple transfers to unlinked accounts. Collaboration with other financial institutions to share intelligence on known fraud tactics and suspicious activities can enhance detection and prevention efforts. \n\n\n\nAdditionally, using machine learning models to analyze transaction behaviors and flag high-risk activities can help prevent fraudsters from successfully cashing out.\n\n\n\n\nUnderstanding Loan Fraud Risks for Lenders\nLearn how loan fraud goes beyond stolen IDs, from synthetic identities to loan stacking, and how lenders can reduce risk early.\n \n        Read loan fraud guide\n\n\n\n\n\nHow to Protect Your Business from Loan Fraud\n\n\n\nAt every step of our research, we were amazed by how easy it would be even for a newbie to start defrauding online lenders. No wonder it is one of the most targeted verticals by fraudsters.&nbsp;\n\n\n\nBut the good news is, there are plenty of ways to stop them. Using a combination of tools and processes, you should already have enough data to create a tight net to catch criminals.\n\n\n\nWhile some points are falsifiable, it’s almost impossible to cheat all of them all of the time. By checking the connections between data points, a good integrated system can find red flags that would otherwise go unnoticed.&nbsp;\n\n\n\nStaying on top of fraud trends will also go a long way in understanding attack patterns and preventing them. SEON’s machine learning looks for patterns and proposes rules that apply to your business. Fine-tuned with your feedback, it adapts to your risk tolerance, giving you more accuracy and speed. Offering all of the above in tandem with modular APIs, unique insights, and a customer success team made up entirely of fraud analysts and managers, means SEON is a valuable partner for lenders looking to stop fraudsters.\n\n\n\nWe believed social media presence could help validate user identity,\" says Kaspars Magaznieks, Head of Fraud at SunFinance. \"SEON established that correlation for us. We now use the data to confirm identities and contact non-paying customers for debt collection.\n\n\n\nSources\n\n\n\n\nBaines Wilson LLP: Bounce Back Loan Fraud\n\n\n\n&nbsp;The Conversation: AI threatens to add to the growing wave of fraud but is also helping tackle it\n\n\n\n\nFrequently Asked Questions\n\n\n\nHow do lenders detect and prevent fraudulent loan applications? Lenders use various techniques to detect and prevent fraudulent loan applications, including digital footprint analysis, device intelligence and multi-layered verification processes. They monitor for unusual patterns, such as multiple applications from the same identity or suspicious device usage, and employ machine learning models to detect anomalies and inconsistencies in application data.  What is digital footprint analysis, and how does it help prevent fraud? Digital footprint analysis involves collecting and analyzing data from an individual’s online presence and activities, including social media profiles, email usage, and other digital behaviors. By examining these data points, lenders can verify the authenticity of an applicant’s identity and detect potential fraud. A robust digital footprint often correlates with a legitimate applicant, while a sparse or inconsistent digital presence may indicate fraudulent activity.  How do alternative data points improve the accuracy of credit assessments? Alternative data points, such as utility and rent payments, employment history, and digital transaction patterns, provide a more comprehensive view of a borrower’s financial behavior. These data points help lenders assess creditworthiness for individuals with limited traditional credit histories, improving the accuracy of credit assessments and expanding access to credit for underbanked populations."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/","url":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/","name":"How to Stop Fraudsters Applying for Loans with Stolen IDs | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2019-07-25T01:32:43+00:00","dateModified":"2025-12-30T15:31:08+00:00","description":"We sometimes have to think like fraudsters to fight fraud. Today, we explore how fraudsters get loans with stolen IDs and what to do to stop them at every step of the way.","mainEntity":[{"@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#faq-question-1688397065309"},{"@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#faq-question-1688397095002"},{"@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#faq-question-1688397105182"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#faq-question-1688397065309","position":1,"url":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#faq-question-1688397065309","name":"How do lenders detect and prevent fraudulent loan applications?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Lenders use various techniques to detect and <a href=\"https://seon.io/resources/loan-fraud-guide/\" target=\"_blank\" rel=\"noreferrer noopener\">prevent fraudulent loan applications</a>, including digital footprint analysis, device intelligence and multi-layered verification processes. They monitor for unusual patterns, such as multiple applications from the same identity or suspicious device usage, and employ machine learning models to detect anomalies and inconsistencies in application data.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#faq-question-1688397095002","position":2,"url":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#faq-question-1688397095002","name":"What is digital footprint analysis, and how does it help prevent fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Digital footprint analysis involves collecting and analyzing data from an individual’s online presence and activities, including social media profiles, email usage, and other digital behaviors. By examining these data points, lenders can verify the authenticity of an applicant’s identity and detect potential fraud. A robust digital footprint often correlates with a legitimate applicant, while a sparse or inconsistent digital presence may indicate fraudulent activity.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#faq-question-1688397105182","position":3,"url":"https://seon.io/resources/how-to-apply-for-a-loan-with-stolen-id-in-7-steps/#faq-question-1688397105182","name":"How do alternative data points improve the accuracy of credit assessments?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Alternative data points, such as utility and rent payments, employment history, and digital transaction patterns, provide a more comprehensive view of a borrower’s financial behavior. These data points help lenders assess creditworthiness for individuals with limited traditional credit histories, improving the accuracy of credit assessments and expanding access to credit for underbanked populations<strong>.</strong>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/bot-attacks/#article","isPartOf":{"@id":"https://seon.io/resources/bot-attacks/"},"author":{"name":"Dora Pinter","@id":"https://seon.io/#/schema/person/83524103262f8afb1f0587a7c27b7334"},"headline":"What Are Bot Attacks and How to Prevent Them","datePublished":"2019-08-30T02:16:15+00:00","dateModified":"2026-01-13T10:16:42+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/bot-attacks/"},"wordCount":2109,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/bot-attacks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Common bot attacks, key warning signs, and layered defenses to stop fraud and abuse without blocking legitimate users."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/bot-attacks/","url":"https://seon.io/resources/bot-attacks/","name":"What Are Bot Attacks and How to Prevent Them | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/bot-attacks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2019-08-30T02:16:15+00:00","dateModified":"2026-01-13T10:16:42+00:00","description":"Common bot attacks, key warning signs, and layered defenses to stop fraud and abuse without blocking legitimate users.","mainEntity":[{"@id":"https://seon.io/resources/bot-attacks/#faq-question-1768298824666"},{"@id":"https://seon.io/resources/bot-attacks/#faq-question-1768298845910"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/bot-attacks/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/83524103262f8afb1f0587a7c27b7334","name":"Dora Pinter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/08/cropped-Pinter-Dora-341_web-min-96x96.jpg","url":"https://seon.io/wp-content/uploads/2025/08/cropped-Pinter-Dora-341_web-min-96x96.jpg","contentUrl":"https://seon.io/wp-content/uploads/2025/08/cropped-Pinter-Dora-341_web-min-96x96.jpg","caption":"Dora Pinter"},"description":"Dora Pinter is a copywriter at SEON, where she creates educational and product-focused content. With a background in content design, technical writing and lifecycle marketing, she brings a reader-first mindset to everything she writes. Dora specializes in turning complex features and concepts into clear, trustworthy narratives to help customers get the most out of SEON. She collaborates closely with product and design teams to ensure every word supports the user journey.","sameAs":["https://www.linkedin.com/in/pinterdora/"],"knowsAbout":["Fraud Prevention Content","Content Design","Technical Writing"],"jobTitle":"Content Writer","url":"https://seon.io/resources/author/dorapinter/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bot-attacks/#faq-question-1768298824666","position":1,"url":"https://seon.io/resources/bot-attacks/#faq-question-1768298824666","name":"What are the signs of a bot attack?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Common signs include sudden or unexplained traffic spikes, repeated failed login attempts, activity originating from unusual geographic locations and interactions that occur at inhuman speeds. When these patterns appear consistently, they often indicate automated behavior rather than real users.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bot-attacks/#faq-question-1768298845910","position":2,"url":"https://seon.io/resources/bot-attacks/#faq-question-1768298845910","name":"How to detect a bot?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Bots are detected by analyzing behavioral patterns, device and network signals, action velocity and anomalies in real time. By correlating multiple data points instead of relying on a single indicator, businesses can more accurately distinguish between genuine users and automated threats.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/multi-accounting/#article","isPartOf":{"@id":"https://seon.io/resources/multi-accounting/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Multi Accounting Is on the Rise – Who Is Affected &amp; How to Stop It","datePublished":"2019-09-10T04:12:03+00:00","dateModified":"2025-12-24T12:22:55+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/multi-accounting/"},"wordCount":1550,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/multi-accounting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Have you ever signed up for a service with different accounts? You might have, without noticing, broken their terms and conditions by performing what is known as multi accounting.\n\n\n\nOf course, it doesn’t make you a fraudster but those who purposefully create multiple accounts to abuse a system are crossing a fine line between customer benefits and company damage and hence, perpetuating iGaming fraud.&nbsp;\n\n\n\nWhat Is Multi Accounting?\n\n\n\nMulti-accounting fraud is a practice that consists of creating or using multiple accounts under different identities on a single platform to manipulate services, evade detection and engage in activities typically prohibited by the terms of service. &nbsp;\n\n\n\n\n\n\n\nIn fraudulent scenarios, multi-accounting can be particularly problematic as it allows one individual to control numerous accounts simultaneously, leading to a magnified ability to deceive, scam and disrupt. Multi-accounting can also be used to bypass account-level penalties and restrictions, such as bans or limits imposed by each platform on its single accounts – and as a result, poses significant challenges for online security and fraud detection.In its most advanced form, this behavior can evolve into more elaborate techniques, where organized fraudsters use emulators, virtual machines and sophisticated proxy services to create seemingly authentic user profiles. This leads to financial losses, distorted platform data and various negative impacts for operators and companies.\n\n\n\n\n      SEON Enables EZY Gaming to Stop Multi-Accounting\n      SEON helped EZY Gaming prevent multi-accounting by using real-time device intelligence to detect and block fraudulent behavior, including bonus abuse, during sign-up.\n \n        Read More\n      \n    \n\n\n\n3 Examples of Multi Accounting Fraud\n\n\n\nTo understand the different faces multi-accounting fraud can take, here are three ways that this type of fraud can manifest:\n\n\n\nPromo Abuse:\n\n\n\nAlso called coupon or bonus abuse, fraudsters create multiple accounts in promo abuse to take advantage of incentives, free trials, coupons and other offers. This activity is driven by the intent to disproportionately benefit from special introductory offers typically designed to be used once per new user to encourage them to try a new service or product.\n\n\n\nThe process often involves sophisticated tactics to conceal the true identity of the abusers, like using VPNs to mask IP addresses, creating fake email accounts or employing bots to automate sign-ups. Fraudsters who commit promo abuse manipulate offers by registering several times under different identities or through various contact details to sidestep limitations set by the companies. This not only results in undue financial gains for the abusers at the expense of the company but also skews marketing data and can lead to losses in revenue. Additionally, this kind of abuse can undermine the trust of genuine customers and dilute the perceived value of the company’s offering.\n\n\n\nFake Reviews:\n\n\n\nCommon in ecommerce, online dating and travel industries, fake reviews involve fraudulent activities where individuals or coordinated groups use multiple accounts to generate positive (or sometimes negative) reviews, ratings or feedback to impact the reputation of a product or service. This deceptive practice is intended to manipulate the perceived quality or popularity of an offering.\n\n\n\nIn ecommerce, fake reviews can make a product appear more reliable or popular than it is, leading to increased sales. In online dating, it may be used to enhance the attractiveness of a profile, increasing its visibility and interactions. Hotels, restaurants and tourist attractions may appear more appealing or less desirable in the travel industry based on manipulated feedback, influencing booking rates and business reputations.Fraudsters typically create or buy multiple fake accounts or hire individuals to post reviews praising or disparaging competitors’ products. These reviews are crafted to seem authentic, mimicking the language and style of genuine customers to evade detection by both users and platforms’ automated systems. The impact of fake reviews extends beyond misleading consumers; it can distort fair competition, degrade trust in online platforms and result in financial losses for consumers and legitimate businesses.\n\n\n\nAffiliate Fraud\n\n\n\nAffiliate fraud in the context of multi-accounting is a deceptive practice where individuals or groups exploit affiliate marketing programs by creating multiple accounts. Affiliate marketing involves companies paying commissions to external sites or affiliates for directing traffic or sales through referrals. This fraud typically occurs when fraudsters illegally simulate fake transactions or referrals to claim these commissions.Common methods include fake transactions where multiple accounts are used to appear as genuine purchases, using stolen credit card details or making actual purchases that are later canceled to generate commissions. Fraudsters may also self-referral, sign up as affiliates, and use other accounts to purchase through their referral links. They may also commit click fraud by generating excessive clicks on affiliate links without intending to make purchases. Some even manipulate tracking systems to inflate commissions unfairly.The impact of multi-accounting in affiliate fraud is profound, draining financial resources by paying out unwarranted commissions and skewing analytics, leading to inaccurate business insights.\n\n\n\n\n\n\n\nBut there’s more; below we'll look at some examples of multi accounting that are specific to different verticals.\n\n\n\nIndustries Impacted by Multi Accounting Fraud\n\n\n\nThe following industries are the most affected when it comes to multi accounting scams:\n\n\n\n\nEcommerce: Companies face significant challenges in this sector with multi-account payment fraud and promo abuse. Fraudsters exploit these platforms to initiate chargebacks and abuse discount codes or special offers on a large scale, creating substantial financial burdens for merchants.\n\n\n\nLoan Providers: Online loan providers are particularly vulnerable to fraudsters who use multiple accounts to secure loans fraudulently and disappear without repayment. Similarly, financial institutions must vigilantly prevent these actors from accessing promotional offers or manipulating payment methods for illegal purposes.\n\n\n\nOnline Dating: In the social media and online dating world, users will create multiple accounts to reach more people - often to scam or spam users.&nbsp;\n\n\n\nTravel: The travel industry faces challenges from fake bookings and fraudulent reviews, which can be perpetrated by scammers or competitors seeking to damage the reputations of legitimate businesses.\n\n\n\nGambling / iGaming: Players in digital gaming often create secondary accounts to test strategies without jeopardizing the statistics of their leading accounts – a practice known as smurfing that, while seemingly benign, can destabilize the gaming ecosystem. Other tactics like arbitrage and matched betting involve users, including some high-profile gamblers, opening multiple accounts to unfairly influence game outcomes and betting odds, thereby compromising the fairness and integrity of the platforms.\n\n\n\n\nSolutions for Multi Accounting Fraud\n\n\n\nMulti-accounting fraud persists due to the potential for illicit profits by exploiting system vulnerabilities. In response, many companies have begun investing in advanced detection techniques, such as machine learning algorithms capable of analyzing patterns and stricter verification processes to confirm users’ authenticity and feedback.\n\n\n\n\nDigital Footprinting: By tracking an individual’s digital interactions and online presence, digital footprinting gathers extensive data that includes social and digital indicators, forming a comprehensive social profile from details acquired during initial user onboarding, such as email and phone numbers. This process aids in accurately distinguishing between legitimate and suspicious activities, enhancing the accuracy of fraud prevention measures.\n\n\n\nDevice Intelligence: This anti-fraud method analyzes thousands of real-time attributes of hardware and software on desktop and mobile platforms and examines user behavior patterns that may indicate fraud.\n\n\n\nEmail analysis: Through data enrichment techniques, this approach involves a detailed examination of email addresses, assessing factors like domain authenticity, registration date, and linkages to social media, which can indicate the legitimacy of a user account. Notably, many fraudsters tend to use newly created emails from free service providers with no history of data breaches.\n\n\n\nIP analysis: Advanced IP analysis extends beyond basic checks to include geolocation services, monitoring VPNs, Tor networks and other methods that mask a user’s actual location, often employed in multi-accounting fraud schemes.\n\n\n\n\nKey Takeaways for Multi Accounting\n\n\n\nMulti-accounting is a pervasive problem that poses significant challenges across various sectors. Advanced detection techniques and rigorous verification processes are critical to combat deceptive practices. \n\n\n\nUtilizing tools like device intelligence, digital footprinting, IP analysis, email analysis and phone number analysis helps identify and mitigate fraudulent activities. These methods collect and analyze a vast array of real-time data points to distinguish between legitimate users and potential fraudsters, ensuring that platforms can maintain the integrity of their operations and protect genuine customers.\n\n\n\nFrequently Asked Questions \n\n\n\nHow to detect multi accounting? There are multiple options to detect multi accounting which you can layer up, some include: cookies, local storage, geolocation and IP address information, device fingerprinting.  What industries are targeted by multi accounting? Any industry that offers some form of sign up bonus is likely to be a target of multi accounting as well as websites that might ban / blacklist users due to cheating or illegal activities.  Is multi accounting illegal? Technically the act itself is not illegal, unless using another REAL persons identity, however many businesses will state that multi accounting is a direct violation of their terms and conditions.   \n\n\n\n\n      Protect your bottom line with SEON\n      Partner with SEON to reduce fraud rates in your business with real time data enrichment and advanced APIs\n \n        Ask an Expert\n      \n    \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON: How to Prevent iGaming Fraud\n\n\n\nSEON: Online Gambling Fraud: Detection &amp; Prevention\n\n\n\nSEON: Transaction Monitoring in iGaming: How It’s Used to Fight Fraud\n\n\n\n\nFurther Reading\n\n\n\nLearn more about:\n\n\n\nDigital Footprinting |&nbsp;Device Fingerprinting&nbsp;|&nbsp;Fraud Detection Machine Learning | Fraud Detection &amp; Prevention"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/multi-accounting/","url":"https://seon.io/resources/multi-accounting/","name":"Multi Accounting | Who is Affected & How to Stop It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/multi-accounting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","datePublished":"2019-09-10T04:12:03+00:00","dateModified":"2025-12-24T12:22:55+00:00","description":"Multi accounting is a growing problem for all kinds of businesses. Want to know why fraudsters do it and how do stop it? Here is your guide.","mainEntity":[{"@id":"https://seon.io/resources/multi-accounting/#faq-question-1633535099312"},{"@id":"https://seon.io/resources/multi-accounting/#faq-question-1633535104972"},{"@id":"https://seon.io/resources/multi-accounting/#faq-question-1633535115739"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/multi-accounting/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/multi-accounting/#faq-question-1633535099312","position":1,"url":"https://seon.io/resources/multi-accounting/#faq-question-1633535099312","name":"How to detect multi accounting?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"There are multiple options to detect multi accounting which you can layer up, some include: cookies, local storage, geolocation and IP address information, device fingerprinting.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/multi-accounting/#faq-question-1633535104972","position":2,"url":"https://seon.io/resources/multi-accounting/#faq-question-1633535104972","name":"What industries are targeted by multi accounting?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Any industry that offers some form of sign up bonus is likely to be a target of multi accounting as well as websites that might ban / blacklist users due to cheating or illegal activities.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/multi-accounting/#faq-question-1633535115739","position":3,"url":"https://seon.io/resources/multi-accounting/#faq-question-1633535115739","name":"Is multi accounting illegal?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Technically the act itself is not illegal, unless using another REAL persons identity, however many businesses will state that multi accounting is a direct violation of their terms and conditions. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/guides/fraud-dictionary-by-seon/#article","isPartOf":{"@id":"https://seon.io/resources/guides/fraud-dictionary-by-seon/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"The SEON Fraud Dictionary &#8211; Part 1: Common Online Fraud Types","datePublished":"2019-11-21T06:01:13+00:00","dateModified":"2025-04-03T09:17:54+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/guides/fraud-dictionary-by-seon/"},"wordCount":1582,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/guides/fraud-dictionary-by-seon/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2019/11/seon-blog-Fraud-Dictionary_P1-byJM.png","articleSection":["Article"],"inLanguage":"en-US","description":"Defining and understanding the fraud types you’re most likely to encounter online.\n\n\n\nLooking at future fraud trends, it is likely more and more businesses will need to be prepared against threats, attacks, and criminals online.\n\n\n\nSo whether you are new to fraud prevention or a seasoned expert, we thought it would help to gather all the definitions of terms you might come across in this fight.\n\n\n\nAccount FarmingAccount TakeoverAffiliate FraudArbitrage (Gambling Fraud)Auction FraudBIN AttackBonus AbuseBot AttacksCardingCard Cloning / SkimmingCard Testing&nbsp;ChargebackClean FraudFraudFriendly FraudGhost BrokingIdentity FraudIdentity TheftMatched BettingMulti AccountingPromo AbuseReshippingSIM SwappingSpoofingSynthetic IDTransaction Fraud\n\n\n\n\nAccount Farming\n\n\n\nThe fraudulent practice of creating and maintaining multiple accounts with a platform in order to resell them later. Very popular with social media sites.&nbsp;\n\n\n\n\nAccount Takeover\n\n\n\nA form of identity fraud where fraudsters gain access to a victim’s account. This can be for an online store account, bank account, or even app login. The goal is usually to extract monetary funds, but account takeovers (ATOs) are increasingly used for other means, such as abusing promotions and coupons, extracting more user information, or cheating on gambling sites.&nbsp;\n\n\n\nAn example about the anatomy of an ATO from our ebook:\n\n\n\n\n\n\n\n\nAffiliate Fraud\n\n\n\nAffiliate marketing is a model where marketers are rewarded for directing visitors towards a specific business. The company tracks conversions through referral links, and pays out money to the best marketers.&nbsp;\n\n\n\nFraudsters try to earn these commissions by: spamming the referral links; using software to imitate human behavior and generate fake clicks and transactions; and maliciously diverting traffic from other sites.&nbsp;\n\n\n\nIn some cases they will clone the vendor’s website, and host it on a domain name that looks similar. More advanced techniques include malicious browser extensions that swap legitimate affiliate URLs for their own, and even inject ads with referral links into ad-free web pages.&nbsp;&nbsp;\n\n\n\n\nArbitrage (Gambling Fraud)\n\n\n\nIn the world of online betting and gambling, arbitrage is a technique which sees fraudsters create multiple accounts to increase their winning odds. It is sometimes referred to as an “arb” performed by “arbers”.\n\n\n\n\nAuction Fraud\n\n\n\nA type of e-commerce fraud type specific to auction sites. It involves non-delivery of products, where fraudsters create fake listings for items that are never sent. They can also purchase items with stolen card details and ship them, thus making a profit on something they didn’t pay for.\n\n\n\n\nBIN Attack\n\n\n\nCredit cards come with various ranges in BIN (Bank Identification Numbers). If these numbers aren’t properly randomized, it is possible for an attacker to generate valid card numbers based on a real one. However, the CVV and validity / expiry dates make this process very unlikely to succeed.\n\n\n\n\nBonus Abuse\n\n\n\nAlso known as promo or coupon abuse. This type of fraud sees fraudsters create multiple accounts to cash out promotional offers. It can be used for signup bonuses, and is particularly prevalent in the gambling industry.\n\n\n\n\nBot Attacks\n\n\n\nIn the context of fraud prevention, bots are used to automate and repeat the same attack with different data until it works. Bots can be used to attempt ATOs, create multiple accounts (account farming), or process numerous stolen credit card numbers at checkout.\n\n\n\n\nCarding\n\n\n\nGeneral fraudster term for using stolen credit card data. This is either used for direct purchases, or charging prepaid or gift store cards, which are then resold.\n\n\n\n\nCard Cloning / Skimming\n\n\n\nA two step process for creating physical credit cards with stolen data. The skimming part is either done manually by malicious people (waiters, shopkeepers…) or machines at unattended places such as ATMs or gas stations. The goal is to gather all the data from a real card.\n\n\n\nFraudsters can then create a new physical card, effectively cloning the original. The data is written on the counterfeit card ‘s magnetic strip via specific devices.&nbsp;\n\n\n\nSophisticated fraudsters also go as far as creating fake online stores specifically designed to&nbsp; acquire card data for stealing funds or reselling it.\n\n\n\n\nCard Testing&nbsp;\n\n\n\nFraudsters who acquire a credit or debit card number use this method to verify it works. It is done by making a very small purchase that won’t be detected. If the purchase goes through, the fraudsters proceed to making larger purchases, usually with a different merchant.\n\n\n\n\nChargeback\n\n\n\nChargebacks are a protection for buyers who want to dispute online purchases. They can claim a chargeback to defend themselves against fraud or purchases made without their knowledge or permission.&nbsp;\n\n\n\nThe credit card company involved with the transaction will review the chargeback claim and review evidence for or against it. If it is approved, the buyer is refunded, and the merchant has to pay a chargeback fee to cover the administrative costs.\n\n\n\nHere is the anatomy of a chargeback:\n\n\n\n\n\n\n\n\nClean Fraud\n\n\n\nAlso known as Friendly Fraud, First-Party Fraud or Fraud by False Claim. It’s fraudulent transactions that don’t get detected as they appear legitimate. Harder to flag because it only involves real data, so no fake identities or user accounts.&nbsp;\n\n\n\n\nFraud\n\n\n\nUsing deception for personal gain. While online fraud is considered a cybercrime, not all cybercrime has to do with online fraud in nature. Protecting businesses against it is the job of fraud analysts. They can use a fraud prevention tool, or fraud filter to automate the process.\n\n\n\n\nFriendly Fraud\n\n\n\nWhen customers claim a chargeback for being the victims of fraud. It’s also known as lie fraud and is the fastest growing reason for chargebacks. Friendly fraud happens when buyers experience remorse, they refuse to pay for a family member’s purchase, or simply want to exploit the system to gain a product or service without paying for it.\n\n\n\nSee also: clean fraud\n\n\n\n\nGhost Broking\n\n\n\nThe practice of fraudulently selling inexistant insurance policies. Many victims do not realise their insurance isn’t valid until it’s too late, for instance in the case of a car accident.\n\n\n\n\nIdentity Fraud\n\n\n\nThe activity that uses someone’s personal information without authorization, and for personal gain. It all falls under the general online fraud umbrella, but focuses on data such as personal identification elements: date of birth, first and last name, social security number, card number or even personal photos.&nbsp;\n\n\n\n\nIdentity Theft\n\n\n\nAcquiring someone’s personal data such as credit card numbers, phone number, or other data points in order to impersonate for a number of actions: opening new accounts, applying for loans, purchasing goods, or posting fake ads and reviews.\n\n\n\n\nMatched Betting\n\n\n\nUsing multiple accounts on gambling sites to improve betting odds and make money from free offers. A person will place a Back bet (backing a certain outcome). They will then create another account to place a Lay bet (backing the opposite outcome). This cancels out the losses, but allows them to profit from the free bet offer. Note that matched betting is legal in some regions, such as the UK.&nbsp;\n\n\n\nSee also: Bonus abuse, Multi accounting\n\n\n\n\nMulti Accounting\n\n\n\nWhen one person creates multiple accounts with the same platform. It can be innocent (lost login details) or for fraudulent purposes, such as matched betting, bonus abuse, or creating fake reviews.\n\n\n\n\nPromo Abuse\n\n\n\nSee also: Bonus abuse\n\n\n\n\nReshipping\n\n\n\nAlso known as Delivery Address Fraud and Fake Address Fraud. A process where criminals fool people into sending goods or cashier cheques purchased with stolen credit cards, usually to an address not linked to their name. It helps muddy the trail between fraudulent purchases and delivery addresses.\n\n\n\n\nSIM Swapping\n\n\n\nA.ka. SIM splitting or SIM jacking. Takes advantage of 2FA via SMS. Sees fraudsters acquire a phone number through hacks, phishing or sheer luck. They then call the mobile phone’s provider, and claim to want to change their number to a new one. The new number, which is in the fraudster’s possession, will then receive all the SMS used for mobile verification, which allows them to access other accounts such as email, social media, or even mobile banking.\n\n\n\n\nSpoofing\n\n\n\nFalsifying data such as an IP address, email address or caller ID. For instance, spammers will spoof a sender email address to mislead the recipient or gain their trust for phishing.&nbsp;\n\n\n\n\nSynthetic ID\n\n\n\nUnlike common identity fraud, Synthetic ID fraud combines pieces of real personal data with fake data to create a new, untraceable identity. An example is the rise in synthetic IDs that use children’s personal info in order to have a clean credit score for loaning fraud.\n\n\n\n\nTransaction Fraud\n\n\n\nTransaction fraud, or payment fraud and credit card fraud, is a broad term that covers any fraud type committed when purchasing a service or item. It is the direct result of card theft, account takeover, or card cloning.\n\n\n\nSee also: ATO, BIN attack, Card cloning&nbsp;&nbsp;\n\n\n\nCommon Fraud Types: The Bottom Line\n\n\n\nOnline fraud evolves at an alarming pace, so no dictionary on the topic will ever be complete. We will try our best to keep this one updated for our whole ongoing series. You can find links to the following parts here:\n\n\n\n\nPart 2: Focuses on cybercrime as a whole and fraudster terminology\n\n\n\nPart 3: Looks at fraud prevention terms and techniques\n\n\n\n\nHopefully, it will give you all the knowledge and insights needed to understand fraud, and prepare yourself against it in the future.\n\n\n\nYou may also download the full dictionary here."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/guides/fraud-dictionary-by-seon/","url":"https://seon.io/resources/guides/fraud-dictionary-by-seon/","name":"The SEON Fraud Dictionary: Part 1 - Common Online Fraud Types","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/guides/fraud-dictionary-by-seon/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2019/11/seon-blog-Fraud-Dictionary_P1-byJM.png","datePublished":"2019-11-21T06:01:13+00:00","dateModified":"2025-04-03T09:17:54+00:00","description":"Online fraud evolves at a rapid pace. We've created this resource to give you an overview of the most common fraud types affecting businesses.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/guides/fraud-dictionary-by-seon/#primaryimage","url":"https://seon.io/wp-content/uploads/2019/11/seon-blog-Fraud-Dictionary_P1-byJM.png","contentUrl":"https://seon.io/wp-content/uploads/2019/11/seon-blog-Fraud-Dictionary_P1-byJM.png","width":1400,"height":800,"caption":"fraud types"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Card Not Present (CNP) Fraud: What Is It &#038; How to Prevent It","datePublished":"2020-03-03T07:24:51+00:00","dateModified":"2025-12-24T12:26:58+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/"},"wordCount":2522,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"As Card Not Present fraud continues to hurt the payment ecosystem including merchants, issuers, and acquirers, we wanted to offer some suggestions on what actions your business can take to reduce it today. \n\n\n\nThe core of the problem with card not present fraud (CNP) can be explained in one simple question: How do you prove that cardholders are who they say they are?\n\n\n\nIt’s not an easy task, and it’s what makes them so risky. Sadly, card not present fraud continues to be an expensive affair, set to cost issuers, merchants, and acquirers an estimated $34.66B by 2022. \n\n\n\nLuckily, it’s a plague everyone is working together to fight. And there’s actually a lot you could do, as an online business, to reduce CNP (and card-present) fraud yourself today.\n\n\n\nWhat Is Card Not Present (CNP) Fraud?\n\n\n\nIn short, CNP fraud is described as a fraudulent payment/scam without consent of the correct card owner. Most common forms and techniques with CNP fraud include:\n\n\n\n\nonline sales\n\n\n\nmobile sales\n\n\n\ntelephone transactions \n\n\n\nskimming and testing\n\n\n\n\nSince the merchant is unable to physically confirm if the person is in fact who they say they are, as the purchase was made via an online transaction, it's important to gather much information on your customers to mitigate risk. \n\n\n\nCNP fraud prevention works by gathering user data, analyzing user behavior, and highlighting suspicious cards not present transaction information. This info should be enriched using IP address analysis, device fingerprinting, and social media lookup.\n\n\n\nHow Does Card Not Present Fraud Work?\n\n\n\nCNP fraud takes place whenever a fraudster acquires some form of payment information, such as a credit card number, a person's name, address details, or the 3 digit security number on the back, to then purchase products.\n\n\n\nNowadays fraudsters can easily purchase 'fullz' where complete stolen profiles are uncovered through data breaches or phishing attacks and can be purchased via the dark web.\n\n\n\nIn most instances, liability for fraudulent CNP transactions falls onto the merchant whereby chargebacks are a common sight as the victim often only reacts once it's spotted. \n\n\n\n\n      Prevent and Detect Payment Fraud Better\n      Payment fraud prevention is the key to safer and healthier business growth. We take a look at what systems must be in place for it to work.\n     \n        Read About It Here\n      \n    \n\n\n\n10 Tips for Card Not Present Fraud Prevention\n\n\n\nSince the majority of the time liability falls on the merchant, payment service provider, or the victim's bank, it's vital to understand the best ways to protect your business from CNP fraud. Modern solutions have been developed to help you spot the true customer or the fraudster.\n\n\n\nCollect All the Customer Info You Can&nbsp;\n\n\n\nGenerally speaking, the more customer info you have, the better. This is true in the context of credit card fraud detection, but also marketing and sales, and card processing. Upselling, cross-selling and good segmentation can be improved thanks to the same info that allows you to validate user IDs, or to dispute a chargeback.\n\n\n\nAs to the kind of content you should gather, the bare minimum would be:\n\n\n\n\nEmail address\n\n\n\nCredit card info including CVV code\n\n\n\nBilling address\n\n\n\nInformation about the device used to log in\n\n\n\nIP address\n\n\n\nPhone number\n\n\n\n\nNow you have three main touchpoints to gather that information: account registration, login or at the point where you take credit card payments.&nbsp;\n\n\n\nAnd while it’s your duty to follow the best SCA practices, there’s a lot more info you can collect. User devices, phone numbers or email addresses can go a long way in filtering out bad agents - or at least prove they’re risky users, as we’ll see later.\n\n\n\n\nWhy it works: The more knowledge you have about a user, the easier it can be to refuse suspicious payments that could be clear cases of card not present fraud. &nbsp;\n\n\n\nMain challenge: Collecting information without creating too much friction for the user, which can hurt conversions and sales.\n\n\n\n\nUse Data Enrichment\n\n\n\nIf you read the first tip and wondered: How do I collect extra info without creating friction? The answer is data enrichment. It’s no wonder these tools are used by everyone from ecommerce to financial institutions these days.\n\n\n\nPut simply, it is a process that takes single data points and uses them to aggregate info from external sources. For instance, an account email address is analyzed and found to be used for registration with social media profiles. Likewise, you take a phone number and see if it’s a landline or cell phone, and in which country.\n\n\n\nAll that info helps detect suspicious discrepancies. And best of all, it can be done pretty much instantly, and without asking the users for extra authentication steps if you use the right tools.\n\n\n\n\nWhy it works: Data enrichment can be invisible to the cardholder, which helps you reduce danger without creating too many obstacles for the right customers.\n\n\n\nMain challenge: Enriching data from sources that make sense, and from fresh, open-source datasets. For instance, by linking an email address to the user’s connected social media accounts in use, which should be done by meeting GDPR requirements.\n\n\n\n\nFollow the Best Data Protection Practices\n\n\n\nEven though the customer isn’t standing in front of you, it’s still your job to protect their credit information. At least that’s what PCI Data Security Standard (PCI DSS) says, and it’s mostly to protect every merchant from potential CNP fraud attempts (and card-present too).\n\n\n\nIn practice, that means using online security tools like SSL, especially on pages that collect sensitive information such as credit cards, social security numbers, or addresses. You should also encrypt data as efficiently as possible, whether it’s shared between your customers and website, or between staff members.&nbsp;\n\n\n\n\nWhy it works: Data that’s encrypted and safeguarded is less likely to fall into the wrong hands, which reduces fraud as a whole.\n\n\n\nMain challenge: Managing backup copies and configuring protection software and hardware can be costly due to rapid growth. It’s the #1 most cited challenge by industry experts.\n\n\n\n\nCheck Unusual Behaviour\n\n\n\nHopefully by now, you have enough information to start gathering insights about user behavior. While what is considered fishy can differ from one merchant or payment processor to the next, there are a few general red flags to keep an eye for, perfectly exemplified in the graphic below:\n\n\n\n\n\n\n\n\nWhy it works: Fraudsters often try to work fast, and use multiple stolen card details in a row to maximize how much they can extract. This means their behaviour follows certain patterns that point to digital fraud.\n\n\n\nMain challenge: Analyzing behaviour is very difficult to do without a proper risk management solution in place as the merchant needs it to be done in real time.\n\n\n\n\nLook Out for Very Small Transactions\n\n\n\nNot all the fraudulent payments made to your business will impact you directly. Sometimes, fraudsters will use you to “test a card”, usually by purchasing inexpensive items or services.\n\n\n\nOf course, if the transaction goes through, fraudsters could very well use the same stolen card to purchase more expensive items, which will damage your business eventually.&nbsp;\n\n\n\n\nWhy it works: Identifying card testing as soon as possible can help prevent fraudsters from using stolen card details for larger transactions.\n\n\n\nMain challenge: Keeping an eye on small transactions that would otherwise go under the radar.\n\n\n\n\nAnalyze Gift Cards\n\n\n\nGift card fraud is often a problem that goes hand in hand with CNP fraud. Individuals looking to quickly turn stolen products into cash will often activate gift cards using stolen payment details, then sell these digitally delivered funds on an open marketplace within minutes.\n\n\n\nIf your company has a loyalty program or offers gift cards as a product (or payment method) it helps to be extra vigilant there.\n\n\n\n\nWhy it works: Adding an extra hurdle for fraudsters who want to perform gift card fraud can help reduce card not present fraud too.&nbsp;\n\n\n\nMain challenge: Offering enough payment channels and loyalty programmes without suffering from bonus abuse.\n\n\n\n\nAsk for Extra Authentication\n\n\n\nAt this stage, you should have all the insights you need to segment users based on how risky they are. So it’s time to reduce the risk by asking for extra authentication details.&nbsp;\n\n\n\nAt SEON, we like to call it light and heavy KYC. And our management system is adept at only triggering the heavy authentication methods based on your own thresholds. That means that legitimate users will be able to purchase with as little friction as possible, while potential CNP and card present fraudsters will have a harder time going through the hoops.\n\n\n\n\n\n\n\nIn practice, you’ll be looking at first enabling light KYC tools like email analysis, IP analysis, or device fingerprinting, amongst others.\n\n\n\nIf you find enough red flags to be worried, you can then trigger additional authentication measures such as ID verification, 2FA or credit card preauthorization.\n\n\n\n\nWhy it works: You keep your customers happy, and discourage card not present fraudsters by letting them know they are suspicious.\n\n\n\nMain challenge: Once again, it can be hard to automate adaptable KYC at scale without the right system.\n\n\n\n\nDispute Chargebacks\n\n\n\nOne aspect of card not present fraud we haven’t really covered yet is the problem of friendly fraud. As you may already know, there’s nothing friendly about it. Card not present transactions that could damage your business occur when:\n\n\n\n\nCustomers change their mind about a purchase and claim it was fraudulent\n\n\n\nUse their real card to try and scam the system by claiming a chargeback\n\n\n\nFamily members are processing payments on the card without authorization\n\n\n\n\nThe takeaway here is that the chargeback is clearly the customer’s fault. And believe it or not, issuers and banks are actually quite good at siding with businesses, if you have all the right data to back up your claim (which goes back to my tip #1 and #2).\n\n\n\nSo what can you do armed with enriched data? Well, for instance, one of our clients uses our social media analysis tool. They found that some customers claimed they’d never received the product, and discovered social media posts of them showing the very same product off online. Talk about getting caught red-handed.\n\n\n\n\nWhy it works: If you have the right info at hand, it can be easier than you think to win a chargeback dispute, which can be considered friendly fraud.\n\n\n\nMain challenge: Collecting the right data at the right time.\n\n\n\n\nLook into Velocity Rules\n\n\n\nThe last two tips are more technically advanced, and I don’t imagine you’d be able to do it without a complete end-to-end solution.&nbsp;\n\n\n\nSo if your system allows it, I would highly recommend looking at velocity rules. These are rules for calculating risks such as transaction fraud that look at connections and combinations of points happening during a set timeframe, such as:\n\n\n\n\nShipping address connected to multiple different cards in a short period of time\n\n\n\nHigh number of transactions on the same card\n\n\n\nHigh order value and fastest shipping method\n\n\n\nHigh priced items orders during the day...\n\n\n\n\nSo it is a kind of behaviour profiling, and a highly efficient one at that.&nbsp;\n\n\n\n\nWhy it works: Another way of profiling CNP fraudsters behaviour, without creating friction for legitimate users.\n\n\n\nMain challenge: The number of combinations of velocity rules is virtually infinite, so you need to refine your search (or let an AI system help) to extract good parameters.\n\n\n\n\nBuild Risk Scoreboards\n\n\n\nReducing card present and card not present fraud is all about calculating risk and setting your thresholds. So sometimes you need to have enough data on fraudsters to be able to predict who will be a bad customer. \n\n\n\nOne convenient way to do it is through risk scoreboards, which allow you to cluster users based on similar data, behavior and risk score.\n\n\n\nThese scoreboards, which use statistical models, can vary greatly in complexity, so I won’t go into too many technical details here. But whether you do it manually or use an automated solution, scoreboards are a fantastic way to detect fraud, and therefore reduce potential damage.&nbsp;\n\n\n\n\nWhy it works: Creating risk models helps extract insights about bad users and detect fraud before it can happen.\n\n\n\nMain challenge: Risk scoreboards are complex statistical models that can be hard to create manually.\n\n\n\n\nSolutions for Card Not Present Fraud\n\n\n\nFor businesses, there are a range of fraud prevention products available to integrate into your business, whether you require a full end-to-end system or individual modules. \n\n\n\nIdeally, you want to cover the 10 points above but it's also worth considering if you need to further protective measures such as biometrics, captcha or one time passwords.\n\n\n\nA device fingerprinting module will enable your fraud manager to analyze the hardware and software of a person visiting/transacting on your website.\n\n\n\nDevice fingerprinting pulls thousands of usable data points to spot potentially malicious actors, some of those parameters include:\n\n\n\n\nIP address\n\n\n\nHTTP request headers\n\n\n\nPlugins or fonts\n\n\n\nOperating system\n\n\n\nVPN and browser information\n\n\n\nTime zone&nbsp;and language\n\n\n\nUser agents \n\n\n\nAnd much more..\n\n\n\n\nUnderstanding as much as you can about any user and not taking advantage of all available data / overlooking siloed data will be a sure way to miss CNP fraud.\n\n\n\nCard Not Present (CNP) Transaction: Do It Right\n\n\n\nLike with many other types of fraud, the best way to improve your CNP transactions is to be prepared, well-equipped, and knowledgeable. This is true whether you use a full end-to-end fraud prevention system or multiple layers of protection via different tools.\n\n\n\nSimplifying data enrichment for small businesses is also something we’ve been thinking about a lot at SEON. This is why we even created a tool that gives you complete flexibility by working as a one-click data enrichment solution: our Extension for Google Chrome.&nbsp;\n\n\n\nIt’s designed to speed up data enrichment based on email addresses, phone numbers or IP addresses, so you can start reducing CNP fraud in one click today.&nbsp;\n\n\n\n\n      Detect Card Not Present Fraud with SEON\n      Partner with SEON to reduce fraud rates in your business with real time data enrichment and advanced APIs\n     \n        Ask an Expert\n      \n    \n\n\n\nFrequently Asked Questions\n\n\n\nWho is liable for card-not-present fraud? In most cases it will fall on the merchant however depending on the security setup it can also cost the payment service provider or bank.  How common is card not present fraud? Very common. In the US alone it's predicted that CNP fraud costs consumers and businesses upwards of $10bn.  How do you protect against card not present fraud? The best way of ensuring protection would be using some form of multi-factor authentication.  \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON: How to Fight Return Fraud\n\n\n\nSEON: Payment Fraud Prevention &amp; Detection\n\n\n\n\nLearn more about:\n\n\n\nDevice Fingerprinting | Browser Fingerprinting |  Fraud Detection API \n\n\n\nSources used for this article\n\n\n\n\nPayments Journal: A Smart Solution to Manage Card Fraud\n\n\n\nPCI Security Council: Protect your business. Secure your payment data\n\n\n\nTech Republic:  Data protection: Top 3 business challenges"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/","url":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/","name":"Card Not Present Fraud: What It Is & How to Prevent It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","datePublished":"2020-03-03T07:24:51+00:00","dateModified":"2025-12-24T12:26:58+00:00","description":"Card not present (CNP) fraud hurts merchants everyday. Discover what CNP fraud is and how you can prevent it with our top 10 tips.","mainEntity":[{"@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#faq-question-1632096923311"},{"@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#faq-question-1632097373986"},{"@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#faq-question-1632097465328"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#faq-question-1632096923311","position":1,"url":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#faq-question-1632096923311","name":"Who is liable for card-not-present fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"In most cases it will fall on the merchant however depending on the security setup it can also cost the payment service provider or bank.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#faq-question-1632097373986","position":2,"url":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#faq-question-1632097373986","name":"How common is card not present fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Very common. In the US alone it's predicted that CNP fraud costs consumers and businesses upwards of $10bn.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#faq-question-1632097465328","position":3,"url":"https://seon.io/resources/10-tips-to-reduce-card-not-present-cnp-fraud/#faq-question-1632097465328","name":"How do you protect against card not present fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The best way of ensuring protection would be using some form of multi-factor authentication.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#article","isPartOf":{"@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/"},"author":{"name":"Agnes Csoka","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6"},"headline":"Data Enrichment: What Is It and Why It Matters","datePublished":"2020-03-24T07:10:39+00:00","dateModified":"2026-04-13T16:43:26+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/"},"wordCount":1436,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"In today's data-driven landscape, businesses are increasingly turning to data enrichment to enhance decision-making and operational efficiency. This process involves augmenting raw data with additional context, transforming basic information into valuable insights.\n\n\n\nReflecting this trend, the global data enrichment solutions market is projected to grow from $2.58 billion in 2024 to $2.9 billion in 2025, at a compound annual growth rate (CAGR) of 12.6%.\n\n\n\nIn this article, we delve into the fundamentals of data enrichment, its applications across various industries and its pivotal role in modern business strategies.\n\n\n\nWhat Is Data Enrichment?\n\n\n\nData enrichment is the process of enhancing raw data by adding contextually relevant information from one or more external sources. This might include internal databases, third-party data providers or open-source intelligence (OSINT). The goal is to transform a basic data point — such as an email address or phone number — into a fuller, more actionable profile.\n\n\n\nFor example, with just an email address, it’s possible to uncover associated social media accounts, domain validity, breach history and more. These insights can help verify identities, assess risk or personalize user experiences without asking the user to provide more information.\n\n\n\nAt SEON, data enrichment plays a central role in helping businesses fight fraud, assess creditworthiness using alternative data and identify high-value customers. Our solutions analyze data points across 300+ digital and social platforms in real time, generating a complete risk profile from as little as an email address or phone number.\n\n\n\n\n\nWhy Is Data Enrichment Important?\n\n\n\nData enrichment helps businesses learn more about users without asking for additional information, enhancing insights while reducing friction. For instance, verifying an identity can often start with just an email address or phone number, streamlining risk checks without slowing the user journey.\n\n\n\nEnrichment becomes especially valuable when companies:\n\n\n\n\nExpand into new markets\n\n\n\nAdapt to emerging trends\n\n\n\nLaunch or scale digital operations\n\n\n\nAim to reduce form fields and improve UX\n\n\n\nOptimize targeting and segmentation\n\n\n\nMitigate fraud with minimal data\n\n\n\n\nIn short, more context means better decisions, without compromising speed or customer experience.\n\n\n\n\n      Stop Fraud with Smarter Data Enrichment\n      Leverage real-time social signals, device intelligence and transparent risk scoring powered by machine learning. Make better decisions with less friction.\n     \n        Speak with an Expert\n      \n    \n\n\n\nWhat Are the Benefits of Data Enrichment?\n\n\n\nData enrichment offers a strategic advantage by turning minimal input into actionable insight, enhancing both risk management and user experience.Key benefits include:\n\n\n\n\nDeeper user insights: Gain a fuller understanding of users to better assess risk and detect fraud.\n\n\n\nLower user friction: Reduce form fields and background checks without compromising security.\n\n\n\nReduced churn: Eliminate unnecessary steps in the user journey that often lead to drop-off or cart abandonment.\n\n\n\nReal-time decisioning: A robust enrichment tool delivers insights instantly, supporting automated workflows and seamless onboarding.\n\n\n\nFaster manual reviews: When a transaction falls into a grey area, enriched data can help analysts make quicker, more informed decisions.\n\n\n\n\nBy enriching just one or two data points, businesses can act with more confidence while keeping the customer journey smooth and secure.\n\n\n\nHow Key Industries Use Data Enrichment\n\n\n\nData enrichment helps businesses turn minimal inputs into meaningful insights, powering smarter decisions across a range of industries. Here's how it supports specific verticals:\n\n\n\n\nFinancial Services &amp; Fintech: Lenders and fintechs rely on data enrichment to verify identities, assess creditworthiness and streamline KYC. Even basic inputs like an email address can unlock valuable context with reverse email lookups, helping reduce onboarding friction while flagging risk.\n\n\n\nGaming &amp; iGaming: Operators use data enrichment to spot bonus abuse, fake accounts and underage players, often before onboarding completes. It’s also key to maintaining compliance and reducing friction for legitimate users.\n\n\n\nInsurance: Insurers enrich policyholder data to assess risk more precisely, improve customer segmentation and identify potential fraud, all while offering more personalized coverage and pricing.\n\n\n\nRetail &amp; eCommerce: Retailers apply data enrichment to personalize experiences, recommend products and detect fraud. Linking customer behavior with enriched profiles supports both marketing and secure checkout flows.\n\n\n\nFraud Prevention Across Industries: Across sectors, data enrichment helps detect fraud by building richer user profiles. Signals like email age, IP reputation and social presence can expose fake identities or high-risk behavior in real time.\n\n\n\n\nHow to Choose Data Enrichment for Your Business\n\n\n\nAs demand grows, so does the number of data enrichment providers. The key is finding a solution that aligns with your business needs and scale.&nbsp;\n\n\n\nHere are some essential factors to consider:\n\n\n\n\nManual vs. automated workflows: A manual tool may suffice for occasional checks, such as reviewing a single loan applicant. But for high-volume or real-time operations, an automated solution or integration with a third-party data provider is essential.\n\n\n\nIntegration capabilities: Consider whether the service offers API access or requires in-house implementation. Seamless integration (especially through a single, unified endpoint) can significantly reduce development time.\n\n\n\nData quality and compliance: Evaluate the data's currentness and ensure the provider adheres to data protection standards like the GDPR. Sourcing from reputable, transparent origins is critical for both performance and compliance.\n\n\n\nCost model: Most providers operate on a per-check or per-API-call basis. Look for transparent pricing structures that scale with your usage.\n\n\n\nMiddleware support: Some providers offer machine learning or decision engine layers on top of enrichment data, helping you interpret results and drive automation. These can be useful for teams that want to reduce manual analysis or add custom logic.\n\n\n\n\nHow Does Machine Learning Complete Data Enriching?\n\n\n\nCollecting enriched data is only half the equation: interpreting it effectively is where real value emerges. For many businesses, especially those without in-house data science expertise, drawing accurate conclusions from large datasets can be challenging.\n\n\n\nThis is where machine learning acts as a bridge. By analyzing patterns across enriched data points, machine learning models can surface insights, automate decisions and highlight anomalies, often in real time. These systems are particularly valuable in high-stakes use cases like fraud prevention, where speed and accuracy are critical.However, not all machine learning is created equal. It’s important to understand whether a solution uses a blackbox approach, where outputs are delivered with little visibility into why, or a whitebox model, which offers clear explanations behind each decision. The latter supports transparency, compliance and trust, especially when scores are used to flag risk or guide manual reviews.\n\n\n\n\n\n\n\nWhen machine learning is thoughtfully layered on top of enrichment, it enables scalable, consistent decision-making while still giving human teams the control and context they need to act confidently.\n\n\n\nHow SEON Uses Data Enrichment\n\n\n\nSEON brings data enrichment into the modern fraud prevention era by combining digital footprint analysis, device intelligence and machine learning into a powerful, unified solution.Starting from a single data point, such as an email address, phone number or IP, SEON’s fraud prevention platform uncovers hundreds of digital signals pulled from over 300 online sources, including social platforms, marketplaces and domain data. This enriched context allows businesses to assess user legitimacy early, often before manual reviews or costly verification steps are required. \n\n\n\nIn parallel, SEON’s device intelligence detects suspicious configurations and behavioral anomalies in real time, identifying tactics like emulators, virtual machines or spoofed environments.&nbsp;\n\n\n\nThese insights feed directly into machine learning models that deliver risk scoring tailored to each business use case. With both explainable (whitebox) and adaptive (blackbox) models, SEON ensures that teams can act with confidence, scaling decision-making without sacrificing transparency or control.\n\n\n\n\n      Uncover Risk Instantly with Digital, Social and Device Signals\n      Verify users instantly with email or phone signals. Use digital footprint analysis and device intelligence to uncover risk and reduce fraud friction-free.\n     \n        Ask an Expert\n      \n    \n\n\n\nFrequently Asked Questions\n\n\n\nWhich types of businesses use data enrichment? Data enrichment has always been useful for credit scoring and KYC (know your customer) checks. This was historically only required for financial institutions. However, these days data appending is used by companies ranging from iGaming to eCommerce.   When do you need a data enrichment? Data enrichment is ideal to learn more about users without asking them for more info. This is perfect for risk management, when you want to reduce fraud rates by gaining a 360 view of user actions such as onboarding, login or checkout.  What is a data enrichment tool? A data enrichment tool allows you to learn more about users based on a minimum amount of data points. For instance, an email address only can be cross-referenced to learn if the user exists, if they used a free or disposable domain, and if they have linked social media profiles  \n\n\n\nMore resources\n\n\n\n\nSEON:  Alternative Credit Scoring: What is it &amp; How it Works\n\n\n\nSEON:  Best Fraud Detection Software\n\n\n\nSEON:  How External Data Enrichment Improves Fraud Detection"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/","url":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/","name":"What Is Data Enrichment? Benefits, Use Cases & Tools | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","datePublished":"2020-03-24T07:10:39+00:00","dateModified":"2026-04-13T16:43:26+00:00","description":"Boost decisions, fight fraud, and cut friction with data enrichment. Learn how smart signals turn basic data into powerful business insights.","mainEntity":[{"@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#faq-question-1631264638869"},{"@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#faq-question-1631265570261"},{"@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#faq-question-1631264555106"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6","name":"Agnes Csoka","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/08/cropped-Csoka-Agi-709_web-1-min-96x96.jpg","url":"https://seon.io/wp-content/uploads/2025/08/cropped-Csoka-Agi-709_web-1-min-96x96.jpg","contentUrl":"https://seon.io/wp-content/uploads/2025/08/cropped-Csoka-Agi-709_web-1-min-96x96.jpg","caption":"Agnes Csoka"},"description":"Agnes Csoka is a content writer at SEON, where she’s been shaping narratives around fraud prevention and innovation for nearly three years. She started as a technical writer, gaining hands-on insight into SEON’s product ecosystem before moving into a broader content role. Today, she creates everything from explainers and educational articles to campaigns and social content. With a BA in English, an MA in Translation, and a background in music journalism and B2C writing at Prezi, Agnes brings clarity, creativity, and depth to technical topics, making them accessible and engaging for all audiences. Based in Budapest, she’s passionate about turning complex ideas into compelling stories.","sameAs":["https://www.linkedin.com/in/agnes-csoka-a82089123/"],"knowsAbout":["Fraud Prevention Content","Technical Writing","Content Strategy"],"jobTitle":"Content Writer","worksFor":"Agnes Csoka","url":"https://seon.io/resources/author/agicsoka/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#faq-question-1631264638869","position":1,"url":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#faq-question-1631264638869","name":"Which types of businesses use data enrichment?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Data enrichment has always been useful for credit scoring and KYC (know your customer) checks. This was historically only required for financial institutions. However, these days data appending is used by companies ranging from iGaming to eCommerce. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#faq-question-1631265570261","position":2,"url":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#faq-question-1631265570261","name":"When do you need a data enrichment?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Data enrichment is ideal to learn more about users without asking them for more info. This is perfect for risk management, when you want to reduce fraud rates by gaining a 360 view of user actions such as onboarding, login or checkout.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#faq-question-1631264555106","position":3,"url":"https://seon.io/resources/data-enrichment-what-is-it-and-its-importance/#faq-question-1631264555106","name":"What is a data enrichment tool?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A data enrichment tool allows you to learn more about users based on a minimum amount of data points. For instance, an email address only can be cross-referenced to learn if the user exists, if they used a free or disposable domain, and if they have linked social media profiles<br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/"},"author":{"name":"","@id":""},"headline":"Cryptocurrency Fraud: What to Know &#038; How to Protect your Exchange","datePublished":"2020-04-07T08:00:00+00:00","dateModified":"2026-04-15T08:48:22+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/"},"wordCount":2515,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/04/Crypto-exchange-fraud-main.png","articleSection":["Article"],"inLanguage":"en-US","description":"At SEON, we’re long-term cryptocurrency believers. This is why it pains us so much to see that our favorite platforms are constantly under attack from fraudsters.&nbsp;\n\n\n\nSo we wanted to put together some ideas on how you can reduce crypto fraud at your company, especially by focusing on a transaction and user identification security.\n\n\n\nCrypto Fraud and its Beginning\n\n\n\nIt's been an up and down journey to date but it finally seems like crypto adoption is serious and the alternative payment method is here to stay but any new technology brings a level of risk and teething issues; crypto is no different.\n\n\n\nAction Fraud, the UK’s national reporting center for fraud and cybercrime,&nbsp;saw cryptocurrency fraud reports increase by 116% between June 2020 and June 2021.\n\n\n\nFrom market manipulation techniques such as pump-and-dumps to imposter websites and mining scams, since crypto transactions are irrevisable the chances of recovering any losses due to fraud are next to minimal.  \n\n\n\nThe attractive nature of \"getting rich quick\" often creates a more pressured environment for investors, therefore people are acting more on impulse and not performing the right due diligence checks. \n\n\n\nSEON itself was created after Tamas + Bence launched a crypto exchange that was attacked by cybercriminals!\n\n\n\nTypes of Crypto Fraud\n\n\n\nSince cryptocurrency and blockchain are both new technologies, there are a variety of routes for fraudsters to initiate a form of cryptocurrency scam or conduct money laundering. \n\n\n\n Some of the ways cybercriminals conduct cryptocurrency fraud include:\n\n\n\n\nTheft by hacking\n\n\n\nInitial Coin Offering (ICO) scams\n\n\n\nPump and Dumps\n\n\n\nPonzi schemes\n\n\n\nImpersonation scams \n\n\n\nGiveaway scams\n\n\n\nSIM swapping / hacking\n\n\n\n\nWhat is Crypto Exchange Fraud?\n\n\n\nThere are a bunch of ways fraud can take place within the crypto space from scam ICOs, pump and dumps as well as market manipulation.\n\n\n\nMore specifically, crypto exchange fraud counts every attack designed to extort value from a cryptocurrency exchange through illegal means. \n\n\n\nMost of the attacks happen when buying crypto, where fraudsters use stolen credit cards for payment and fake IDs to bypass the KYC checks.\n\n\n\nAccording to the Better Business Bureau, cryptocurrency fraud scams are the second-worst for businesses in North America, averaging $300 in losses for customers. (And if you’re curious, fake job posts topped the list.) \n\n\n\n32% of these scams involved the trade of cryptocurrencies for goods, services, or fiat currency. Meanwhile, 23.4 % had to do with the purchase of digital assets as purported investment opportunities.\n\n\n\nHow do Crypto Exchange Scams Work?\n\n\n\nCrypto exchange fraud happens mostly at the stage where fiat is converted to crypto. Fraudsters use stolen credit card numbers to purchase cryptocurrencies, which triggers chargeback requests from the legitimate cardholer. \n\n\n\nThere is also the key issue of compliance for KYC and AML checks (Know Your Customer and Anti Money-Laundering). As crypto exchanges become increasingly regulated, fraudsters use stolen and fake IDs to bypass the checks in order to register to the platforms, making automated crypto transaction monitoring essential to catch suspicious activity after the onboarding stage.\n\n\n\n\n      Troubles with Crypto Fraud?\n      SEON's anti-fraud tools are designed to detect suspicious usage and uncover hidden fraudsters\n     \n        Book a Demo\n      \n    \n\n\n\nThe Inherent Risks of Working With Cryptocurrency\n\n\n\nCryptocurrencies are some of the most attractive assets for fraudsters due to their nature:\n\n\n\n\nDigitized: these coins are entirely digital so fraudsters only need a computer and Internet access to break into wallets and platforms, either through hacking, phishing, or preinstalled malware.\n\n\n\nDecentralized: nobody controls cryptocurrencies, which means nobody wants responsibility when fraud happens. This makes it harder to enter a legal battle.\n\n\n\nIrreversible: A BTC or ETH transaction, for instance, can never be reversed. Fraudsters have zero incentives to refund anyone once they get paid. \n\n\n\nAnonymous / Pseudonymous: Unlike bank accounts, you don’t need personal data to receive crypto. Coins can be tracked, but fraudsters, tax evaders and money launderers still create multiple wallets or use tumblers to muddy up their trail.\n\n\n\nComplex: Cryptocurrencies are hard to understand, and tend to attract get-rich-quick scams. This opens the door to scams like fake coins, fake trading platforms, and Ponzi schemes.\n\n\n\nVolatile: not necessarily a magnet for cryptocurrency fraud, but it is a challenge, as users want to buy and sell as fast as possible.\n\n\n\n\nWhy Are Crypto Exchanges Under Attack?\n\n\n\n[bctt tweet=\"Like online banks and loan providers, exchanges are highly targeted by fraud criminals because they are the fastest way to access what is essentially digital cash.\" username=\"seon_tech\"]\n\n\n\nSo as we’ve seen, these coins trading places are inherently risky for consumers. But coin trading platforms have their own set of challenges, as it’s their job to:\n\n\n\n\nOnboard users safely\n\n\n\nProcess fiat payments to buy crypto\n\n\n\nSecure storage and transactions\n\n\n\n\nStarting with the last point, storage, it’s easy to see why anyone with bad intentions would want to get in. Like online banks and loan providers, exchanges are highly targeted by fraud criminals because they are the fastest way to access what is essentially digital cash.&nbsp;\n\n\n\nAnd the consequences of allowing bad users into your site, either as users or through backdoor hacking, can be disastrous. Just remember what bad security could do, as seen with the famous Mt. Gox incident, when the biggest exchange in the world at the time filed for bankruptcy after $473M worth of bitcoin was allegedly stolen by hackers.\n\n\n\nCrypto Exchanges and Chargeback Scams\n\n\n\nCryptocurrency exchanges must be able to receive payments safely and fast, and without much support from acquirers. Strict rules set by MasterCard and Visa (who might rightly see cryptos as direct competitors) mean only a few acquirers can actually work with exchanges.&nbsp;\n\n\n\nIn fact, the MCC (merchant classification codes) aren’t allowed by most acquirers. Those who still rely on them are essentially working without a safety net. They could lose their licenses for processing cards at any second, which doesn’t help grow a business with complete peace of mind.&nbsp;\n\n\n\nThis opens the door to transaction fraud, where a stolen credit card number is used to purchase crypto, which in turn means higher chargeback rates.\n\n\n\n\n\n\n\nAll of the above means that exchanges do not benefit from any support when criminals are involved and the cardholders request chargebacks. This makes it even harder for exchanges to deal with fraudsters than traditional retailers, as they don't have an official way to challenge the chargeback disputes.\n\n\n\nAre Crypto Exchanges Safe?\n\n\n\nFor users, the answer is always to check the platform's history. Maturity is important, and so is a history of hacking and data breaches. However, even the most secure cryptocurrency exchanges can't protect users from phishing and social engineering attacks, so it pays to be smart about your login and authentication details.\n\n\n\nWhich is the Safest Crypto Exchange?\n\n\n\nIn terms of safety of use, all major platforms offer a secure process of KYC for crypto, and since data cannot be altered or removed on blockchain as all transactions are on public record which makes money laundering somewhat difficult. \n\n\n\nSince crypto remains relatively unregulated, there is an argument that no exchange is \"safe\" however like any other investment, people should only get involved with the understanding their capital is at risk.\n\n\n\nArguably the safest exchange title could be given to Coinbase, one of the largest exchanges globally and is at least somewhat regulated in all the markets it operates in. \n\n\n\nHowever it is worth noting that for example in the UK Coinbase complies with the FCA's eMoney license, which is  nothing directly linked to crypto regulation, more so focused on the fiat transactions.  \n\n\n\nExamples of Popular Secure Crypto Exchanges Sites\n\n\n\nWhile the crypto landscape is constantly changing, at the time of writing the most popular crypto exchanges according to CoinMarketCap, are:\n\n\n\n\nBinance: founded in 2017 by Changing Zhao, a high-frequency trading software developer, Binance is now the largest exchange in the world in terms of trading volume. Its daily volume averages $30B.\n\n\n\nCoinbase: founded in 2012, Coinbase Global, simply known as Coinbase, is registered in America, but a fully remote operation. It is the most popular exchange in the US, with a global trading volume of $6.8B per day.\n\n\n\nHuobi: originally founded in China, Huobi is a key player in the APAC region with offices in Hong Kong, South Korea and Japan, but also the United States. It allows more than $6B to be traded on its platform daily.\n\n\n\nFTX: FTX Exchange is a cryptocurrency exchange that specialises in derivatives and leveraged products. It was founded in 2018 by former ETF trader Sam Bankman-Fried, and provides over 100 trading pairs.\n\n\n\nKuCoin: launched in September 2017, KuCOIN has grown into leading global crypto exchange, offering 400+ digital assets to 8M+ users.\n\n\n\n\n3 Ways to Protect Your Crypto Exchange from Fraud\n\n\n\nAs we've seen, two key strategies to protect crypto exchanges involve focusing on payments, and ID verification. \n\n\n\nConsider Alternative Payment Methods\n\n\n\nWhile certain trading platforms partner with third-party solutions to take care of the fiat &gt; coin problem, an easier solution for exchanges is to accept payments via bank transfer. They are sometimes reversible, and cheaper to process than card payments.&nbsp;\n\n\n\nHowever, this can also be problematic since transfers for trade can take days. The volatility of cryptocurrency prices means people want to buy (or sell) in real-time, at the current market rate.\n\n\n\nSo exchanges often find themselves hacking solutions to accept payments legally. In the US, for instance, Coinbase lets users pay by using Plaid, the fintech that powers Venmo.&nbsp;\n\n\n\nThere are a couple of caveats with that method, however. Firstly, Plaid was recently acquired by Visa, which means it could become difficult for a bitcoin platform to keep using it.&nbsp;\n\n\n\nSecondly, there are a number of privacy issues, as you essentially connect your bank account by giving Plaid or Trustly your login details, and they then issue a transfer on your behalf for the trade. The fintech harvests your past bank data, de-identifies it, and shares it with other companies, which some users weren't too happy about when they looked at the terms.\n\n\n\nOne silver lining: it is possible that the PSD2 directive, designed in part to allow direct payments users and companies, could cut out the middle man. It could allow users to transfer funds directly to exchanges faster, and more safely thanks to SCA, or strong customer authentication methods, possibly with lower fees.\n\n\n\nIn the meantime, it is worth looking at as many possible payment methods as possible, and weighing the pros and cons of each.\n\n\n\nImprove ID-Proofing Without Adding Friction\n\n\n\nOnboarding the wrong users is often what creates trouble down the line. If you can stop fraudsters from signing up, you are essentially protecting yourself in the long-run.\n\n\n\nBut there are a few more challenges here:\n\n\n\n\nCrypto users don’t like giving away personal data: it goes against the principles of crypto, both for anonymity and decentralization\n\n\n\nToo much friction sends users to the competition: the more security hurdles you create for fraudsters, the more likely you are to turn away legitimate users who become frustrated with the signup process.\n\n\n\n\nThis is why certain exchanges tend to make it easy to sign up, but it’s harder to buy and transfer your coins. Coinbase, for instance, does require ID verification to withdraw funds, which they claim makes them one of the more trustworthy platforms.&nbsp;\n\n\n\nAt this stage, it’s also worth looking at the example of Revolut, the UK challenger bank. Their platform does allow you to purchase cryptocurrencies, but after ongoing a strong authentication process to create your initial account.\n\n\n\nThey is to create an invisible layer of security, which helps you mitigate risk without affecting user experience. Here is how it works with SEON:\n\n\n\n\n\n\n\nDeploy Data Enrichment Tools\n\n\n\nData enrichment is the process of getting more info about your users, without asking them for it. We have a full guide on data enrichment here, but the key takeaway is that you can use the digital footprint to answer dozens of questions, such as:\n\n\n\n\nIs the user really in the location they say they are?\n\n\n\nAre they using emulators, VPNs or other suspicious methods for accessing the site that points t to crypto fraud?\n\n\n\nDoes the email address use a disposable domain? Is it new?\n\n\n\nHas the user got social media accounts? Do they seem real?\n\n\n\nAnd a lot more...\n\n\n\n\nAt SEON, we provide data enrichment through various modules, which you can enable and disable at will. these include:\n\n\n\n\nReverse email lookup: a powerful way to build a risk profile based on an email address only.\n\n\n\nReverse phone lookup:  a tool designed to not only verify if a number is legit or not, but also gather information about connected social media profiles, eSIMs and more.\n\n\n\nReverse social media lookup: knowing if your customers have social media profiles can greatly help your manual review process, especially for KYC checks.\n\n\n\nDevice fingerprinting: this tool allows you to understand how users connect to your platform, so that you may identify risky VPNS, proxies, and spot account takeover attempts.\n\n\n\n\nIn short, by using data enrichment, you can start getting a full picture of who users are - as soon as they land on your cryptocurrency exchange website. Only those who appear risky have to go through further authentication like ID check or selfie verification, which can be reviewed manually.\n\n\n\nSolutions for Crypto Fraud Detection\n\n\n\nThe key to good crypto exchange fraud software is that it should help you improve security, while respecting cryptocurrency believers’ ideals of anonymity.\n\n\n\nBy relying mostly on users' digital footprint and data enrichment to gauge risk, you can prevent fraudsters from entering your exchange, and monitor and prevent their operations at key points like transaction and withdrawal\n\n\n\nIn short, you can enable real-time, frictionless fraud prevention at any touchpoint with your users, to ensure your crypto exchange grows safely, and without wasting resources on kicking fraudsters out.\n\n\n\n\n      Reduce fraud by 99% with the #1 fraud detection software\n      SEON offers a complete set of fraud fighting tools that grow with your business\n     \n        Book a Demo\n      \n    \n\n\n\nFrequently Asked Questions\n\n\n\nHow do you check for cryptocurrency fraud? This comes to due diligence. Some signs of potential fraud include; promises of very high/guaranteed returns, vague founding team members and no official published code without explanation.   Can you chargeback crypto? No. Cryptocurrency payments are irreversible by nature.  What cyptocurrencies suffer from fraud? Crypto-related fraud is prevalent, but not token-specific. Most fraud cases happen when users are scammed, either by sending their crypto to the wrong place, via phishing attempts, or simply by being stolen.  \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON: Fraudster - Anonymous T on Online Money Laundering\n\n\n\nSEON: Payment Fraud Prevention: How to Protect your Business\n\n\n\nSEON: Identity Verification and KYC for Cryptocurrency Exchanges\n\n\n\n\nLearn more about:\n\n\n\nBrowser Fingerprinting | Device Fingerprinting |  Fraud Detection API | Fraud Detection with Machine Learning &amp; AI\n\n\n\nSources used for this article:\n\n\n\n\nCoin Telegraph: The Mess That Was Mt. Gox: Four Years On\n\n\n\nCoin Market Cap:  Top Cryptocurrency Spot Exchanges\n\n\n\nBinance: Buy &amp; Sell Crypto\n\n\n\nCNBC:  Visa to acquire Plaid, the fintech powering Venmo and other banking apps, in $5.3 billion deal"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/","url":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/","name":"Cryptocurrency Fraud: What to Know & How to Stop it | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/04/Crypto-exchange-fraud-main.png","datePublished":"2020-04-07T08:00:00+00:00","dateModified":"2026-04-15T08:48:22+00:00","description":"Fraudsters use stolen IDs and card details to log into your crypto exchange, and you pay the price. Here's how to stop it before it's too late.","mainEntity":[{"@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#faq-question-1638794371180"},{"@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#faq-question-1632307531963"},{"@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#faq-question-1632307569834"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2020/04/Crypto-exchange-fraud-main.png","contentUrl":"https://seon.io/wp-content/uploads/2020/04/Crypto-exchange-fraud-main.png","width":1400,"height":800,"caption":"Crypto exchange fraud main"}
{"@context":"https://schema.org","@type":"Person","@id":"","url":"https://seon.io/resources/author/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#faq-question-1638794371180","position":1,"url":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#faq-question-1638794371180","name":"How do you check for cryptocurrency fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"This comes to due diligence. Some signs of potential fraud include; promises of very high/guaranteed returns, vague founding team members and no official published code without explanation. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#faq-question-1632307531963","position":2,"url":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#faq-question-1632307531963","name":"Can you chargeback crypto?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No. Cryptocurrency payments are irreversible by nature.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#faq-question-1632307569834","position":3,"url":"https://seon.io/resources/how-to-protect-your-crypto-exchange-from-fraud/#faq-question-1632307569834","name":"What cyptocurrencies suffer from fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Crypto-related fraud is prevalent, but not token-specific. Most fraud cases happen when users are scammed, either by sending their crypto to the wrong place, via phishing attempts, or simply by being stolen.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/news/celebrating-seons-milestones/#article","isPartOf":{"@id":"https://seon.io/resources/celebrating-seons-milestones/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Celebrating SEON’s Milestones","datePublished":"2020-04-15T05:54:00+00:00","dateModified":"2024-10-11T10:22:31+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/celebrating-seons-milestones/"},"wordCount":753,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/news/celebrating-seons-milestones/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/04/seon-milestones-cover.png","articleSection":["Article"],"inLanguage":"en-US","description":"At SEON, we know fraud never sleeps, which is why we’re always more interested in learning about future trends than looking back at the past.\n\n\n\nBut every now and then, it helps to pause and put things in perspective.&nbsp;\n\n\n\nAnd after seeing how much our business grew over the last two years, we thought it was time to share our key milestones with clients, investors, employees and partners.\n\n\n\n€1M Raised in Seed Capital\n\n\n\nOur biggest news of 2019 was our pre-series A funding round, which raised €1M from investors. But the key numbers that help understand that sum are the ones showing our earnings and growth.&nbsp;\n\n\n\nSEON is one of the rare startups to be profitable only 2 years after launch, tripling year on year gross revenue and ending 2019 with “infinite runway.”\n\n\n\nIn one year only, we have doubled our number of clients, and shown a proven track record of key wins in high risk verticals such as: online lending, gambling, casino, sportsbook, crypto, forex verticals and retail banks.\n\n\n\n\n\n\n\nNew London Office, Global Team\n\n\n\nTo position SEON as a global leader in fraud prevention, we opened a new London office in the heart of Soho. It will act as our Global Commercial HQ, and a hub from which to coordinate our international team.\n\n\n\nSpeaking of the team, it doubled in numbers in 2019, now counting 20 FTEs from a multinational workforce based in Hungary, Serbia, Mexico, Ukraine and UK, amongst others.\n\n\n\nWe continue to focus our efforts on sourcing the best talent from top-rated student organisations, which helps us remain agile, relevant, and with a finger on the pulse of the newest disruptive technologies.&nbsp;\n\n\n\nWelcoming Our New CCO\n\n\n\n\nI have been part of several fraud-tech startups success stories. Sadly, I saw them grow rapidly and lose their essence in the process. But SEON abides by one key principle: build something simple that people love to use.\n\n\n\n\nJimmy Fong, SEON's new CCO\n\n\n\n\n\n\n\nEarly this year, we welcomed Jimmy Fong as our new CCO, and couldn’t be more pleased with this addition to the team.\n\n\n\nA young veteran in the fraud industry sphere, Jimmy helped 3 startups reach full acquisition by powerhouse brands such as Visa, Ingenico, and, most recently, American Express.\n\n\n\nIn his Medium post announcing the move to SEON, he highlights how our company is a clear contender to carve out a mark in the crowded anti-fraud space, and we truly believe his vision and expertise will help us scale even further in the oncoming years.&nbsp;\n\n\n\nAward-Winning Tech\n\n\n\nIn 2019, SEON made the Regtech 100, the Forbes list of the Hottest Hungarian Startups, and won first place at the Pitchit event at Lendit Fintech Europe.&nbsp;\n\n\n\nNone of this would have been possible without the feedback from our clients and the hard work of our developers who tirelessly improved our products with:\n\n\n\n\n22 new release of backend versions\n\n\n\nMore data points for our device fingerprinting module\n\n\n\nExtended social media profiling for email addresses\n\n\n\nUnlimited seats of team management\n\n\n\nA new sandbox environment for testing\n\n\n\nConverted ML rules to a human-readable format\n\n\n\nNew percentage comparison and proportional scoring in velocity rules\n\n\n\nNew IP API\n\n\n\n\nBut the most noteworthy releases of 2019 were undoubtedly our Phone API and Intelligence Tool. The former was a long-requested feature from clients, and we are proud to reveal that it is completely operational, including our highly-successful social media profiling feature.\n\n\n\nThe Intelligence Tool, meanwhile, represents everything SEON stands for in Chrome plug-in form: namely, the ability to let fraud managers enrich data as easily and seamlessly as possible.\n\n\n\nThe Power of Education Against Fraud\n\n\n\nOne of our strongest beliefs at SEON is that fraud prevention should be made simple. This philosophy is at the core of our products, and also how we communicate solutions for businesses.\n\n\n\nThis is why we’re proud to say that, in 2019, we hosted 6 webinars, wrote 4 guides, and 28 blog posts designed to educate industry insiders and fraud managers about challenges due to fraud. \n\n\n\nLooking Towards a Fraud-Free Future\n\n\n\nSo what next for SEON? We will continue growing, with a target of another 200% increase in revenue. We will double our workforce once more, with a special focus on customer success and support.\n\n\n\nWe will also expand our offices in Budapest, and, of course, continue working tirelessly on exciting product features — all built with the goal of helping fraud managers and grow businesses safer, and with complete peace of mind.\n\n\n\nTo stay updated about SEON, don’t forget to sign up to our newsletter below."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/celebrating-seons-milestones/","url":"https://seon.io/resources/news/celebrating-seons-milestones/","name":"SEON Milestones of 2019 - Everything We've Accomplished and more","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/news/celebrating-seons-milestones/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/04/seon-milestones-cover.png","datePublished":"2020-04-15T05:54:00+00:00","dateModified":"2024-10-11T10:22:31+00:00","description":"A look at the awards won by SEON in 2019, funds raised, and scaling milestones of the year. See how the company has grown and where it's headed.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/news/celebrating-seons-milestones/#primaryimage","url":"https://seon.io/wp-content/uploads/2020/04/seon-milestones-cover.png","contentUrl":"https://seon.io/wp-content/uploads/2020/04/seon-milestones-cover.png","width":1400,"height":800,"caption":"seon-milestones-cover"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Find Social Media Accounts by Email Address Only","datePublished":"2020-04-28T06:40:22+00:00","dateModified":"2026-01-13T11:59:55+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/"},"wordCount":880,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"You'd be surprised by how much SEON can tell you starting with an email address."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/","url":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/","name":"Find Social Media Accounts by Email Address for Free | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","datePublished":"2020-04-28T06:40:22+00:00","dateModified":"2026-01-13T11:59:55+00:00","description":"Try a free tool to see what social media accounts you can find with an email address only. Plus, learn how it can help you fight fraud and find VIP customers.","mainEntity":[{"@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#faq-question-1641820020702"},{"@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#faq-question-1641820025743"},{"@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#faq-question-1641820028925"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#faq-question-1641820020702","position":1,"url":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#faq-question-1641820020702","name":"Can you find social media accounts by email?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. Through the use of OSINT tools, you can uncover a range of social media accounts via one single email address submitted by a user/customer. This can be used as an extra form of verification. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#faq-question-1641820025743","position":2,"url":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#faq-question-1641820025743","name":"Are social media lookup tools free?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Certain tools are free. However, you will often find these have limited capabilities. Find out more about what tools are available on the market, both free and paid, in our <a href=\"https://seon.io/resources/comparisons/best-reverse-email-lookup-tools/\" target=\"_blank\" rel=\"noreferrer noopener\">reverse email lookup tool</a> article.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#faq-question-1641820028925","position":3,"url":"https://seon.io/resources/how-to-find-social-media-accounts-by-email-address-only/#faq-question-1641820028925","name":"How many networks can you find with a social media lookup tool?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"This varies depending on the tool that you're using. For example, <a href=\"https://seon.io/products/digital-footprint-solution/\">SEON's digital footprint solution</a> shows data from over 300 platforms and apps. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#article","isPartOf":{"@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"Fraud Detection API: How It Works &amp; Key Benefits for Your Business","datePublished":"2020-05-01T08:29:00+00:00","dateModified":"2026-02-24T11:42:42+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/"},"wordCount":1446,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Fraud detection APIs stop fraud in real time across signups, logins, and payments, reducing chargebacks, bots, fake accounts, and card fraud."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/","url":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/","name":"Fraud Detection API: How It Works & Key Benefits | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2020-05-01T08:29:00+00:00","dateModified":"2026-02-24T11:42:42+00:00","description":"Fraud detection APIs stop fraud in real time across signups, logins, and payments, reducing chargebacks, bots, fake accounts, and card fraud.","mainEntity":[{"@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#faq-question-1631267436118"},{"@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#faq-question-1631267462050"},{"@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#faq-question-1631267470987"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520","name":"Matyas Varga","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U02AJGEBX6K-41abfee059f6-512-96x96.jpeg","url":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U02AJGEBX6K-41abfee059f6-512-96x96.jpeg","contentUrl":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U02AJGEBX6K-41abfee059f6-512-96x96.jpeg","caption":"Matyas Varga"},"description":"Matyas Varga is Head of Global Fraud Services at SEON, guiding enterprises in fighting digital fraud with tailored, data-driven strategies. With 10+ years in fraud analytics and consulting, he’s turned complex challenges into real impact. Since 2021, he’s grown SEON’s global fraud consultancy, supporting VIP clients. Previously, he led anti-fraud and billing teams at BT. Based in Budapest, Matyas holds a degree in International Relations and certifications in Forensic Accounting and Fraud Examination.","sameAs":["https://www.linkedin.com/in/matyas-varga-63a035153/"],"knowsAbout":["Fraud Prevention","Fraud Analytics"],"jobTitle":"Head of Global Fraud Services","url":"https://seon.io/resources/author/matyasvarga/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#faq-question-1631267436118","position":1,"url":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#faq-question-1631267436118","name":"How much does a fraud detection API cost?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"This varies depending on how the company operates ie some offer a set fee for overall usage whereas others, including SEON, offer more flexible pricing based on the number of API requests.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#faq-question-1631267462050","position":2,"url":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#faq-question-1631267462050","name":"How long does it take to set up a fraud detection API?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Integration can be done within 24 hours but this differs depending on the product you choose and results are often be more precise once the solution has been in operation.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#faq-question-1631267470987","position":3,"url":"https://seon.io/resources/key-benefits-of-a-fraud-detection-api/#faq-question-1631267470987","name":"When should I be using a fraud detection API?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"As soon as realistically possible. The longer you leave your business unprotected, the risks of fraudulent attacks/activities will continue to rise. No business is safe from online fraud, no matter its size, type or sector.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#article","isPartOf":{"@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"10 Best Fraud Management Systems &amp; How to Choose One","datePublished":"2020-05-08T11:48:00+00:00","dateModified":"2026-04-09T14:28:45+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/"},"wordCount":1882,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","inLanguage":"en-US","description":"We're here to help you pick the right fraud management system for your needs."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/","url":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/","name":"Top 10 Fraud Management Systems & How to Choose | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","datePublished":"2020-05-08T11:48:00+00:00","dateModified":"2026-04-09T14:28:45+00:00","description":"Explore top fraud management systems. Compare tools that detect fraud, reduce risk, and protect your business in real time.","mainEntity":[{"@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#faq-question-1639744329439"},{"@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#faq-question-1639744389893"},{"@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#faq-question-1664894176531"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#faq-question-1639744329439","position":1,"url":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#faq-question-1639744329439","name":"Who needs to use a fraud management system?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Any company trying to reduce fraud rates such as chargeback fees, account takeover, or fake identities can use a fraud management system. There are many ways to deploy these tools, and their features and pricing vary greatly from one provider to the next.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#faq-question-1639744389893","position":2,"url":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#faq-question-1639744389893","name":"What does a fraud management system do?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud management systems automatically allow or block certain user actions. They calculate how risky a signup, login, or transaction is based on preset rules. Some fraud management systems also focus on providing risk management teams with more data to make better decisions.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#faq-question-1664894176531","position":3,"url":"https://seon.io/resources/top-fraud-management-systems-how-to-pick-one/#faq-question-1664894176531","name":"What are the benefits of fraud management?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"<a href=\"https://seon.io/resources/fraud-risk-management/\" target=\"_blank\" rel=\"noreferrer noopener\">Managing fraud risks</a> efficiently means that less fraud goes through. A reduction in fraud means an increase in revenue and much more, from happier staff to a smoother customer experience. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/"},"author":{"name":"Oliver Bognar","@id":"https://seon.io/#/schema/person/b5461bcf75829644bd246becc5637c20"},"headline":"Guide to Fraud Scoring: What Is It and How Does It Work?","datePublished":"2020-05-11T06:21:19+00:00","dateModified":"2026-04-15T13:03:21+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/"},"wordCount":2304,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Better fraud prevention starts with better risk scoring, learn how ML, custom rules, and presets improve accuracy and reduce risk."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/","url":"https://seon.io/resources/fraud-scores-how-to-calculate-them/","name":"What is Fraud Scoring? A Guide to Risk Rules & Logic | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","datePublished":"2020-05-11T06:21:19+00:00","dateModified":"2026-04-15T13:03:21+00:00","description":"Explore how fraud scoring works. We break down the rules, logic, and thresholds businesses use to automate risk decisions and stop bad actors at scale.","mainEntity":[{"@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#faq-question-1632314705152"},{"@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#faq-question-1663066820130"},{"@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#faq-question-1632314766125"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/b5461bcf75829644bd246becc5637c20","name":"Oliver Bognar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2026/04/cropped-T0ETE1T7W-U04BHCP1M70-0051c70a38d3-512-1-96x96.png","url":"https://seon.io/wp-content/uploads/2026/04/cropped-T0ETE1T7W-U04BHCP1M70-0051c70a38d3-512-1-96x96.png","contentUrl":"https://seon.io/wp-content/uploads/2026/04/cropped-T0ETE1T7W-U04BHCP1M70-0051c70a38d3-512-1-96x96.png","caption":"Oliver Bognar"},"description":"Oliver Bognar is a Senior Fraud Consultant at SEON, serving as a dedicated advisor to MRS clients in the betting and gaming sector. With 7+ years of experience in fraud prevention across high-risk industries, he specializes in designing and optimizing fraud strategies tailored to the unique demands of online gambling operators. Trusted by some of SEON's largest betting and gaming customers, he has built long-term partnerships through deep industry knowledge and hands-on strategic guidance. Oliver is recognized internally and by clients as a subject matter expert in fraud trends and has developed global best-practice frameworks adopted across multiple regions and sub-verticals. He currently leads initiatives to build continuous benchmarking capabilities across betting and gaming verticals and use cases, helping operators stay ahead of the evolving threat landscape.","sameAs":["https://www.linkedin.com/in/oliver-bognar-423285226/"],"knowsAbout":["iGaming Fraud","Account Takeovers","Bonus Abuse","Multi Accounting"],"jobTitle":"Senior Fraud Consultant","url":"https://seon.io/resources/author/oliverbognar/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#faq-question-1632314705152","position":1,"url":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#faq-question-1632314705152","name":"How is a fraud score calculated?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud scores are calculated by feeding user data through risk rules. The total score should fall within a range that lets you know whether you should accept, decline, or review the action.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#faq-question-1663066820130","position":2,"url":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#faq-question-1663066820130","name":"Do more rules mean higher loading time?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It depends. Generally, longer rules weigh down the system more than more rules. In other words, longer rules that involve more parameters will have a greater impact on performance than shorter rules. Sometimes, an easy solution to this is to break them up into shorter, simpler rules. Made up of fraud managers and analysts exclusively, SEON's Customer Success team can help you identify any such rules and optimize them to speed up your operations.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#faq-question-1632314766125","position":3,"url":"https://seon.io/resources/fraud-scores-how-to-calculate-them/#faq-question-1632314766125","name":"Is fraud scoring reliable?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud scoring can give out results with extremely high accuracy. However, the quality of the results depends on the kind of rules in place, how up to date they are, and even what kind of industry you are in.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/browser-fingerprinting/#article","isPartOf":{"@id":"https://seon.io/resources/browser-fingerprinting/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"What Is Browser Fingerprinting &amp; How Does It Work?","datePublished":"2020-05-11T08:57:00+00:00","dateModified":"2026-02-24T11:33:10+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/browser-fingerprinting/"},"wordCount":3333,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/browser-fingerprinting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-green.png","keywords":["Browser fingerprinting"],"articleSection":["Article"],"inLanguage":"en-US","description":"Tracking and understanding browser data is a fantastic tool to reduce fraud rates at your firm."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/browser-fingerprinting/","url":"https://seon.io/resources/browser-fingerprinting/","name":"What is Browser Fingerprinting - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/browser-fingerprinting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-green.png","datePublished":"2020-05-11T08:57:00+00:00","dateModified":"2026-02-24T11:33:10+00:00","description":"Browser fingerprinting gathers hundreds of data points about users. Learn its key features, how it works & how it can protect against fraud.","mainEntity":[{"@id":"https://seon.io/resources/browser-fingerprinting/#faq-question-1630591085436"},{"@id":"https://seon.io/resources/browser-fingerprinting/#faq-question-1630591119864"},{"@id":"https://seon.io/resources/browser-fingerprinting/#faq-question-1676906999401"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/browser-fingerprinting/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/browser-fingerprinting/#faq-question-1630591085436","position":1,"url":"https://seon.io/resources/browser-fingerprinting/#faq-question-1630591085436","name":"Which fraud platforms combine browser fingerprinting with AML screening?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Some modern fraud prevention solutions combine browser fingerprinting with AML screening to create stronger risk profiles. This approach links device and browser data, like operating system, plugins, and hardware signals, with AML checks such as sanctions and watchlist screening.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/browser-fingerprinting/#faq-question-1630591119864","position":2,"url":"https://seon.io/resources/browser-fingerprinting/#faq-question-1630591119864","name":"Which browser fingerprinting services detect VPNs, proxies, and emulators?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Browser fingerprinting services with <a href=\"https://seon.io/resources/vpn-detection-tests/#h-seon-s-vpn-detection-capabilities\">VPN detection capabilities</a> identify risky users by analyzing IP data, browser settings, and device attributes. They can spot connections routed through VPNs, proxies, or emulators by checking inconsistencies in IP location, time zone, and hardware signals. When combined with device fingerprinting and risk scoring, these tools help detect obfuscation, prevent fraud, and maintain compliance without blocking legitimate privacy-conscious users.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/browser-fingerprinting/#faq-question-1676906999401","position":3,"url":"https://seon.io/resources/browser-fingerprinting/#faq-question-1676906999401","name":"Is browser fingerprinting legal?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, browser fingerprinting is legal as all the information collected is considered public and does not include any personal data. However, one should note that the fraud solution that collects the data should be compliant with all applicable legislation. For instance, SEON is fully GDPR compliant and ISO-27001 certified.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/news/seon-is-now-iso27001-certified/#article","isPartOf":{"@id":"https://seon.io/resources/seon-is-now-iso27001-certified/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"SEON is Now ISO27001-Certified!","datePublished":"2020-05-15T06:44:01+00:00","dateModified":"2021-03-19T15:53:15+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/seon-is-now-iso27001-certified/"},"wordCount":540,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/news/seon-is-now-iso27001-certified/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/05/SEON-SO27001-certification-graphics.png","inLanguage":"en-US","description":"Another important milestone proving our dedication to maintaining the highest security standards.\n\n\n\nWe’re pleased to announce that SEON successfully received its ISO27001 certification!\n\n\n\nLike other ISO standards, ISO27001 is only optional in fraud tech. At SEON, however, we believe all our clients, partners and investors should trust that we are dedicated to meeting the best security standards.\n\n\n\nThorough Auditing and Internal Preparation\n\n\n\nAfter 3 months of preparation, we were audited by Eurocert Ltd., who confirmed that our efforts met the high ISO standards. The audit, which took place in two phases, looked both at our documentation and company management, before comparing them with our live operations.&nbsp;\n\n\n\nThe certification, therefore, confirms that we operate SEON to the highest security standards for IT security, asset management and human resource security, amongst others.\n\n\n\nThe controls were divided into a number of points:\n\n\n\nA.5: Information security policies (2 controls)A.6: Organization of information security (7 controls)A.7: Human resource security (6 controls that are applied before, during, or after employment)A.8: Asset management (10 controls)\n\n\n\nA.9: Access control (14 controls)\n\n\n\nA.10: Cryptography (2 controls)\n\n\n\nA.11: Physical and environmental security (15 controls)\n\n\n\nA.12: Operations security (14 controls)\n\n\n\nA.13: Communications security (7 controls)\n\n\n\nA.14: System acquisition, development and maintenance (13 controls)\n\n\n\nA.15: Supplier relationships (5 controls)\n\n\n\nA.16: Information security incident management (7 controls)\n\n\n\nA.17: Information security aspects of business continuity management (4 controls)\n\n\n\nA.18: Compliance; with internal requirements, such as policies, and with external requirements, such as laws (8 controls)\n\n\n\nPart Of Our Larger Commitment to Safer Risk Prevention\n\n\n\nAs a fraud prevention company, we help companies reduce risk, which is why we cannot be a weak point in their chain of data analysis. This new ISO27001 certification proves that we operate with the best practices when it comes to safeguarding sensitive company information and business data.\n\n\n\nIt is also why, at SEON, we ensure that we meet GDPR requirements, as well as satisfy the demands for SCA (strong customer authentication) as part of the PSD2 directive.\n\n\n\nAbove all, we want to establish transparency and communication between ourselves and clients, whether it’s by being as open as possible about how our products work, or our company policies.&nbsp;\n\n\n\nISO Certification Vs Data Center Compliance\n\n\n\n“Not all fraud tech companies meet the ISO27001 standard, yet still use the name for marketing purposes.”\n\n\n\nAnother reason we wanted a certification from the International Organization for Standardization was to highlight the fact that not all fraud tech companies meet its standards, yet still use the name for marketing purposes.\n\n\n\nThis is done by advertising that data centers as compliant, which puts the burden of security management on third-party companies. Data center compliance to ISO standards is important, but it does not mean data is safe when processed by the fraud company.\n\n\n\nBuilding a Safer Future with SEON Products\n\n\n\nThis ISO27001 certification is yet another good news for our company, which has grown revenue by 200% in one year, doubled its client base, and raised €1M in seed capital.\n\n\n\nAbove all, we wanted to take this opportunity to thank all our clients, investors and partners for trusting in us.\n\n\n\nWe’re tremendously excited to continue growing along with you in the future, always ensuring that both your risk prevention tool and company are in the safest hands possible."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/seon-is-now-iso27001-certified/","url":"https://seon.io/resources/news/seon-is-now-iso27001-certified/","name":"SEON is Now ISO27001-Certified!","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/news/seon-is-now-iso27001-certified/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/05/SEON-SO27001-certification-graphics.png","datePublished":"2020-05-15T06:44:01+00:00","dateModified":"2021-03-19T15:53:15+00:00","description":"SEON's fraud prevention tools received their ISO27001 certification. Here's what it means, and how it proves our dedication to the best security practices.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/news/seon-is-now-iso27001-certified/#primaryimage","url":"https://seon.io/wp-content/uploads/2020/05/SEON-SO27001-certification-graphics.png","contentUrl":"https://seon.io/wp-content/uploads/2020/05/SEON-SO27001-certification-graphics.png","width":1400,"height":800,"caption":"SEON ISO27001 certification graphics"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#article","isPartOf":{"@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"Payment Gateway Fraud: Detection &amp; Solutions","datePublished":"2020-05-27T06:08:58+00:00","dateModified":"2026-03-05T10:54:47+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/"},"wordCount":1466,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how payment gateway fraud works and compare detection tools to stop BIN attacks, fake transactions, and account takeovers."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/","url":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/","name":"Payment Gateway Fraud: How It Works & Detection | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2020-05-27T06:08:58+00:00","dateModified":"2026-03-05T10:54:47+00:00","description":"Learn how payment gateway fraud works and compare detection tools to stop BIN attacks, fake transactions, and account takeovers.","mainEntity":[{"@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#faq-question-1631527969462"},{"@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#faq-question-1631527982314"},{"@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#faq-question-1766053635791"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#faq-question-1631527969462","position":1,"url":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#faq-question-1631527969462","name":"How secure are payment gateways?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"While some gateways offer protection to help your business process more qualified transactions, developing a fraud prevention stack to accompany what's available will help minimize risk.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#faq-question-1631527982314","position":2,"url":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#faq-question-1631527982314","name":"What are the benefits of multiple gateways?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If you're an online merchant, more gateways give your customers more opportunities to pay with their favorite payment method, thus boosting their user experience.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#faq-question-1766053635791","position":3,"url":"https://seon.io/resources/payment-gateway-fraud-how-it-works-and-solutions/#faq-question-1766053635791","name":"What solutions help payment gateways screen transactions without adding latency?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Look for real-time payment screening tools that run in milliseconds and plug into your gateway via a single API. SEON screens transactions using device and IP signals (plus sanctions checks if needed) to block high-risk payments without slowing down good customers.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/3-ways-to-boost-fraud-prevention-in-esport-gaming/#article","isPartOf":{"@id":"https://seon.io/resources/3-ways-to-boost-fraud-prevention-in-esport-gaming/"},"author":{"name":"","@id":""},"headline":"3 Ways to Boost Fraud Prevention in Esport Gaming","datePublished":"2020-06-03T08:00:00+00:00","dateModified":"2024-10-16T15:58:57+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/3-ways-to-boost-fraud-prevention-in-esport-gaming/"},"wordCount":1765,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/3-ways-to-boost-fraud-prevention-in-esport-gaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/06/esport_cover.png","keywords":["Account Takeover","Affiliate Fraud","Email API","Fraud Detection"],"articleSection":["Article"],"inLanguage":"en-US","description":"As esport gaming continues to boom, your fraud prevention must cope with a growing number of attacks. \n\n\n\nWhile esport gaming is still considered an emerging market, it’s undeniably growing faster than anyone had imagined during the Covid 19 crisis.&nbsp;\n\n\n\nEveryone is staying at home, looking for online entertainment. Traditional sporting events are slowly resuming, and esport, which can be streamed online, fits the bill for those who want to keep betting. It’s no surprise that F1’s first virtual grand prix gathered more than 3.2 online viewers.\n\n\n\nBut the pandemic has only accelerated what was already a booming market. ESPN started covering esport in 2016, and what was once seen as a niche form of entertainment is quickly entering the mainstream.\n\n\n\nWhich should be good news for anyone involved in esport league gaming and gambling, whether you offer betting on the latest CS:GO games, Dota 2, League of Legends, or skin gambling.\n\n\n\nExcept for one thing: as demand increases at breakneck speed, so do the attacks of fraudsters.&nbsp;\n\n\n\nFraud Prevention Challenges of the Esport Gaming Industry\n\n\n\nThere are of course many parallels between the fraud prevention challenges of esport gaming and traditional iGaming or online gambling, betting and casino, as your company may be pushed to deal with:\n\n\n\n\nBonus abuse: where fraudsters and organized groups target your referral programs and sign up incentives. It can cost online gaming companies up to 15% of their gross revenue.\n\n\n\nMulti accounting: where one fraudster uses numerous accounts for matched betting, smurfing, arbitrage of affiliate fraud. \n\n\n\nAffiliate fraud: organized fraudsters use multi-accounting to trigger a PPL/CPA, which means you are paying out rewards to non-existent players, or for bad traffic including players with no intention of spending money on your esports gaming site.\n\n\n\nAccount takeover: also known as credential stuffing. Fraudsters acquire lists of logins from data breaches, phish for personal logins, or use brute force to steal someone’s account and drain their funds. \n\n\n\nChargeback fraud: a problem that happens either because fraudsters use stolen credit card details, or because of friendly fraud, when the ID authentication is good, but the player still abuses the chargeback process to erase their bad bets by filing a chargeback.\n\n\n\n\nThe Hidden Costs of Esports Gambling Fraud\n\n\n\nWhile the aforementioned recurring attacks will undoubtedly damage your bottom line, there’s more to consider too. In fact, it’s estimated that every dollar lost to fraud actually costs your organization up to $3 in costs.&nbsp;\n\n\n\nLong Term Chargeback Losses\n\n\n\nYou’re not just dealing with the immediate chargeback fees. There is also all the time and effort spent investigating the chargeback and disputing it. It’s likely your risk team will be overwhelmed by a great number of requests, not to mention the fact that it puts you in the card companies’ bad books.\n\n\n\nAnd the damages for enabling too many chargebacks are increasingly punitive for companies. Visa’s new VCR process and Mastercard’s resolution process make things harder for merchants, as the window to dispute a chargeback is shorter than ever.\n\n\n\nWasted Marketing Budgets\n\n\n\nAffiliate fraud and bonus abuse are the two main offenders here, as they can considerably reduce your marketing ROI. The time and effort spent designing an attractive strategy to onboard new players is wasted on bad traffic that doesn’t convert.&nbsp;\n\n\n\nRegulatory Fines\n\n\n\nWhile esports gaming is somewhat less scrutinized than traditional online gambling, it’s not hard to foresee that government regulators will increasingly crackdown on the industry. The debate following Steam’s infamous skin betting debacle has put the industry in the spotlight, and numerous countries, such as Sweden have already started pushing stronger legislation and heftier fines for protecting gamblers.\n\n\n\nDamaged Reputation and Loss of Trust\n\n\n\nBuilding safety and trust is primordial for any company in the iGaming sphere, and it is also true of esports betting. Account takeovers are therefore damaging not just for the users who lose their account’s funds, but also because it is seen as a weakness in the company’s security. Players are quick to take to online forums and review sites to vent their frustration, and your company name will be associated with hacked accounts.&nbsp;\n\n\n\nSolution #1: Use Digital Footprint Tools For a 360 View of Users\n\n\n\nThe golden rule in any fraud prevention context is that the more data you have, the better you can protect yourself. The key challenge is of course to acquire that data in a frictionless matter. We know that even something as simple as 2FA or 3DS are seen as an obstruction by marketing teams, so how do you work with as few data points as possible?\n\n\n\nThe answer is to use data enrichment processes, such as:\n\n\n\n\n\n\n\n\n\n\nDevice fingerprinting: analyzes the configuration of software and hardware of your users. Multi-accounting fraudsters, for instance, favour desktop and laptop devices to access their records and fraud guides. A desktop using mobile data (dongle) and no phone or email history, can raise red flags in real-time.\n\n\n\nEmail profiling: Fraudsters will create an email address fast, and without linking to Twitter, Facebook or other social media accounts. This is not the typical behaviour of a genuine customer, who would use an aged email address, probably used to sign into multiple social media platforms. \n\n\n\nPhone analysis: likewise, fraudsters are unlikely to register the phone number with messenger apps and other platforms. We can flag phone numbers that come from “burner” apps, which allow people to enable numerous phone numbers on one device only. \n\n\n\nIP analysis: one of the oldest and easiest forms of security available, as fraudsters often rely on mobile or proxy IP addresses to hide their multiple accounts, which show no geographical info, and are harder to identify than data centers. Laptops with dongles are the most popular setup amongst multi-accounters, and not typical for genuine esports gamblers.\n\n\n\n\nThis all works together with the same goal: stop fraudsters from logging onto your platform before they can make use of stolen information and credit card numbers, which will reduce chargeback fraud in the long run.\n\n\n\nSolution #2 Adaptable KYC Check Triggers\n\n\n\nEsports betting, which tends to attract a younger user base, needs to be particularly vigilant with KYC checks. They are mandatory at the withdrawal stage, and depending on the jurisdiction, at the registration stage too.\n\n\n\nThe problem? Legitimate users are also the most impatient ones with authentication: why should they go through numerous verification processes with one platform when competitors make it much easier?\n\n\n\nTo avoid churn while maintaining a high level of security, you must use adaptable KYC triggers. These are based on digital footprint analysis (more on that below), and let you leverage both light and heavy KYC, depending on the initial data you get.\n\n\n\n\n\n\n\n\n\n\nLight KYC: includes frictionless customer risk scoring methods that don’t affect user experience nor increase the churn. It’s much cheaper to implement on a large scale and works well combined with heavy KYC processes.\n\n\n\n\n\nHeavy KYC: ID or other document verification processes which provide a higher level of security. They have also downsides, as they are expensive to check, and negatively impacts user experience. Fraudsters are also increasingly adept at bypassing them.\n\n\n\n\nA good fraud prevention tool should let you start with the lighter features for a quick KYC check, and only dynamically trigger heavier KYC checks only for suspicious players. This essentially removes the need for the first round of manual reviews, as the process is completely automated.\n\n\n\nIt’s also worth noting that this flexibility can be applied to transaction and payment verification. For instance, SEON helps enable dynamic 3D Secure (3DS), which gives you better control over your customers’ journey and UX.&nbsp;\n\n\n\nSolution #3 Understand Fraudster Behaviour With Velocity Rules and Machine Learning&nbsp;\n\n\n\nGathering user data isn’t the hard part. It’s running it through the right rules to create a reliable risk score that can be challenging. This is why it’s important to have access to as many data points as possible, but also to be able to test and experiment with your risk scores.&nbsp;\n\n\n\nFor instance, SEON lets you create rules based on the most commonly aggregated data points such as IP address, device and credit card data. But we also found that the following information could go a long way in reducing friendly fraud and multi-accounting:\n\n\n\n\nCard BIN Range: it can identify a prepaid card which should increase suspicions. Expiration dates can also reveal risk, and so do card numbers from unusual banks.\n\n\n\nSite referral: Traffic coming from a bonus abuse forum or excel sheet increases risk.\n\n\n\nPassword: The passwords shared with multiple customers can indicate fraudulent syndicates.\n\n\n\nSecurity question and answer: Finding the same in use by multiple accounts is a strong indicator of multi-accounting.\n\n\n\nDeposit sizes: Users who take the full bonus value and assume there is no winnings cap should be marked as suspicious.\n\n\n\n\nCombining these data points with velocity rules gives you a much more precise understanding of fraudster behaviour. Best of all, you can use our Machine Learning engine to generate rules based on historical data, and test them in a safe environment before deploying them live.\n\n\n\nGet Better Gaming Fraud Prevention Results Today\n\n\n\nDid you know that 77% of bonus abusers in iGaming do not have any social media presence related to their email address? Or that only 10% of bonus abusers have a Facebook account registered with their email address.\n\n\n\nThese are exactly the kinds of insights you can uncover with SEON’s fraud prevention tools, ranging from lightweight data enrichment to a full end-to-end, modular solution that integrates seamlessly into your platform for fighting esport gaming fraud. To see how SEON can help your esport gaming company reduce chargebacks, perform better KYC checks, and block bonus abuse and multi-accounting, don’t hesitate to contact us for a free demo today!&nbsp;\n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON:&nbsp;Online Gambling Fraud: How It Works &amp; How To Stop It\n\n\n\nSEON: How to Prevent iGaming Fraud\n\n\n\nSEON:&nbsp;Prevent Bonus Abuse in iGaming\n\n\n\n\nSources:\n\n\n\n\ntheguardian.com: Esports ride crest of a wave as figures rocket during Covid-19 crisis\n\n\n\nsportspromedia.com: F1’s inaugural virtual Grand Prix draws 3.2m online viewers\n\n\n\ntime.com: Why ESPN Is So Serious About Covering Esports\n\n\n\nreddit.com: I run one of the largest CS:GO skin gambling sites. AMA!\n\n\n\nbbc.com: Valve ordered to tackle 'skin betting'\n\n\n\n\nLearn more about:\n\n\n\nData Enrichment&nbsp;|&nbsp;Browser Fingerprinting&nbsp;|&nbsp;Device Fingerprinting&nbsp;|&nbsp;Fraud Detection API&nbsp;|&nbsp;Fraud Detection with Machine Learning &amp; AI"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/3-ways-to-boost-fraud-prevention-in-esport-gaming/","url":"https://seon.io/resources/3-ways-to-boost-fraud-prevention-in-esport-gaming/","name":"Fraud Prevention for Esport Gaming: How to Do it Right","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/3-ways-to-boost-fraud-prevention-in-esport-gaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/06/esport_cover.png","datePublished":"2020-06-03T08:00:00+00:00","dateModified":"2024-10-16T15:58:57+00:00","description":"Esport gaming fraud is increasing with the popularity of the medium. See what tools to use for better fraud prevention with-sport gaming or skin gambling.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/3-ways-to-boost-fraud-prevention-in-esport-gaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2020/06/esport_cover.png","contentUrl":"https://seon.io/wp-content/uploads/2020/06/esport_cover.png","width":1400,"height":800,"caption":"esport gaming fraud cover"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-email-risk-assessment-can-help-your-business-grow-safely/#article","isPartOf":{"@id":"https://seon.io/resources/how-email-risk-assessment-can-help-your-business-grow-safely/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"Email Risk Scoring: How to Assess Fraud Risk at Signup and Beyond","datePublished":"2020-06-09T07:05:00+00:00","dateModified":"2026-03-26T15:28:54+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-email-risk-assessment-can-help-your-business-grow-safely/"},"wordCount":1305,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-email-risk-assessment-can-help-your-business-grow-safely/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Email risk scoring uses signals like email age, domain reputation and breach exposure to spot fraud early without adding friction."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-email-risk-assessment-can-help-your-business-grow-safely/","url":"https://seon.io/resources/how-email-risk-assessment-can-help-your-business-grow-safely/","name":"Email Risk Scoring: Signals, Use Cases & Fraud Detection","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-email-risk-assessment-can-help-your-business-grow-safely/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2020-06-09T07:05:00+00:00","dateModified":"2026-03-26T15:28:54+00:00","description":"Email risk scoring uses signals like email age, domain reputation and breach exposure to spot fraud early without adding friction.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-email-risk-assessment-can-help-your-business-grow-safely/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ip-fraud-score/#article","isPartOf":{"@id":"https://seon.io/resources/ip-fraud-score/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"IP Fraud Score: How IP Analysis Works for Fraud Detection","datePublished":"2020-06-18T10:12:12+00:00","dateModified":"2026-04-01T09:21:23+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ip-fraud-score/"},"wordCount":1791,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ip-fraud-score/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"IP address analysis is one of the most established methods for spotting online fraud. If you’re reading this, you’re already using an IP address, whether from your phone, laptop, or even smart fridge. It’s the invisible string connecting your device to the Internet, enabling everything from web browsing to emails and video calls.\n\n\n\nBut IPs aren’t just about connectivity—they can also reveal suspicious activity. That’s where IP fraud scores come into play.\n\n\n\n\n\nWant to understand your IP fraud score results? Scroll down to learn how the score is calculated and how it helps prevent fraud.\n\n\n\nWhat Is an IP Fraud Score?\n\n\n\nAn IP fraud score helps detect risky or fraudulent users by analyzing how they connect online. Signals like VPN or proxy usage, emulators, and poor IP reputation scores are assigned points. These points combine into a single score that reflects the likelihood of fraud.\n\n\n\nFor instance, a VPN might add +1, while a suspicious connection from a known TOR node could add more. IPs previously linked to bot activity, abuse, or chargebacks may be automatically blocked based on thresholds set by your fraud prevention system. Businesses often use IP risk scoring at critical moments like signup, login, or checkout—where preventing account takeovers and other threats is vital.\n\n\n\nWhile it’s part of broader fraud detection, an IP fraud score is focused purely on network-level risk—not behavioral data like transactions or spending patterns.\n\n\n\nWatch the video below for a quick breakdown of how fraud scores work:\n\n\n\n\nhttps://www.youtube.com/watch?v=aBsfIIbPgGs\n\n\n\n\n\n\n\n\nHow do IP Fraud Scores Work?\n\n\n\nAn IP scoring API adds and subtracts points based on detected signals. Once the total score is calculated, the system can flag a user as low, medium, or high risk.\n\n\n\nHere’s a simplified example of how fraudulent IP detection works:\n\n\n\n\nIP is from Russia → adds +2\n\n\n\nISP is residential → subtracts -1\n\n\n\nSuspicious SSH port is open → adds +5\n\n\n\nTotal IP risk score = 6 → potentially flagged as high risk\n\n\n\n\nThe goal is to evaluate as many signals as possible to create an accurate IP risk lookup and improve fraud prevention outcomes in real time.\n\n\n\nWhat IP Data Is Important for an IP Fraud Score?\n\n\n\nTo calculate an accurate IP fraud score, you need to analyze key IP parameters that reveal how a user connects to the internet—and whether it looks suspicious.\n\n\n\nPublic vs. Private IP Addresses\n\n\n\nThink of a public IP as a mailbox at the local post office—it’s how devices connect to the wider Internet. A private IP is like mail routing inside a building. Private doesn’t mean hidden—it just links to a local network.\n\n\n\nPublic IPs are assigned by ISPs and are essential for online access. Private IPs work within local networks like offices or homes. For fraud detection, public IPs are more valuable because they offer insight into user behavior and risk.\n\n\n\nIP Geolocation\n\n\n\nGeolocation ties IPs to physical locations, often used for targeting ads or restricting content. Accuracy depends on the database: some can pinpoint city-level data, while others only detect the country. Fraud teams use this to see if a user’s location matches expected behavior.\n\n\n\nPublic IP Address Features\n\n\n\n\nAutomatically assigned by ISPs (static or dynamic)\n\n\n\nGlobally unique—no two are the same\n\n\n\nEssential for internet access across all connected devices\n\n\n\nResidential IPs are especially valuable to fraudsters and often traded on shady marketplaces\n\n\n\n\nProxy Servers and SOCKS5\n\n\n\nFraudsters often mask their real IPs using:\n\n\n\n\nHTTP proxies (browser-level rerouting)\n\n\n\nSOCKS proxies (used for apps, gaming, streaming)\n\n\n\nTransparent proxies (set up by organizations to filter traffic)\n\n\n\n\nThese tools are cheap and easy to deploy, allowing bad actors to quickly rotate IPs during attacks. SOCKS5 proxies are especially sought after because they mimic legitimate residential users more effectively.\n\n\n\nThat’s why IP lookup tools are crucial—they help detect when an IP has been spoofed or manipulated.\n\n\n\nHow Users Hide Their IP Addresses\n\n\n\nThere are many reasons why someone would want to avoid spoofing detection. Circling back to our examples above, it could simply be to watch a video from a foreign country. It could be to improve their security via added encryption. And of course, it could be for malicious purposes.\n\n\n\nRegardless of the why, let’s see how IP addresses are hidden:\n\n\n\n\nVPNs: Short for Virtual Private Networks. Increasingly popular tools, which tunnel all traffic from a device towards a server in another location. Different VPNs offer different kinds of IP addresses, such as static, dynamic, or shared.&nbsp; \n\n\n\nTOR: a system designed to maintain a user’s anonymity by masking IP addresses. Users download and run a free browser, which passes and encrypts traffic multiple times to hide the original IP address. However, an ISP or fraud detection tool will know if the user connected to TOR’s entry and exit nodes.\n\n\n\nProxy servers: act as a middle man between a device and a visited website. TOR and VPNs are also considered proxies, even if they redirect all traffic coming from all software and device systems.\n\n\n\n\n\n      Learn How Proxy Detection Helps to Flag Fraudulent IPs\n      Proxies help fraudsters hide their IP addresses and stay anonymous. See how bad agents use them, and how our API flags them\n      \n        Find out more\n      \n    \n\n\n\nThe Key Features of IP Analytics&nbsp;\n\n\n\nNow that we understand how IPs work and a basic strategy of how people hide their addresses, let’s see what we can gather by analyzing them.\n\n\n\n\nGeolocation: As we’ve previously seen, a legitimate IP address should reveal where the user is based in the world. It is a basic feature, but still useful to see if it matches the card country or if the customer is travelling too fast.\n\n\n\nInternet Service Provider: Finding out who the ISP is can help us know if the IP is residential, from a normal residential connection, public library or web server/data center. The latter is particularly useful to know as they are often used by bots, VPN providers and TOR exit nodes.\n\n\n\nOpen port scan: All proxies tend to have at least one open port, and so do computers functioning as servers. By performing a scan, we can measure how risky the situation appears to be. For instance, some proxy providers resell hacked SSH connections, where port 22 is usually open. A proxy detection service or proxy detection API can help.\n\n\n\nSpam checklist scan: There are two useful lists called DNSBL (Domain Name System Blackhole List) and RBL (Real-time Blackhole List), which catalogue IP addresses used for email spamming. If these IP addresses appear in the results of our search, we can suspect the user is fraudulent.\n\n\n\n\nSo with these few features, we can already tell a lot about a user based on their IP address. Where they are based, what kind of network setup they use to connect online, and whether they appear suspicious or not.\n\n\n\nVelocity Rules for IP Usage&nbsp;\n\n\n\nSo what should you do if you find a suspicious user’s IP address connecting to your system? You could simply block it straight away, but adding that address to an IP blacklist doesn’t make sense. This is because IP addresses are mostly dynamic, and multiple users could eventually end up sharing them, so you’d end up blocking valid customers.\n\n\n\nThis is why you can’t just look at the IP address itself, but also their usage via velocity rules. These algorithms look at the patterns and changes of IP address usage over time, which helps anti-fraud intelligence.\n\n\n\nEnhancing IP Score Checks with APIs\n\n\n\nAs we’ve seen, understanding IP addresses and getting a report is fast, affordable, and easy to perform. But it’s in no way flawless. While it can indicate suspicious behavior, it cannot point to fraud with 100% certainty.&nbsp;\n\n\n\nThis is, in fact, one of the shortcomings of the tech: it’s only useful as part of a complete set of fraud detection tools. When you search for risk, you need as much data as possible. Combining IP checks with digital footprint signals gives an even clearer view of user risk.\n\n\n\n When you search for risk, you need as much data as possible. And here, you’ll need:\n\n\n\n\n\n\n\n\n      91% Fewer Chargebacks in 30 Days – See How\n      Discover how VPN provider Buffered used SEON’s IP fraud scoring to block high-risk traffic and cut chargebacks almost instantly.\n      \n        Find out more\n      \n    \n\n\n\nThe Benefits of IP Analysis Against Fraud\n\n\n\nAs we’ve seen, IP addresses contain a multitude of valuable parameters that help us calculate risk. It’s not the only reason to rely on IP analysis against fraud. Here is why you should deploy that type of tool today:\n\n\n\n\nLightweight checks: IP analysis is invisible to the end user. All the checks happen behind the scenes, without slowing down the user journey.\n\n\n\nReal-time results: checking most IP parameters is nearly instantaneous, which also helps create a frictionless experience without sacrificing safety.\n\n\n\nAffordable: IP analysis is one of the most cost-effective ways to filter out bad agents.&nbsp;\n\n\n\n\nAs for the types of fraud you can detect with IP analysis, they include bot traffic, bonus abuse, multi-accounting, payment fraud, and more.\n\n\n\nPrevent IP Fraud Risk with SEON\n\n\n\nBreaking down the features of IP addresses for risk scoring is fast, affordable, and delivers results in real time. This is exactly what SEON’s IP lookup module offers in an affordable, easy-to-use package.\n\n\n\nHowever, IP data is only one piece of the puzzle. To strengthen your overall fraud management strategy, covering risks such as bot attacks, bonus abuse, and chargeback fraud, it helps to combine IP fraud scoring with reverse email lookup, device fingerprinting, and other checks available through SEON’s fraud detection &amp; prevention solution.\n\n\n\nFrequently Asked Questions\n\n\n\nWhat is an IP score? There are two types of IP scores. One of them is called an IP reputation score. Service providers use it to determine if your emails should pass spam filters. In fraud prevention, your IP risk score can determine if a system labels you as fraudulent or not,   What is IP abuse? Any improper use of the IP address of a server is considered IP abuse. This includes spamming, phishing attempts, DDoS or malware attacks.   What is the IP score rating? An IP score rating helps businesses determine whether an IP address is risky or not. While there is no standard for how the scores are calculated, a higher score tends to point towards a risky IP.   How to do IP analysis? IP analysis can be performed manually by taking certain parameters, such as an IP address, and checking it against public databases. However, most businesses automate the process using IP lookup and IP risk-scoring tools "}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/ip-fraud-score/","url":"https://seon.io/resources/ip-fraud-score/","name":"IP Fraud Score: How IP Fraud Analysis Works? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ip-fraud-score/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","datePublished":"2020-06-18T10:12:12+00:00","dateModified":"2026-04-01T09:21:23+00:00","description":"Worried about risky IPs? Discover how IP fraud scores block bad actors before they reach your site. Read our guide to protect your business.","mainEntity":[{"@id":"https://seon.io/resources/ip-fraud-score/#faq-question-1641901315871"},{"@id":"https://seon.io/resources/ip-fraud-score/#faq-question-1641903954802"},{"@id":"https://seon.io/resources/ip-fraud-score/#faq-question-1696857598487"},{"@id":"https://seon.io/resources/ip-fraud-score/#faq-question-1696857624183"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ip-fraud-score/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ip-fraud-score/#faq-question-1641901315871","position":1,"url":"https://seon.io/resources/ip-fraud-score/#faq-question-1641901315871","name":"What is an IP score?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"There are two types of IP scores. One of them is called an IP reputation score. Service providers use it to determine if your emails should pass spam filters. In fraud prevention, your IP risk score can determine if a system labels you as fraudulent or not, ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ip-fraud-score/#faq-question-1641903954802","position":2,"url":"https://seon.io/resources/ip-fraud-score/#faq-question-1641903954802","name":"What is IP abuse?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Any improper use of the IP address of a server is considered IP abuse. This includes spamming, phishing attempts, DDoS or malware attacks. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ip-fraud-score/#faq-question-1696857598487","position":3,"url":"https://seon.io/resources/ip-fraud-score/#faq-question-1696857598487","name":"What is the IP score rating?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An IP score rating helps businesses determine whether an IP address is risky or not. While there is no standard for how the scores are calculated, a higher score tends to point towards a risky IP. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ip-fraud-score/#faq-question-1696857624183","position":4,"url":"https://seon.io/resources/ip-fraud-score/#faq-question-1696857624183","name":"How to do IP analysis?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"IP analysis can be performed manually by taking certain parameters, such as an IP address, and checking it against public databases. However, most businesses automate the process using IP lookup and IP risk-scoring tools <br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/what-i-learned-running-a-high-growth-startup-from-a-non-startup-hub/#article","isPartOf":{"@id":"https://seon.io/resources/what-i-learned-running-a-high-growth-startup-from-a-non-startup-hub/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"What I Learned Running a High-Growth Startup From a Non-Startup Hub","datePublished":"2020-06-22T10:03:00+00:00","dateModified":"2024-10-30T15:31:46+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/what-i-learned-running-a-high-growth-startup-from-a-non-startup-hub/"},"wordCount":939,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/what-i-learned-running-a-high-growth-startup-from-a-non-startup-hub/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","inLanguage":"en-US","description":"Budapest isn’t exactly on the map when it comes to international tech. But here’s why it could work as your company base.\nWhat first comes to mind when you think of Budapest? Maybe a great holiday destination. The city also regularly tops NomadList, which looks at things like Internet speeds, coffee culture and affordability for digital freelancers.\n\nBut in terms of the tech industry? It probably falls far behind other names such as San Francisco, Helsinki, or Tel-Aviv.&nbsp;\n\nAnd yet, it is from Budapest that my colleagues and I managed to build, launch, and grow a successful fraud tech startup, which recently received €1M in seed funding.&nbsp;\n\nHere’s the story of our company, and why I believe working from a non-startup hub can actually be a benefit for others.\nLow Costs, Great Talent Pool\nThe Budapest University of Technology and Economics, founded in 1782, is considered one of the oldest technical institutions in the world. For us at SEON, it meant having access to an excellent local talent pool of world-class IT personnel, without skyrocketing OPEX costs.\n\nIn fact, in a Forbes article about the city, another local entrepreneur described the workforce as “young, highly educated, technically capable workforce and eager to work”, and I couldn’t agree more.\n\nSimilarly, we were lucky enough to be able to keep our overheads low by working locally. The accounting and legal fees weren’t prohibitive, and neither were the costs of opening and running an office.&nbsp;\n\nIt’s also worth noting that corporate tax in Hungary is one of the lowest in Europe, set at 9%, which definitely helped pour more money into the company as we began scaling our operations.&nbsp;\nA Growing Startup Ecosystem\nThe low corporate tax is certainly beginning to look attractive to a growing number of entrepreneurs who want to make their mark on the global stage. Budapest is now found on lists like the best cities for fintechs, or the top place to launch a startup after Brexit.&nbsp;\n\nThis is evident everywhere you look, from flourishing coworking spaces, to business incubators, or startup events taking place with increasing frequency around the city.\n\nIn terms of growing our business, it also means a tight-knit community of like-minded entrepreneurs, whether local or coming from abroad. The network is small but friendly, and we all benefit from exchanging insights and sharing ideas.&nbsp;\n\nHowever, one thing we couldn’t always find were angel investors or VCs to help kickstart things when smart money was needed.&nbsp;\nLooked Down Upon By Investors\nWhile we’re finally starting to see investment in the local startup scene, it wasn’t always that way, and it’s certainly an uphill battle.\n\nFor instance, my business partner and I launched SEON right after finishing university. As you can imagine, it was challenging enough for people to take us seriously, not just because we were young, but also because the whole of Central Europe was seen as a backwater.&nbsp;\n\nIn fact, we found out the hard way that European investors are even more sceptical when it comes to CEE countries. They tend to look down on startups that aren’t located in Berlin or London. For them, Hungary is still seen as a former Eastern bloc country playing catch up with the rest of Europe in terms of living standards and infrastructure.&nbsp;\n\nOf course, this ignores the historical and cultural wealth of the country, not to mention the tremendous efforts made to turn it into a work-based economy, which saw an acceleration of its modernization since the 2000s.\n\nBut some old ideas die hard, especially when dealing with the more conservative VC investors we met during our early days.\nMaking the Most of Being Outsiders\nIn spite of the obstacles, last year our fraud prevention company raised €1M in seed capital. The fact that we managed to become profitable only 2 years after launch certainly helped, but I also credit that success to our environment and mindset.&nbsp;\n\nWorking from Budapest, we had to think outside the box in a number of ways. For instance, we knew that we had to work hard to please international clients by meeting their standards, which is why we work hard to remain GDPR compliant, and recently received our ISO27001 certification, focusing on IT and company security.\n\nWe also had to be more flexible, adaptable and agile than others — qualities which are essential for any startup, but even more important when you’re in a non-startup hub. For instance, we knew we wanted to stand out from the rest by focusing on:\n\n \tProduct-led growth: which is unheard of in the world of fraud tech, still operating under a traditional sales model.\n \tTransparency and openness: in terms of pricing and how we educate companies about fraud.\n \tComplete flexibility: whether it’s in our working setups, the way we allow customers to use our products, or how we do business. (As a side note, this proved a great benefit during the Covid-19 crisis, as it didn’t slow our operations at all, and our clients needed fraud prevention more than ever.\n\n\nAnd this outsider strategy worked wonders. For instance, we’re now experts at making sales via videoconferencing and managing remote ops. 90% of our clients are international, which proves that it is indeed possible to run a successful startup out of Hungary.\n\nAnd while we now have offices in London, which act as our commercial HQ, we’re still proud to call Budapest our home, a stunning city we know and love.&nbsp;"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/what-i-learned-running-a-high-growth-startup-from-a-non-startup-hub/","url":"https://seon.io/resources/what-i-learned-running-a-high-growth-startup-from-a-non-startup-hub/","name":"Running a Startup From Budapest - What to Expect?","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/what-i-learned-running-a-high-growth-startup-from-a-non-startup-hub/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2020-06-22T10:03:00+00:00","dateModified":"2024-10-30T15:31:46+00:00","description":"Our fraud tech startup just received €1M in seed funding. But how easy was it to find investment based in Budapest?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/what-i-learned-running-a-high-growth-startup-from-a-non-startup-hub/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/#article","isPartOf":{"@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"3 Examples of Browser Spoofing: How It Works &amp; How to Use It to Detect Fraud","datePublished":"2020-06-29T12:17:59+00:00","dateModified":"2025-04-30T13:31:09+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/"},"wordCount":1474,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/06/browser_spoofing_cover.png","keywords":["Browser fingerprinting","Spoofing"],"articleSection":["Article"],"inLanguage":"en-US","description":"In this article, data privacy and web tracking expert Gabor Gulyas shows us how fraudsters use browser spoofing to hide on your website.\n\n\n\nIf you go to the website WhatIsMyBrowser.com, chances are you’ll get fairly accurate results. It will show your IP address, location, and of course, the name of your web browser.&nbsp;\n\n\n\nYou may not know it, but most websites perform a similar analysis in order to learn more about their users. This is useful because it can help companies tailor specific services, or detect unusual behavior (like someone suddenly logging in from another country with another device).\n\n\n\nAnd of course, it helps us spot fraudsters who want to hide their device configurations. This is mostly done with browser spoofing techniques, and today I’ll show you some examples of how they do it, along with some good detection methods.&nbsp;\n\n\n\nWhat Is Browser Spoofing?\n\n\n\nFraudster use browser spoofing to manipulate their browser to make it seem as if they are using a different browser configuration which they would use regularly, for example, to make it seems as if they're from a different country.\n\n\n\nFraudsters use this to bypass basic security checks and match the browser's profile to the identity that you're trying to use, for example, if they are looking to make purchases with a US card a fraudster would spoof their browser to match the language settings and timezone. \n\n\n\nHow Browser Spoofing Works\n\n\n\nSince many fraudsters are looking to access accounts that are located in other countries, browser spoofing allows them to match up key factors like language, timezone, and other geolocation-based data.\n\n\n\nBy manipulating the HTTP Header messages, your browser sends off a request to a website so it appears to be from a different browser. \n\n\n\nWebsites run and render differently in different browsers so mismatches can trigger fraud prevention systems; fraudsters will often use browser spoofing as it's more effective than just a VPN or proxy. \n\n\n\n\n      How Device Fingerprinting Protects from Browser Spoofing\n      Sophisticated device fingerprinting yields hundreds of data points related to someone's device, browser and activity, allowing you to identify and prevent fraud better.\n     \n        Learn more\n      \n    \n\n\n\n3 Examples of Browser Spoofing &amp; How to Spot Browser Spoofing\n\n\n\nChanging Browser Agent On Chrome\n\n\n\nA browser’s user agent string (UA or UAS) is needed to connect a browser with the website. There are different values and formats for different browsers, but the important thing is that the string must be sent via HTTP for each request header. \n\n\n\nIn simple terms, anytime you click on a website, the UA is checked by the server to ensure communication is possible. These user agents can tell us quite a lot, including information about the OS too. \n\n\n\nFor instance, you could find out that you’re dealing with the Google Chrome browser (version 70) from this UAS example:\n\n\n\n\nMozilla /5.0 (Windows NT 10.0; Win64; x64)\n\n\n\nAppleWebKit /537.36 (KHTML, like Gecko)\n\n\n\nChrome /70.0.3538.77\n\n\n\nSafari /537.36&nbsp;\n\n\n\n\nChrome UA Spoofer\n\n\n\nYou can use a Chrome UA Spoofer in the form of a Chrome extension that lets you change the “look” of your browser. \n\n\n\nInterestingly, you’ll see that this extension is developed by Google itself. That’s because it’s a useful developer tool for those who need to test websites seen from different devices.\n\n\n\nOnce you’ve installed the extension, this is how easy it is to spoof the string of your browser with a quick one-feature app.\n\n\n\n\n\n\n\nSimply search and scroll down to, say, the now antique Internet Explorer, and you’re set! Checking whatismybrowser.com will show that you are indeed using Internet Explorer to connect. \n\n\n\nPurpose-Built Browsers\n\n\n\nCertain browsers have been developed to such as Tor or Selenium to mask browser fingerprints based \n\n\n\nFor example, Tor defaults each user to have the same fingerprint, which minimizes targeted advertising and privacy concerns but also helps fraudsters remain anonymous to basic anti-fraud defenses.\n\n\n\nTo combat Tor, you can easily run an IP test and if this matches with a known Tor exit node, then you can block this traffic. To track Selenium usage, you can uncover evidence of the technology behind it (WebDriver) through JavaScript. \n\n\n\nIs User Agent Spoofing Malicious?\n\n\n\nMost developers rely on it to check how websites look from different devices. Some users change theirs for security reasons (for instance when using a VPN), but even certain browsers identify as others. For instance, the default Android web browser identifies itself as Safari to make compatibility easier.&nbsp;\n\n\n\nTry it out for yourself! Install the extension in a Chrome browser and hide yourself as if it was another one. Then, check below if your Chrome browser can be still detected or not:\n\n\n\n\n\n\n\n\nOther Advanced Spoofing Extensions\n\n\n\nThere are other tricks that fraudsters can use to change the way their browsers appear with a range of alternative extensions available at their disposal to attack your business.\n\n\n\nOne of them is the Trace extension, which includes an impressive list of protective features:\n\n\n\n\n\n\n\n\n\n\n\nWhile it’s certainly a lot of spoofed parameters, they are not indetectable to the right system. For instance, one that can look at the screen size would understand that it’s smaller than the actual visible part of the windows — a strong indicator that something is suspicious. You can also see it in the example below.\n\n\n\n\n\n\n\nThe next technology fraudsters can use are privacy-orientated browsers. Tails, which is favored by darknet users for its built-in access to Tor, is designed to work on an external hard drive so that all the information can be hidden or manipulated. It even comes with MAC address spoofing, which hides the serial number of your network interface and most of the information that could identify you on a network.&nbsp;\n\n\n\n\n\n\n\nWhat Is The Future Of Browser Spoofing Detection?\n\n\n\nOne interesting technique is the one designed by the anti-abuse team at Google. Codenamed Picasso, it’s a lightweight tool that works on the following assumption: every device has unique traits that cannot be cloned or simulated, and can, therefore, be identified by how it renders graphics.\n\n\n\nIf that’s true, then a graphical challenge could be designed to test the device, which is then compared to a genuine result.\n\n\n\n\n\n\n\nThe challenges do need to be randomized, which can be costly and take substantial effort and resources to set up. You also need several genuine references to each software and hardware stack combination, relating to the device hardware, OS and web browser. Moreover, the system needs to be up to date for every combination of these three parameters.\n\n\n\n\n\n\n\nHow SEON Detects Browser Spoofing\n\n\n\nSEON offers businesses a number of tools designed to detect suspicious usage. Our IP Analysis module, for instance, can let you know a range of parameters including:\n\n\n\n\nISP\n\n\n\ngeolocation\n\n\n\nIP Type\n\n\n\nopen ports \n\n\n\nspam checklists\n\n\n\nbrowser and proxy information\n\n\n\nVPN usage\n\n\n\n\nWith SEON, we are working together on their browser fingerprinting tool, which can be integrated into web and mobile apps via JavaScript. This nifty code can reveal hundreds of data points about the combinations of software and hardware of users, which can then be fed through risk rules to calculate how suspicious a connection is.\n\n\n\nFor more information about IP risk scores, or device fingerprinting and what they can do for your organization, contact SEON today!\n\n\n\n\n      Detect browser spoofing with SEON\n      SEON's anti-fraud tools are designed to detect suspicious usage and uncover hidden fraudsters\n \n        Ask an Expert\n      \n    \n\n\n\nFrequently Asked Questions:\n\n\n\nWhat is an example of user agent spoofing? The most common form of user agent spoofing – that is, changing the HTTP header data that identifies the connecting user to appear as a different user – is certainly for testing and developing webpages. Backend and frontend web devs will spoof their UA to make sure the website behaves the way they want it to from different angles, such as unique devices and locations. Malicious users may make use of tor browsers to mask and change their apparent location for the purpose of, say, using stolen credit card credentials and masking their location to that of the victim’s to avoid detection.  Is browser spoofing illegal? As there are plenty of legitimate uses for browser spoofing – indeed, a popular tool for spoofing was developed by Google – it is not illegal by itself. However, browser spoofing is often a component of many instances of online fraud, which are illegal and punishable by law.   \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON:&nbsp;Device Spoofing: How it Works?\n\n\n\nSEON: Cross Browser Fingerprinting\n\n\n\nSEON: Man in the Middle Attack\n\n\n\n\nLearn more about:\n\n\n\nBrowser Fingerprinting | Device Fingerprinting | Device Intelligence | Fraud Detection with Machine Learning &amp; AI\n\n\n\nExternal Sources:\n\n\n\n\nGulyás, Gábor György, PhD: About Me\n\n\n\nTails: Portable operating system that protects against surveillance and censorship\n\n\n\nTails: MAC address anonymization"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/","url":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/","name":"Browser Spoofing | What Is It & 3 Ways To Spot It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/06/browser_spoofing_cover.png","datePublished":"2020-06-29T12:17:59+00:00","dateModified":"2025-04-30T13:31:09+00:00","description":"Browser spoofing lets fraudsters fake which device they use to log onto your site. If you understand how, you'll be able to detect their attempts.","mainEntity":[{"@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/#faq-question-1688398644023"},{"@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/#faq-question-1688398679624"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/#primaryimage","url":"https://seon.io/wp-content/uploads/2020/06/browser_spoofing_cover.png","contentUrl":"https://seon.io/wp-content/uploads/2020/06/browser_spoofing_cover.png","width":1400,"height":800,"caption":"Browser spoofing examples SEON"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/#faq-question-1688398644023","position":1,"url":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/#faq-question-1688398644023","name":"What is an example of user agent spoofing?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The most common form of user agent spoofing – that is, changing the HTTP header data that identifies the connecting user to appear as a different user – is certainly for testing and developing webpages. Backend and frontend web devs will spoof their UA to make sure the website behaves the way they want it to from different angles, such as unique devices and locations. Malicious users may make use of tor browsers to mask and change their apparent location for the purpose of, say, using stolen credit card credentials and masking their location to that of the victim’s to avoid detection.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/#faq-question-1688398679624","position":2,"url":"https://seon.io/resources/3-examples-of-browser-spoofing-and-how-to-detect-them/#faq-question-1688398679624","name":"Is browser spoofing illegal?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"As there are plenty of legitimate uses for browser spoofing – indeed, a popular tool for spoofing was developed by Google – it is not illegal by itself. However, browser spoofing is often a component of many instances of online fraud, which are illegal and punishable by law. <br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/customer-risk-assessment-in-aml/#article","isPartOf":{"@id":"https://seon.io/resources/customer-risk-assessment-in-aml/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"What Is Customer Risk Assessment: Its Importance and How to Do It","datePublished":"2020-07-09T07:02:11+00:00","dateModified":"2025-09-30T11:08:23+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/customer-risk-assessment-in-aml/"},"wordCount":2156,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/customer-risk-assessment-in-aml/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","keywords":["Account Takeover","Fraud Detection","KYC"],"articleSection":["Article"],"inLanguage":"en-US","description":"Understanding and mitigating customer risk is pivotal to sustaining growth and maintaining a competitive edge. Customer risk assessment serves as a critical tool, enabling organizations to decipher the complexities of customer behavior, financial stability, and potential for fraud or default. This process not only safeguards a company’s assets but also fortifies its reputation, ensuring a trust-based relationship with its clientele.&nbsp;\n\n\n\nWhile customer risk assessment tools are mandatory for financial institutions, it is essential for all businesses. Failing to perform an adequate risk assessment can cost a lot in fines and leave organizations vulnerable to financial criminals.&nbsp;\n\n\n\nLet’s look more closely at what AML customer risk assessment is, how to do it, and what to consider before implementing it.\n\n\n\nWhat Is Customer Risk Assessment?\n\n\n\nIn the realm of anti-money laundering (AML), customer risk assessment is a critical process where financial institutions evaluate the potential risks posed by customers to prevent money laundering and terrorist financing.&nbsp;\n\n\n\nThis comprehensive evaluation includes verifying customer identities, checking customer details against various sanctions lists and analyzing transaction patterns, the services they use and their geographical connections. Conducting a customer risk assessment is a vital part of adhering to AML standards, as it enables financial institutions to pinpoint, comprehend, and lessen the potential risks that might emanate from their client base.\n\n\n\nThe assessment’s goal is to find out whether a customer poses a money laundering threat, is involved in financing terrorism, is a politically exposed person or appears on any criminal or sanctions lists.&nbsp;\n\n\n\nImplementing standardized AML customer risk assessment ensures that financial organizations can identify potential threats effectively, allowing them to decide on the appropriate level of due diligence. Such measures are vital for safeguarding the integrity of financial systems and maintaining compliance with national and international regulatory standards, ultimately ensuring secure and lawful business operations.\n\n\n\nWhat Does Customer Risk Assessment in AML Involve?\n\n\n\nCustomer risk assessment is a cornerstone of AML compliance, involving several key steps:\n\n\n\n\nCustomer identification and verification: Institutions must verify the identity of their customers using reliable, independent source documents, data, or information. This process, known as Know Your Customer (KYC), is crucial for establishing the customer’s identity and the legitimacy of their activities.\n\n\n\nAML customer risk scoring: This process involves assigning a numerical score to a customer or transaction based on various risk indicators, which helps in determining the level of scrutiny and monitoring required. This score is calculated using an AML risk scoring model, a tool that helps businesses measure how risky their customers are in terms of money laundering.&nbsp; It looks at things like what customers do for a living, where they live, and how they use their money. The model gives scores to different risk factors, adds them up, and uses this total score to decide how closely to watch a customer’s activities. If the score is high, the bank may need to look more closely at the customer’s transactions. The model is regularly updated to stay effective and to keep up with new laws and emerging risks.\n\n\n\nEnhanced Due Diligence (EDD): For customers classified as higher risk throughout AML customer risk profiling and found to be politically exposed persons (PEPs) or those from high-risk countries, enhanced due diligence measures are applied. This involves a deeper investigation into the customer’s background, source of funds, and the nature of their transactions.\n\n\n\nOngoing monitoring: Customer risk assessment is not a one-time process. Transaction monitoring is essential in AML to detect any unusual or suspicious behavior that could indicate money laundering or terrorist financing.\n\n\n\nSanction screening: Regularly screening customers against national and international sanctions lists ensures that the institution is not inadvertently facilitating illegal activities.\n\n\n\nTransaction review and reporting: Institutions must review transactions to identify patterns consistent with money laundering. Suspicious activities are reported to relevant authorities as per the regulatory requirements.\n\n\n\n\nBy rigorously assessing and monitoring customer risks, financial institutions can detect and prevent illicit activities, ensuring compliance with AML regulations and safeguarding the integrity of the financial system.\n\n\n\n\n      Discover Client Screening Solutions to Your Risks\n      Utilize SEON’s identification technology and advanced APIs to create an onboarding process that is low-friction and high-compliance.\n     \n        Client Screening Software\n      \n    \n\n\n\nThe Importance of Assessing Customer Risk\n\n\n\nAssessing customer risk is vital across industries, especially in finance, to safeguard against illegal activities and maintain trust. It’s not just about following rules; it’s about being a responsible player in the global financial system.&nbsp;\n\n\n\nFinancial institutions use AML customer risk assessment to prevent money laundering and terrorism financing, protecting themselves and their customers. These assessments pinpoint suspicious activities, helping to avert fraud and financial crimes. Moreover, they ensure that resources are focused where they’re most needed, enhancing operational efficiency.&nbsp;\n\n\n\nBy understanding the risk each customer poses, institutions can offer tailored services, maintaining compliance and building stronger customer relationships. In a world where financial transactions cross borders with ease, customer risk assessment is the anchor for navigating international regulations and managing global risks.&nbsp;\n\n\n\nUltimately, it’s about making informed, data-driven decisions to continuously refine AML case management strategies, ensuring the financial sector remains robust and trustworthy.\n\n\n\nMain Elements of an AML Customer Risk Assessment\n\n\n\nAML customer risk assessment is pivotal for financial organizations, ensuring compliance and mitigating risks associated with financial crimes. The two key components of customer risk assessment are risk identification, i.e. reviewing all available information to verify the customer’s identity and detect potential risk factors, and customer fraud scoring to categorize customers based on how great of a risk they pose to the business.&nbsp;\n\n\n\nCustomer Risk Identification\n\n\n\nInitially, financial institutions need identification proofing documentation to assess a customer’s risk profile. These are some of the main components of identifying customers and spotting potential risk factors:\n\n\n\n\nDifferentiating between individuals vs. entities: Differentiating between individual consumers and legal entities is vital, as each has distinct risk factors associated with their activities.\n\n\n\nReviewing customer affiliations and profiles: Understanding a customer’s background, including employment history, social connections, and financial behaviors, is crucial. Unusual financial activities, like a jobless individual making substantial deposits, can indicate potential risk.\n\n\n\nGeographic considerations: The risk level can vary based on a customer’s geographic connections. Special attention is needed for transactions in locations that don’t align with a customer’s residence or workplace. Money mules, who carry substantial amounts of cash, often establish accounts in various places to sidestep the requirement of declaring these cash transactions.\n\n\n\nReviewing services requested by customers: The nature of services a customer seeks can be indicative of risk. For example, frequent inquiries about cash deposit processes or international transfers might warrant closer scrutiny.\n\n\n\n\nCustomer Risk Scoring\n\n\n\nAfter evaluating the risk factors, a risk score is assigned to each customer in order to categorize them into different risk levels:\n\n\n\n\nLow-risk customers: These are individuals or entities with transparent financial activities and clear sources of income whose past transactions align with their profiles.\n\n\n\nMedium-risk customers: This category includes customers with slightly elevated risk levels, possibly due to connections to regions or industries known for financial discrepancies.\n\n\n\nHigh-risk customers: Customers requiring in-depth due diligence, possibly due to unclear funding sources or significant political connections, fall under this category.\n\n\n\nProhibited category: Individuals or organizations with a history of financial crimes are barred from engaging with financial institutions.\n\n\n\n\nUnderstanding and implementing these elements to your customer risk assessment enables you to manage customer risk effectively, ensuring a stable and secure financial environment.\n\n\n\nHow Long Does It Take to Assess a Customer?\n\n\n\nNavigating the digital landscape, businesses, especially non-financial ones, are faced with a critical dilemma: the need to accelerate user actions, like signing up or making purchases, while also mitigating risks and ensuring security. This delicate balance is pivotal as companies strive to eliminate churn, friction and barriers, enhancing user experience.&nbsp;\n\n\n\nTraditionally, acquiring financial services like bank accounts or insurance required submitting extensive personal data for customer risk assessment, often resulting in prolonged wait times. However, with modern advancements, these processes can now be nearly instantaneous, provided you’ve set up the right system in place.\n\n\n\nSEON’s 5 Steps To Customer Risk Assessment\n\n\n\nIdentifying and mitigating risks is paramount for businesses seeking to safeguard their operations and adhere to regulatory standards. SEON offers a comprehensive solution designed to enhance your AML customer risk assessment processes.&nbsp;\n\n\n\nInitial data gathering\nThe moment a visitor lands on your site, SEON springs into action and starts gathering vital information.&nbsp;\n\n\n\n\nIP analysis:&nbsp;Examine and analyze the user’s IP address to discern their geographic location, detect any use of Tor or VPNs and identify attempts to mask their connection.&nbsp;\n\n\n\nDevice fingerprinting:&nbsp;A robust method that unveils the unique combination of software and hardware your visitors use to access your site. By understanding the intricacies of their device configuration, browser specifics, and more, SEON not only recognizes returning users but also detects impersonators.\n\n\n\nDigital footprinting:&nbsp;An additional layer of verification which involves collecting and analyzing information generated by an individual’s entire online presence, utilizing real-time data and checking for a broad range of social and digital signals.\n\nRead more\n\n\n\nAnalyzing the gathered data\nSEON also does email analysis, which can unravel significant insights – from the age of the email account and its domain provider to any previous blacklist instances. Similarly, phone number analysis helps determine the type of line, the accuracy of the geographic match, and the authenticity of the network.&nbsp;\n\n\n\nCombining all the above data points, SEON helps you find correlations and anomalies and turn all the gathered information into meaningful insights that lead to faster and more accurate risk assessment.&nbsp;\nRead more\n\n\n\nPEPs &amp; Sanction Screening \nSEON’s AML API&nbsp;enables businesses to screen their customers’ names against a broad and regularly refreshed array of relevant watchlists. These lists cover all key compliance areas, encompassing checks for politically exposed persons (PEPs), sanctions, and criminal watchlists.\nRead more\n\n\n\nMonitoring transaction for AML \nSEON’s AML transaction monitoring solution proactively safeguards transactions like transfers and withdrawals by analyzing customer data and behaviors to spot potential money laundering signs. It helps you manage transaction volumes and escalate high-risk cases to your fraud teams for further examination. Combining machine learning and human analysis, you can notice patterns in vast data sets, enabling prompt, informed decisions. Enhanced with proprietary data and a user-friendly interface, this approach streamlines compliance and accelerates response to potential risks.\nRead more\n\n\n\nEvaluating risk\nThe culmination of the assessment is deciding on the risk level associated with a user. In the past, this decision heavily relied on the acumen and intuition of fraud managers. However, with the right risk assessment tool, the process is significantly refined through the use of sophisticated risk scores. These scores are derived from various rules – some pre-established for specific industries, others custom-made or even AI-recommended.\n\n\n\nUltimately, the power lies in your hands. You decide on the balance between stringent security measures, which might increase false positives and a more lenient approach that could allow some fraud risks. SEON empowers you with the flexibility to tailor your fraud and risk prevention strategy to your business’s unique needs, ensuring you maintain control over how you mitigate risk.\nRead more\n\n\n\n\n Secure Your Business and Stay Compliant\n Take the next step in building a secure, compliant, and trustworthy system. Discover how to refine your customer risk assessment processes and ensure a stronger safeguard against financial crimes.\n\n Speak with an Expert\n \n \n\n\n\nFrequently Asked Questions\n\n\n\nWho should assess customer risk? Customer risk assessment is crucial not only for banks but for any business involved in online transactions, including fintechs, crypto exchanges, online casinos, loan companies, and traditional financial institutions, as it helps differentiate between profitable customers and those who pose potential risks.  How do you do a risk assessment for AML? To conduct an AML risk assessment, first, individuals and entities must be differentiated to identify distinct risk factors. Review customer affiliations, financial behaviors, and geographic connections for potential risks. Then, evaluate the nature of the services customers seek, like frequent cash transactions or international transfers. Finally, assign a risk score to categorize customers into low, medium, high, or prohibited risk levels based on their profiles and activities. This process ensures effective risk management and compliance in the financial sector.  How to identify the need for customer risk assessment? If your business is involved in financial transactions or services where there’s a risk of money laundering, you’re required to comply with AML regulations, your customers engage in high-risk transactions, or if you operate in sectors or regions prone to financial crimes, a risk assessment tool is essential to identify, evaluate, and mitigate potential risks effectively.  \n\n\n\nYou might be interested in:\n\n\n\n\nSEON: Guide to Transaction Monitoring Software | Tools &amp; Tips\n\n\n\nSEON: Best-Rated Fraud Detection Software in 2025\n\n\n\nSEON: How AML Case Management Drives Efficiency in Financial Investigations"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/customer-risk-assessment-in-aml/","url":"https://seon.io/resources/customer-risk-assessment-in-aml/","name":"AML Customer Risk Assessment: Step-by-Step | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/customer-risk-assessment-in-aml/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","datePublished":"2020-07-09T07:02:11+00:00","dateModified":"2025-09-30T11:08:23+00:00","description":"SEON breaks down the AML customer risk assessment process to help you mitigate high-risk clients.","mainEntity":[{"@id":"https://seon.io/resources/customer-risk-assessment-in-aml/#faq-question-1711455010768"},{"@id":"https://seon.io/resources/customer-risk-assessment-in-aml/#faq-question-1711455022495"},{"@id":"https://seon.io/resources/customer-risk-assessment-in-aml/#faq-question-1711455038470"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/customer-risk-assessment-in-aml/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee","name":"Oliver Lebhardt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U04C2KQRCKB-f6bbf292c6fb-512-96x96.jpeg","url":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U04C2KQRCKB-f6bbf292c6fb-512-96x96.jpeg","contentUrl":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U04C2KQRCKB-f6bbf292c6fb-512-96x96.jpeg","caption":"Oliver Lebhardt"},"description":"Oliver Lebhardt is a Product Manager at SEON, leading its anti-money laundering (AML) product development. With 10+ years in entrepreneurship and investigative tech, he blends deep AML expertise with product vision. Formerly CEO and Co-Founder of Complytron, now part of SEON, he has a background in civic tech, journalism, and media transparency. Oliver holds a Master’s in Communication and Philosophy from Eötvös Loránd University and studied at Freie Universität Berlin. He is based in Budapest.","sameAs":["https://www.linkedin.com/in/oliver-lebhardt-50aa1a8/"],"knowsAbout":["AML Compliance"],"jobTitle":"AML Product Manager","url":"https://seon.io/resources/author/oliverlebhardt/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-risk-assessment-in-aml/#faq-question-1711455010768","position":1,"url":"https://seon.io/resources/customer-risk-assessment-in-aml/#faq-question-1711455010768","name":"Who should assess customer risk?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Customer risk assessment is crucial not only for banks but for any business involved in online transactions, including fintechs, crypto exchanges, online casinos, loan companies, and traditional financial institutions, as it helps differentiate between profitable customers and those who pose potential risks.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-risk-assessment-in-aml/#faq-question-1711455022495","position":2,"url":"https://seon.io/resources/customer-risk-assessment-in-aml/#faq-question-1711455022495","name":"How do you do a risk assessment for AML?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To conduct an AML risk assessment, first, individuals and entities must be differentiated to identify distinct risk factors. Review customer affiliations, financial behaviors, and geographic connections for potential risks. Then, evaluate the nature of the services customers seek, like frequent cash transactions or international transfers. Finally, assign a risk score to categorize customers into low, medium, high, or prohibited risk levels based on their profiles and activities. This process ensures effective risk management and compliance in the financial sector.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-risk-assessment-in-aml/#faq-question-1711455038470","position":3,"url":"https://seon.io/resources/customer-risk-assessment-in-aml/#faq-question-1711455038470","name":"How to identify the need for customer risk assessment?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If your business is involved in financial transactions or services where there’s a risk of money laundering, you’re required to comply with AML regulations, your customers engage in high-risk transactions, or if you operate in sectors or regions prone to financial crimes, a risk assessment tool is essential to identify, evaluate, and mitigate potential risks effectively.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-fraud-detection/#article","isPartOf":{"@id":"https://seon.io/resources/aml-fraud-detection/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"AML Fraud Detection: Its Importance &amp; How it Works","datePublished":"2020-08-24T13:54:24+00:00","dateModified":"2025-12-24T12:29:54+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-fraud-detection/"},"wordCount":2333,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","keywords":["AML"],"articleSection":["Article"],"inLanguage":"en-US","description":"Financial institutions and businesses face growing pressure to prevent criminal exploitation of their services. In the first half of 2024, global regulators issued 80 AML fines totaling $263 million—a 31% increase from 2023. The Asia-Pacific region saw a dramatic 266% rise, with penalties exceeding $46 million.\n\n\n\nThis surge reflects stricter regulatory enforcement, including a $65 million fine against a U.S. subsidiary of a Canadian bank for compliance failures. Fines for transaction monitoring violations also jumped to $30.5 million, up from $6 million last year.\n\n\n\nTo combat increasingly sophisticated financial crimes, organizations must adopt strong AML strategies to detect illicit funds, avoid hefty fines, and safeguard their reputation.\n\n\n\nWhat Is AML Fraud?\n\n\n\nAML fraud happens when money is illegally laundered (layered) through your products or services. Regardless of whether you are in banking, real estate, or even ecommerce, criminals will use any opportunity to launder money illegally acquired. \n\n\n\nWhile all money laundering is illegal, the fraud part happens if you have anti-money laundering controls in place, and criminals bypass them to reach their goals: layering the illegal funds, either themselves or using a money mule.\n\n\n\nHow Do Criminals Fool AML Identity Checks?\n\n\n\nWhether you’re a traditional financial institution, neobank or crypto exchange, the onboarding process is where you’ll need to be smart about checking data. And it’s also your duty to go above and beyond the obligatory KYC regulations.\n\n\n\n\n\n\n\nWith Fake and Stolen IDs \n\n\n\nStolen IDs that come from data breaches are often bought in bulk on the darknet, as well as information to create fake IDs, sometimes candidly advertised as full packages designed to enable you to open online bank accounts. Fraudsters also go to great lengths to acquire personal data via phishing, fake job openings, or plain old hacking.\n\n\n\nIf you want a drop account, you also have the option to purchase pre-created neobank accounts for your fraudulent needs. Just find one on the darknet and buy the login details from a seller.\n\n\n\nWith Synthetic IDs\n\n\n\nSynthetic IDs, meanwhile, combine real and fake personal data. For instance, fraudsters often use stolen ID details from children with clean credit records and use them for loan fraud. \n\n\n\nWith real credit information, it’s extremely easy to create fake IDs using templates designed to fool modern credit scoring. You can even find online services that specialize in Photoshop editing for ID fakes and 2FA verification.\n\n\n\nWhy Is AML Fraud Detection Important?\n\n\n\nOf course, companies implement AML software &amp; tools in order to fight AML fraud and improve AML detection, but a big plus is that it increases efficiency when handling a higher volume of transactions.&nbsp;With machine learning and velocity rules, a business can easily automate transactions with no human input by scanning multiple data sources to lower the need for manual reviews.\n\n\n\nAs society has only further headed towards the digital age, money laundering activities continue to increase and diversify – as does fraud – and staying on top of this is key.\n\n\n\nFurthermore, AML software can remove compliance risks. Whether you are a crypto exchange, a neobank, or a traditional financial institution, it’s your duty to be aware of and follow AML regulations. While there are different levels depending on your vertical, the core rules to follow include:\n\n\n\n\nAML holding period: A recommendation that funds deposited in an account must be held for a minimum of five trading days.\n\n\n\nReporting suspicious activity: Businesses must monitor customer deposits and transactions. Large sums, especially those exceeding $10,000, must be given extra attention by verifying their origin.\n\n\n\nAML education: The responsibility of letting customers know about AML laws falls on the shoulders of the business.\n\n\n\nLogging financial information: Businesses must keep extensive records that can be used to investigate suspicious financial transactions.\n\n\n\nCustomer due diligence (CDD): Knowing who your customers are through extensive KYC verification checks is also the business’s responsibility.\n\n\n\n\n\n      The Way to AML Compliance\n      Are you in a sector mandated by law to be AML compliant? Discover our impartial reviews of efficient and useful software here.\n     \n        Read more\n      \n    \n\n\n\nThe Basics of Money Laundering\n\n\n\nCriminals who acquire money through illegal means want to ensure the funds cannot be traced back to them. The process, known as money laundering, usually involves running the money through a legitimate business. This can be a cash-based brick-and-mortar shop or an online operation.&nbsp;\n\n\n\nThere are three steps involved in money laundering:\n\n\n\n\nPlacement: The dirty money is placed into the legitimate financial system.\n\n\n\nLayering: The money is concealed through transactions and bookkeeping tricks.\n\n\n\nIntegration: The money is now laundered and withdrawn from a legitimate account by criminals.\n\n\n\n\nThe Challenges of AML Detection Solutions\n\n\n\nThe biggest controversy surrounding AML is whether it’s effective at all. While heavy fines are so large that they can destroy a business, there is little evidence that the current approach helps to catch terrorists, criminals or insiders who abuse the financial system. This has been highlighted in several reports as well as opinion pieces in recent years, including in The Economist and on Reuters. \n\n\n\nAnd still, financial institutions must employ sizable teams of staff and consultants to help with transaction monitoring, even when it’s automated.&nbsp;\n\n\n\nThis is in part because of the ever-growing complexity of payment streams (ecommerce, increase of online volume, virtual currencies, prepaid cards), which, coupled with an increase in more sophisticated attacks, is causing a real headache for larger businesses to stay ahead of fraudsters. \n\n\n\nThe main challenge, however, isn’t necessarily in deploying the right team of resources to prevent money laundering. It’s about the friction that these checks create for customers.&nbsp;\n\n\n\nThis is particularly damaging for neobanks, whose entire business model relies on quick and painless onboarding via mobile or desktop. Throw in too many ID verifications and questions, and your potential customers might just turn elsewhere.\n\n\n\nIt doesn’t matter if you use in-house tools or third-party companies like Onfido (as does Revolut); the AML solution is stacked on top of already heavy regulations regarding customers’ identity in the form of KYC or PEP and Sanctions checks.\n\n\n\nHow Does AML Fraud Work?\n\n\n\nMoney laundering in its essence focuses on allowing a criminal to sign up for an account with a fake identity and laundering money through a business.\n\n\n\nSo, can you trust your AML solution for AML detection? \n\n\n\nWhat if you are diligent in your AML checks but accidentally miss some falsified information? Many developing countries don’t have bureaus for ID information to reliably perform checks with.\n\n\n\nReal criminals, moreover, have every incentive to hide their IDs from you. And there is no shortage of options for them to build fake profiles.\n\n\n\n1. Criminals acquire stolen ID scans from the deep web.\n\n\n\n2. They open bank or neobank accounts as “drops”.\n\n\n\n3. They deposit money in these accounts and withdraw to P2P money transfer apps or crypto exchanges.\n\n\n\n4. The funds are “tumbled”, i.e. moved across multiple accounts so they become untraceable.\n\n\n\nUnderstanding these steps helps to highlight where the challenge lies for financial institutions. The onboarding stage, where you collect all your customer information, is the stage where money launderers will work the hardest to fool you.&nbsp;\n\n\n\nThis brings us to the topic of tools you can put in place within your organization.&nbsp;\n\n\n\nWhat Connects AML and Fraud Detection?\n\n\n\nEssentially, AML compliance and fraud detection efforts require similar checks. You must ensure you can confirm your user’s identity, and flag any suspicious activity, both at the onboarding and transaction stage (deposits and withdrawals).&nbsp;\n\n\n\nThis is why a continuous detection solution like SEON's can help simultaneously with anti-fraud and anti-money laundering. Not just an AML and fraud prevention provider, SEON also allows you to keep granular logs of your AML screening and perform it at regular intervals, helping you towards your AML programs.\n\n\n\nWhat Features to Look for in AML Software\n\n\n\nIf you're an organization operating online and offering some form of payout, it's vital to utilize real-time fraud detection software. However, the importance of specific features will vary depending on the requirements of your business and industry.\n\n\n\nOn top of any compliance/regulatory demands, some specific features that you might want to look out for include:\n\n\n\n\nDigital footprinting capabilities: Create a basic user profile that details information from external sources on a single data point – for example, checking an email address to see if it’s deliverable and what domain type can reveal a level of risk.&nbsp;\n\n\n\nCustomizable rules and risk scoring: To help businesses streamline processing times and boost accuracy, a customizable ruleset will approve or reject any given action in real time without impacting the user’s journey. This is best calculated via an overall risk score.\n\n\n\nSocial media lookup: Building on digital footprinting, some software providers offer a social media tracking API that offers more insights about the user, essentially acting as an online passport.&nbsp;\n\n\n\nPEP screening and checks: Transactions involving a politically exposed person (PEP) or their family (RCA)– i.e., a president, politician, mayor, etc. – are considered high-risk due to the nature of the person's position and authority. Applying enhanced customer due diligence with these individuals helps prevent potential money laundering.\n\n\n\nSanctions lists checks: Sanctions lists that apply to your locale also need to be checked for any potential matches.\n\n\n\nCrime and fugitive watchlists and other blacklists: AML screening also involves ensuring that the customer's name is not on any law enforcement lists.\n\n\n\nPricing: For smaller businesses, paying per API call offers the most flexibility as your business grows. Businesses using the option of paying per individual check can complete operations in-house instead of outsourcing any transactions, which is often more costly. \n\n\n\n\nHow to Integrate AML Detection or Tools into Your Business\n\n\n\nFor ease, some businesses simply work with the AML software provided by their chosen payment gateway/processor. For example,&nbsp;Stripe has its own Radar tool, which uses historical payments and card data gathered through its platform to identify potential risks. SEON also provides a convenient AML screening tool.\n\n\n\nSome companies choose to employ their own in-house fraud prevention teams, as this provides more flexibility and security when faced with specific fraud challenges. However, to be truly successful, you need champions who are highly knowledgeable in the space and make the right hires when scaling. Otherwise, this can become an expensive endeavor. \n\n\n\nAlternatively, for most companies, we would recommend looking at cloud-based solutions from third-party providers that enable you to integrate APIs to create a multi-layered defense that is developed solely around the needs of your business. \n\n\n\nWith fraud detection solution, maintenance and upgrades happen when needed – but the multi-layered approach gives you complete control and flexibility over your prevention arsenal without any heavy fees or commitments.\n\n\n\n\n      Tailored AML Screening &amp; Monitoring Solutions for Your Business\n      Discover scalable AML solutions tailored to your needs. From payment gateway tools to API-driven systems, our insights help you achieve cost-efficient, robust fraud prevention with flexible, multi-layered protection.\n     \n        See How It Works\n      \n    \n\n\n\nHow to Screen for Bad IDs\n\n\n\nWe’ve already extensively covered how SEON’s tools, like digital footprint analysis and dynamic friction, can help, especially in the context of onboarding users with zero friction.&nbsp;\n\n\n\nBut it’s worth noting here that a key element of improving your AML compliance checks is to look at user behavior. This is something an experienced risk team can do, but it’s also possible to automate the process with certain risk management rules.\n\n\n\nPut simply, a fraud management engine will be monitoring and logging all user activity on your platform. And it’s up to you to feed that data through certain rules to see if the activity looks suspicious or not.\n\n\n\nHow to Use SEON to Help Your AML Compliance\n\n\n\nSEON offers a robust solution designed to enhance your compliance efforts. Our AML offering enables both manual and automated screenings against crucial watchlists, including sanctions and Politically Exposed Persons (PEP) lists, allowing you to customise the frequency of these checks based on your specific needs. Our platform also supports effective transaction monitoring through tailored rules that can quickly adapt to regulatory changes.\n\n\n\nIn addition, SEON’s fraud prevention tools identify risks such as multi-accounting and synthetic identity fraud, helping to minimize money laundering opportunities. The platform maintains detailed records of compliance checks, simplifying the filing of necessary reports like Suspicious Activity Reports (SARs) and demonstrating your adherence to regulations.\n\n\n\nSEON also provides alternative data sources that enhance manual reviews and serve as a pre-KYC step so can effectively identify fraudulent customers before they reach KYC and strengthen your AML compliance across your operations.\n\n\n\nFAQ\n\n\n\nIs AML software expensive? This depends entirely on your requirements. An all-in-one suite might cost more/involve a longer commitment but will quickly lift the majority of work from your business, whereas developing a multi-layered defense might mean taking time to identify the right tools but will be much more affordable in the long run.   Is AML a type of fraud? Not at all! AML stands for anti-money laundering, which is legislation put in place to combat money laundering, which is a type of fraud. Certain organizations, such as banks, are mandated by law to follow AML risk assessment requirements in almost every country.  What features are important for an AML fraud prevention software? A good fraud prevention tool will automate as much risk management as possible by calculating risk before declining, accepting, or sending for manual review accordingly. With key features such as machine learning, digital footprinting and device fingerprinting, you can create a clearer picture of the person trying to operate on your site.    \n\n\n\nSources\n\n\n\n\nFinextra: Bank AML fine values in 2020 already outstripping 2019\n\n\n\nGuardian: Is money laundering scandal at Danske Bank the largest in history?\n\n\n\nReuters: Anti-money laundering controls failing to detect terrorists, cartels, and sanctioned states\n\n\n\nThe Economist: The war against money laundering is being lost\n\n\n\nFenergo: Global Financial Institution Penalties on the Decline in 2021\n\n\n\n\nYou might be interested in:\n\n\n\n\nSEON: The Best Five Sanctions Screening Software &amp; Tools in 2024"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-fraud-detection/","url":"https://seon.io/resources/aml-fraud-detection/","name":"AML Fraud Detection: Techniques & Solutions | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","datePublished":"2020-08-24T13:54:24+00:00","dateModified":"2025-12-24T12:29:54+00:00","description":"Learn how AML fraud detection works, why it matters, and what tools and techniques help stop money laundering.","mainEntity":[{"@id":"https://seon.io/resources/aml-fraud-detection/#faq-question-1633957307105"},{"@id":"https://seon.io/resources/aml-fraud-detection/#faq-question-1655879054077"},{"@id":"https://seon.io/resources/aml-fraud-detection/#faq-question-1633957315694"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-fraud-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-fraud-detection/#faq-question-1633957307105","position":1,"url":"https://seon.io/resources/aml-fraud-detection/#faq-question-1633957307105","name":"Is AML software expensive?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"This depends entirely on your requirements. An all-in-one suite might cost more/involve a longer commitment but will quickly lift the majority of work from your business, whereas developing a multi-layered defense might mean taking time to identify the right tools but will be much more affordable in the long run. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-fraud-detection/#faq-question-1655879054077","position":2,"url":"https://seon.io/resources/aml-fraud-detection/#faq-question-1655879054077","name":"Is AML a type of fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Not at all! AML stands for anti-money laundering, which is legislation put in place to combat money laundering, which is a type of fraud. Certain organizations, such as banks, are mandated by law to follow <a href=\"https://seon.io/resources/aml-risk-assessment/#h-are-aml-risk-assessments-required\" target=\"_blank\" rel=\"noreferrer noopener\">AML risk assessment requirements</a> in almost every country.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-fraud-detection/#faq-question-1633957315694","position":3,"url":"https://seon.io/resources/aml-fraud-detection/#faq-question-1633957315694","name":"What features are important for an AML fraud prevention software?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A good fraud prevention tool will automate as much risk management as possible by calculating risk before declining, accepting, or sending for manual review accordingly. With key features such as machine learning, digital footprinting and device fingerprinting, you can create a clearer picture of the person trying to operate on your site.  ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#article","isPartOf":{"@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Device Spoofing and Anti-Fingerprinting: How Fraudsters Do It","datePublished":"2020-08-28T15:00:19+00:00","dateModified":"2025-12-24T12:29:12+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/"},"wordCount":1719,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Gabor Gulyas, data privacy and web tracking expert, shows us how fraudsters use browser spoofing to hide on your website.\n\n\n\nIn a previous article, I went over some of the basic techniques fraudsters use for browser and user agent spoofing.&nbsp;\n\n\n\nToday, we’re going for another deep dive, inspired in part by the research paper Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers. It’s going to be quite technical, but a fascinating look at how the bad guys operate!\n\n\n\nWhat Is Device Spoofing?\n\n\n\nDevice spoofing is a practice where people use specific tools to make it look like they are using different devices (phones, tablets, PCs, etc.). The tools generate software and hardware information designed to fool monitoring systems.Because websites monitor network traffic to improve security against fraud and attacks such as denial of service attacks, fraudsters and cybercriminals spoof the devices they use to hide their intentions. \n\n\n\nWhat Is an Anti-Fingerprinting Browser?\n\n\n\n[bctt tweet=\"While these browsers are branded as protecting people's privacy against tracking... their price and the technical skills needed to use them makes it clear: they focus on a different market.\" username=\"seon_tech\"]\n\n\n\nFingerprinting has two purposes on the web: advertising parties use it to track people and collect information about them, and anti-fraud teams, like SEON, use it for security: e.g. detecting fraudulent activities, even when fraudsters try to hide their devices.&nbsp;\n\n\n\nAlongside the development of fingerprinting techniques, device fingerprinting solutions also become increasingly sophisticated, pushing fraudsters and their suppliers to develop their own tools, purpose-built to evade detection.\n\n\n\nThis gives anti-fingerprinting browsers a euphemistic name: they are branded as a way to secure and protect people's privacy against tracking. While this is true, their price and the technical skills needed to use them makes it clear: these products focus on a different market.\n\n\n\nAs you can imagine, those who use them not necessarily have the best intentions in mind.&nbsp;\n\n\n\nIn fact, these anti fingerprinting browsers are built for device spoofing that’s tailored to mimic the online configuration of a real user – useful if you want to have a stolen credit card number or bank account and want to pass off as the legitimate owner.\n\n\n\nThese tools also allow rapid configuration switching to change their online “appearance” every minute. This is used to avoid detection of repeated attempts, and to test the best configuration that can scale, for instance, to cover automated bot attacks and general bot detection.\n\n\n\n\n      Protect your business against device spoofing\n      Take complete control over your risk management with SEON software and the support of an expert team\n \n        Ask an Expert\n      \n    \n\n\n\nThree Levels of Complexity\n\n\n\nOne way to discover the latest fraudster techniques is to crawl through dedicated underground forums. It’s something the SEON team is quite accustomed to, and this is where the authors of the aforementioned paper compiled a list of all the fraudsters’ tools of the trade.&nbsp;\n\n\n\nWe can split these into three categories.\n\n\n\nVia JavaScript Injection\n\n\n\nThe simplest tools, such as the ones that we have seen in our previous post, inject JavaScript code snippets into visited websites so they can modify the behavior of the page.&nbsp;\n\n\n\nDue to their nature, these tools are typically implemented as browser extensions. Some are shipped in modified browsers, while others are extensions that need to be installed manually.&nbsp;\n\n\n\nWhen a site tries to gather information, it’s met with manipulated data. For example, a site trying to access navigation.userAgent will get a different value than that of the default of the browser.\n\n\n\n\nStrengths and Weaknesses: These tools sacrifice features for ease of use. Fraudsters can easily buy, install and maintain them, but they’re also easier to detect with the right solution, for instance, a string comparison.\n\n\n\n\nAntiDetect (top) and FraudFox (bottom) both change functions that can be detected with a simple string comparison.\n\n\n\nNative Tools\n\n\n\nNative spoofing is somewhat more sophisticated and harder to detect. These tools are essentially browsers that are modified at the source code level, which lets fraudsters change fingerprinting attributes in a seamless way.&nbsp;\n\n\n\nIn that scenario, JavaScript functions can be modified at such a deep level that the detection methods mentioned above simply won’t work.\n\n\n\nAnother feature: the browser can add noise to certain values to confuse the tracking. The Mimic browser, for instance, has a feature called canvas poisoning, which is supposed to fool canvas fingerprinting.\n\n\n\n\nExamples of Native Tools: a great example is the Mimic browser. It is Chrome-based, and that lets users block fingerprinting features and add noise to certain values.\n\n\n\nStrengths and Weaknesses: While it’s harder to detect the Mimic browser, it’s not impossible because some errors and inconsistencies still appear when emulating other software and hardware stacks. For example, mimicking a Windows or Mac machine from Linux will still show browser plugins with .so extensions.&nbsp; Canvas noise can also be detected with the right setup.&nbsp;\n\n\n\n\nComplete Recreation of the Software and Hardware&nbsp;Stack\n\n\n\nFor dedicated fraudsters, the most sophisticated solution involves completely recreating a fake user environment. That means emulating the hardware as well as the operating system for an attack.\n\n\n\nLuckily, this is not only ambitious, but also very complex and expensive, which could be an obstacle to fraudsters who like to operate fast and at scale.&nbsp;\n\n\n\nThe bad news, however, is that while we know that solutions designed for that purpose exist, these are probably used on targeted hunts and are not advertised by fraudsters. Which means fraudsters using these kinds of methods could still be undetected by standard fraud and security solutions. However, they are currently only likely to be affecting a handful of people worldwide.\n\n\n\n\nExamples of what is used for complete software/hardware stack emulation: The closest tool we know of is probably a research tool called Blink. To avoid identification and tracking, Blink recreates a whole virtual machine stack every time it’s launched. \n\n\n\nStrengths and Weaknesses: Here again, small discrepancies can be detected between a real system and an emulated one. I mentioned Google’s Picasso in my previous post on browser fingerprinting, which runs graphical challenges. It could work here too.&nbsp;\n\n\n\n\nThe features of four different anti-fingerprinting solutions, as found here.\n\n\n\nThe takeaway of this analysis is the following. While emulating very specific configurations is possible in theory, these attacks are difficult to carry out and quite expensive; they just don’t scale. These barriers push most (or maybe all) fraudsters into using native spoofing tools that should be detectable. \n\n\n\nWhat is Canvas Fingerprinting?\n\n\n\nThere are a few ways to track users across the web. Most people will be familiar with web cookies, but you can also use a technique called canvas fingerprinting. Essentially, it looks at how the canvas element (part of HTML5) is rendered on the page.\n\n\n\nEach combination of browser, operating system and installed graphics hardware will have their own signature, which is how you can identify certain users over time. It’s the same kind of technology you will find on a website like AmIUnique.org , which shows you your fingerprinting and the proportion of users sharing the same features.\n\n\n\nSetting Up an Anti-Fingerprinting Detection Test\n\n\n\nSo how do you detect anti-detection tools? Let’s look at an example of how the SEON fraud prevention platform does it.&nbsp;\n\n\n\nIn this scenario, we’ll try to detect a browser that uses noise to hide its real values. More specifically, one that generates a random font set, so that the software “looks” like another one.\n\n\n\nFont masking options \n\n\n\nTo detect these non-native fonts, we set up a simple website that runs a font-probing JavaScript code. This performs a series of security tests, hidden from the user. It renders two identical text elements, one with the system default font, and one with the currently used font, to look for differences.&nbsp;\n\n\n\nIf there are any differences between the two font sets, we can assume that one of them has been installed later, which points to a spoofing attempt.&nbsp;\n\n\n\nAn example of font probing by JavaScript. These tests are hidden from the user and help identify spoofing attempts.\n\n\n\nAs for our own font detection website, it used a set of optimized cloud fonts. (We could have used FingerprintJS, but our own solution got results 66.1% faster.)\n\n\n\nAfter running a few tests, we managed to establish values representing real browsers versus fake ones.\n\n\n\nStandard browsers gave a score of 4 or 5 but anti-fingerprinting browser tends to distribute them between 0 - 10.\n\n\n\nThat means we can now create a strong custom rule with simple thresholds. If the value is between 3 and 6, we can decrease the risk factor. Anything above or below that should make the risk score go up and can point towards an attack attempt.\n\n\n\nA Technological Arms Race\n\n\n\nThere is a strange dynamic between fraudsters and anti fraudsters. It’s a bit like an arms race. Whoever has the most advanced technology at the time can win, but only until the other side catches up.\n\n\n\nThe good news is that even the latest anti-fingerprinting browsers aren’t fully undetectable yet. Thanks to advanced techniques like font probing and canvas fingerprinting, which are included in the SEON platform to detect device spoofing, you can still take the upper hand against bad agents trying to exploit your business.\n\n\n\n\n      Stop fraud rings and bot attacks with SEON\n      SEON offers the most advanced device fingerprinting tech to uncover fraudulent activity from customer devices\n \n        Ask an Expert\n      \n    \n\n\n\nDevice Spoofing FAQs\n\n\n\nWhat is an example of device spoofing? A common example of spoofing is IP spoofing using a VPN. You can also spoof your device's MAC address, and use more sophisticated tools to spoof your entire hardware and software configuration. User-Agent spoofing also helps developers preview web pages as if they were in different browsers.  What is the most common type of spoofing? IP address spoofing is the most common type of spoofing. A VPN, proxy or Tor connection will essentially replace your real IP address with another – which is considered spoofing.   What does spoofing your phone mean? Spoofing your phone means using a device to display a different caller ID. This is often used by scammers and fraudsters to hide their identities when calling victims."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/","url":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/","name":"Device Spoofing: What It Is & How to Detect It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","datePublished":"2020-08-28T15:00:19+00:00","dateModified":"2025-12-24T12:29:12+00:00","description":"Do you know all the device spoofing & anti-fingerprinting scams used by fraudsters? SEON teams up with Gabor Gulyas to provide the answers.","mainEntity":[{"@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#faq-question-1639135767329"},{"@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#faq-question-1639137810333"},{"@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#faq-question-1639137874942"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#faq-question-1639135767329","position":1,"url":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#faq-question-1639135767329","name":"What is an example of device spoofing?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A common example of spoofing is IP spoofing using a VPN. You can also spoof your device's MAC address, and use more sophisticated tools to spoof your entire hardware and software configuration. User-Agent spoofing also helps developers preview web pages as if they were in different browsers.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#faq-question-1639137810333","position":2,"url":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#faq-question-1639137810333","name":"What is the most common type of spoofing?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"IP address spoofing is the most common type of spoofing. A VPN, proxy or Tor connection will essentially replace your real IP address with another – which is considered spoofing. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#faq-question-1639137874942","position":3,"url":"https://seon.io/resources/device-spoofing-and-anti-fingerprinting-how-fraudsters-do-it/#faq-question-1639137874942","name":"What does spoofing your phone mean?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Spoofing your phone means using a device to display a different caller ID. This is often used by scammers and fraudsters to hide their identities when calling victims.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/which-online-payment-methods-have-the-highest-fraud-risk/#article","isPartOf":{"@id":"https://seon.io/resources/which-online-payment-methods-have-the-highest-fraud-risk/"},"author":{"name":"Agnes Csoka","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6"},"headline":"Assessing Fraud in High-Risk Payment Methods","datePublished":"2020-09-01T08:00:00+00:00","dateModified":"2025-10-29T10:02:28+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/which-online-payment-methods-have-the-highest-fraud-risk/"},"wordCount":972,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/which-online-payment-methods-have-the-highest-fraud-risk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Find out which payment methods are most vulnerable to fraud and how to reduce your risk."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/which-online-payment-methods-have-the-highest-fraud-risk/","url":"https://seon.io/resources/which-online-payment-methods-have-the-highest-fraud-risk/","name":"Assessing Fraud in High-Risk Payment Methods","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/which-online-payment-methods-have-the-highest-fraud-risk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","datePublished":"2020-09-01T08:00:00+00:00","dateModified":"2025-10-29T10:02:28+00:00","description":"Discover which online payment methods carry the highest fraud risk — from cards to crypto — and learn how businesses can minimize exposure.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/which-online-payment-methods-have-the-highest-fraud-risk/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/a-better-ip-address-geolocation-service-for-igaming-compliance/#article","isPartOf":{"@id":"https://seon.io/resources/a-better-ip-address-geolocation-service-for-igaming-compliance/"},"author":{"name":"Oliver Bognar","@id":"https://seon.io/#/schema/person/b5461bcf75829644bd246becc5637c20"},"headline":"IP Geolocation for iGaming Compliance: Where It Breaks and How Players Bypass It","datePublished":"2020-09-18T14:04:23+00:00","dateModified":"2026-04-14T14:07:50+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/a-better-ip-address-geolocation-service-for-igaming-compliance/"},"wordCount":1346,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/a-better-ip-address-geolocation-service-for-igaming-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","keywords":["Fraud Detection"],"articleSection":["Article"],"inLanguage":"en-US","description":"Learn why IP geolocation alone fails for iGaming compliance and how SEON uses IP scoring and VPN detection to stop geohacking."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/a-better-ip-address-geolocation-service-for-igaming-compliance/","url":"https://seon.io/resources/a-better-ip-address-geolocation-service-for-igaming-compliance/","name":"IP Geolocation for iGaming: Failures and How Players Bypass It","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/a-better-ip-address-geolocation-service-for-igaming-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2020-09-18T14:04:23+00:00","dateModified":"2026-04-14T14:07:50+00:00","description":"Learn why IP geolocation alone fails for iGaming compliance and how SEON uses IP scoring and VPN detection to stop geohacking.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/a-better-ip-address-geolocation-service-for-igaming-compliance/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-detect-a-poker-bot-farm/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-detect-a-poker-bot-farm/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How to Detect a Poker Bot Farm","datePublished":"2020-09-21T13:32:54+00:00","dateModified":"2025-12-24T12:28:18+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-detect-a-poker-bot-farm/"},"wordCount":1991,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-detect-a-poker-bot-farm/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/09/Poker_bot_09_17.png","articleSection":["Article"],"inLanguage":"en-US","description":"Worried a poker bot farm is hiding on your iGaming site? Use these tools to protect your business and players\n\n\n\nSummer 2020 made history in the iGaming community, as a data leak exposed one of the biggest poker bot rings ever found. And the numbers are staggering, even when the dump only looked at a fraction of the operations:\n\n\n\n\n60,000 sessions played\n\n\n\n50 poker sites targeted\n\n\n\n$675,000 earned in rakeback\n\n\n\n$3M earned in winnings&nbsp;\n\n\n\n\nIt was a remarkably sophisticated attack, and understandably, players were furious. Had they been losing money to an organized criminal network? Were those online poker sites' security too lax?&nbsp;\n\n\n\nAnd how should you deal with poker bot farms before they create a PR crisis for your iGaming platform? All the answers below.\n\n\n\nWhat Is a Poker Bot Farm?\n\n\n\nA poker bot farm is a term that describes any group of malicious poker bots coordinating to commit poker-related fraud – usually to the detriment of online poker rooms but also, sometimes, of legitimate poker players. These bots collude to fix online poker games for various purposes, from money laundering to bonus abuse. \n\n\n\nOn its own, a poker bot can help fraudsters cheat the system so they can win or lose a hand of online poker, no matter their opponents' strategy or luck. When a criminal employs a group of online poker bots, they are able to:\n\n\n\n\nscale up their efforts, winning more or losing more at will\n\n\n\nfix entire tournaments to win otherwise difficult-to-win prizes\n\n\n\nplay through any sign-up or other bonus requirements, thus scamming the poker platform\n\n\n\ncollude to conduct money laundering via the poker platform\n\n\n\n\nThe Attraction of Online Poker Tables\n\n\n\niGaming, casinos and sports betting attracts all kinds of fraudsters for bonus abuse, account takeover, credential stuffing, and transaction fraud, to name but a few. The quick access to money makes them a high target, as they essentially act as online wallets.&nbsp;\n\n\n\nBut poker tables and poker sites are the most frequently targeted games, and for two good reasons. Firstly, fraudsters can increasingly deploy software, or bots, that automate online play. These still require some oversight, which is why all the sessions logged in the data dump were from suspicious users who operated between 9-5. They were probably monitored by fraudsters who took it as a job.\n\n\n\nSecondly, the fact that poker is a multiplayer game adds another layer of complexity in the form of player collusion.&nbsp;\n\n\n\nPut simply, it’s a coordinated effort between players to consolidate a win by having other players lose on purpose, and it’s a huge problem for a variety of reasons. In fact, it’s such a huge problem that online casinos won’t even offer signup bonuses for their poker games.\n\n\n\n\n      Spot &amp; Prevent Poker Bots\n      Partner with SEON to easily spot poker bots &amp; reduce fraud in your business with real-time data enrichment, whitebox machine learning, and advanced APIs.\n     \n        Ask an Expert\n      \n    \n\n\n\nThe Rise of AI-Driven Poker Software\n\n\n\nEverybody is familiar with the high stake games between human chess players and machines, but advances in artificial intelligence and machine learning mean that researchers are increasingly turning towards more complex games like poker.\n\n\n\nAs poker combines mathematical skills with human traits like psychology and deception, it was previously thought impossible to learn for computers.\n\n\n\nBut the University of Alberta Computer Poker Research Group in Canada, for instance, is at the forefront of AI-driven software that can replicate poker player behavior. As of 2020, the group has released five free, open-source programs which attempt to “solve” different poker games, and make them unbeatable.&nbsp;\n\n\n\nThe problem? The code is fully open source. The program Polaris, for instance, designed to play Texas hold’em poker, is extremely popular for deploying poker bots.&nbsp;\n\n\n\nWhile these tend to play on the lowest limits, even tournament users cannot rule out that they are playing against bots, especially during the middle and late phases, which are strongly influenced by a player’s mathematical skills.\n\n\n\nAnd as technology continues to evolve, it will become harder than ever to differentiate between human players and machines.&nbsp;\n\n\n\nWhen Fraudsters Organize\n\n\n\nIn a normal multiplayer poker tournament, players are unable to communicate with each other. The practice is called Ghosting, and it is not only hard to pull off, but also prohibited.\n\n\n\nHowever, in the online world, it’s nearly impossible to enforce a policy that prevents players from sharing advice.&nbsp;\n\n\n\nAnd if the players had planned to work together beforehand, in the form of collusion, it becomes even more challenging to spot connections between the players. This creates all kinds of risks:\n\n\n\n\nLoss of player confidence: The poker economy is a pyramid, where the money rises up to the top 1% and the rest is eaten up by rake or goes to the house. Operators recognize this and do what they can to protect the middle and bottom of the pyramid in feeling safe and that they have a chance to win. But when bots are involved, that trust is eroded and players will move to other operators’ tables.\n\n\n\nNegative PR: as we’ve seen from the backlash against operators whose tables had been infiltrated by bots, players will turn on the company for not doing enough.&nbsp;\n\n\n\nMoney laundering risk: organized crime syndicates can use poker tables on iGaming sites to launder their money as a part of an AML fraud, which ends up in potential huge AML fines for your company.\n\n\n\nExpensive damage control: not only will your players migrate to other sites with better reputations, you will also be flooded with a request for refunds. Whether you return the lost funds or not, the damage has already been done as your support team will be overwhelmed, and your reputation hurt.\n\n\n\n\nHow SEON Can Detect a Poker Bot Farm\n\n\n\nThe SEON anti-fraud platform is exceptional at spotting hidden customer connections, stopping multi-accounting and easily finding spoofed devices or locations – the type of tool used by poker botnets to enable their schemes. \n\n\n\nToday, we’ll look specifically at the data found in that huge 44GB data set dump from August 2020, and demonstrate how SEON could have helped expose the bots.\n\n\n\nFirst, let’s examine exactly how the poker bot farm ring worked in that particular scenario:&nbsp;\n\n\n\n\nThe fraudsters somehow found players willing to sell their accounts and personal information. These included passport photos, address verification ad bank statements. It’s worth noting that these were real people, not synthetic IDs as in the example of synthetic identity fraud. \n\n\n\nVirtual machines (VM) were created, and IP and device information was faked so that the connections looked like they were from areas near each player. \n\n\n\nEach VM was loaded with all the necessary information including ID data, poker software, payment details. They then create a new account for each identity.\n\n\n\nA fraudster “employee” came into work every day and launches the programs. He also took screenshots and ensured the bots functioned well.\n\n\n\n\nNote that steps 1, 2 and 3 above all relate to the onboarding or registration stage. Here are the verification checks we should apply:\n\n\n\n\nIP analysis: The fraudsters used proxies designed to spoof IP addresses. This will identify suspicious discrepancies as well as some spoofing tools such as Tor.&nbsp;Risky countries can also be flagged – Russia or Ukraine, for example.\n\n\n\n\nYou can SEON's IP address check below to see the wealth of information it can offer, complete with data points that can point to red flags.\n\n\n\n\n\n\n\n\nDevice fingerprinting: This particular group of fraudsters had access to spoofing technology designed to trick analysis tools. SEON is able to identify and point out a range of tools used by fraudsters, including spoofing software and virtual machines.\n\n\n\n\n\nEmail analysis: By analyzing all customers' email addresses at the onboarding stage, SEON would have spotted that the email addresses used by the fraud ring that ran the poker bot farm all followed similar patterns. \n\n\n\n\nThis is most certainly where SEON would have alerted your company of the risk. Most of these players had similar email addresses, such as firstnamelastname@yahoo.com, with a few numbers thrown in for good measure.&nbsp;\n\n\n\nSEON’s string analysis feature, for instance, can examine an email handle to ensure it’s not too generic, or to compare it with other recent signups. We also check what kind of domain is used, and whether it has been part of a data breach – a data breach lowers the risk score, as it is a sign that you’re dealing with a mature email address rather than one created a few days ago.\n\n\n\n\n\n\n\n\nPhone analysis: Had the fraudsters created virtual phone numbers, SEON would have immediately increased the fraud risk after performing a reverse phone lookup.\n\n\n\n\n\nSocial media lookup: At SEON, this is a key part of what SEON likes to call digital footprint analysis. Using someone's email, we search {smno} social media and crowdsourced platforms to see if it has any presence there – from LinkedIn and Twitter to Airbnb and Disney+. Because these addresses were created to enable multi accounting, we would have been able to clearly see that few of the fraudsters had online accounts, which is a red flag.\n\n\n\n\n\n\n\n\n\nVelocity rules: Velocity rules attempt to understand player behavior by considering when and how often an action is done. This is a type of rule that can be tweaked at will on the SEON platform – which also comes with industry-specific presets and machine learning suggestions. \n\n\n\n\nFor instance, SEON's velocity rules can identify when users have similarities that could imply they're the same person – a key pain point for all iGaming brands, poker-related or not. Examples of this include monitoring the time frame between the first and last game, and betting strategies. \n\n\n\nIn this particular instance we're studying, he bots ran 9–5 Monday to Friday with consistency, which could have alerted the victims if it had been monitored. Moreover, most of the bot accounts were found on tables with stakes between 10NL and 200NL. Other technical statistics such as post-flop Agg% and comparing stats with banned bots can also be monitored, per the platform's risk tolerance.\n\n\n\nIt’s worth highlighting that SEON's granular, customizable software lets you create custom fields specifically to analyze this kind of data, which wouldn’t be taken into account by a standard transaction fraud solution.\n\n\n\n\n      Reduce Fraud Rates by 70–99%\n      Partner with SEON to reduce fraud in your business with real-time data enrichment, whitebox machine learning, and advanced APIs.\n     \n        Ask an Expert\n      \n    \n\n\n\nDon’t Let Poker Bots Hurt Your Reputation\n\n\n\nA poker bot farm by itself doesn’t necessarily hurt your operations. In fact, shadier iGaming companies have been known to populate their games with bots alongside real players. Similarly, the best poker players have no problem playing against them.\n\n\n\nThe issue, however, is that the majority of your players will feel cheated if a farm operates on your platform. And as leaks from 2015 and 2020 show, players will take matters into their own hands to find suspicious behavior, and will complain to you directly.\n\n\n\nIn other cases, there's more than your reputation that you have to lose, as poker bots can cost you your AML compliance, as well as some of the bonuses you are wanting to hand out to legitimate customers.\n\n\n\nLuckily, even the most sophisticated bot rings can be spotted with a combination of digital footprint analysis, device fingerprinting, velocity checks and IP analysis at the point of registration and powerful custom rules created by your fraud managers and the machine learning module.\n\n\n\n\n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON: How to Prevent iGaming Fraud\n\n\n\nSEON:&nbsp;Reducing Bonus Abuse in iGaming\n\n\n\nSEON: Stop Multi Accounting Fraud\n\n\n\n\nLearn more about:\n\n\n\nDigital Footprinting | Browser Fingerprinting | Device Fingerprinting | Fraud Detection with Machine Learning &amp; AI\n\n\n\nSources\n\n\n\n\nVIP Grinders: MASSIVE POKER BOT FARM DETECTED ACROSS MULTIPLE ONLINE POKER SITES\n\n\n\nUniversity of Alberta: University of Alberta Computer Poker Research Group"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-to-detect-a-poker-bot-farm/","url":"https://seon.io/resources/how-to-detect-a-poker-bot-farm/","name":"Don’t Let a Poker Bot Farm Damage Your iGaming Platform","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-detect-a-poker-bot-farm/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/09/Poker_bot_09_17.png","datePublished":"2020-09-21T13:32:54+00:00","dateModified":"2025-12-24T12:28:18+00:00","description":"A poker bot farm will hurt your players and destroy your reputation with online poker players. Here are the tools you need to spot them.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-detect-a-poker-bot-farm/#primaryimage","url":"https://seon.io/wp-content/uploads/2020/09/Poker_bot_09_17.png","contentUrl":"https://seon.io/wp-content/uploads/2020/09/Poker_bot_09_17.png","width":1400,"height":800,"caption":"How to detect a poker bot farm article cover image. A robot arm holds four poker cards."}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-fight-return-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-fight-return-fraud/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"Return Fraud: What Is It &amp; How To Prevent It","datePublished":"2020-10-02T13:37:44+00:00","dateModified":"2025-11-18T16:53:28+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-fight-return-fraud/"},"wordCount":2340,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-fight-return-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"It’s the smaller e-tailers who have to bear the brunt when things go wrong with return fraud."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/how-to-fight-return-fraud/","url":"https://seon.io/resources/how-to-fight-return-fraud/","name":"What is Return Fraud? Its Types & How to Prevent It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-fight-return-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","datePublished":"2020-10-02T13:37:44+00:00","dateModified":"2025-11-18T16:53:28+00:00","description":"Learn more about return fraud and its consequences for retailers and businesses, and new prevention and detection strategies.","mainEntity":[{"@id":"https://seon.io/resources/how-to-fight-return-fraud/#faq-question-1631017637240"},{"@id":"https://seon.io/resources/how-to-fight-return-fraud/#faq-question-1631017780862"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-fight-return-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-fight-return-fraud/#faq-question-1631017637240","position":1,"url":"https://seon.io/resources/how-to-fight-return-fraud/#faq-question-1631017637240","name":"How do you identify return fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Analyze the patterns of previously flagged fraud orders and set up rules to monitor historically suspicious signs – customers connected to previously charged back purchases would be the prime example, as are accounts using throwaway details.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-fight-return-fraud/#faq-question-1631017780862","position":2,"url":"https://seon.io/resources/how-to-fight-return-fraud/#faq-question-1631017780862","name":"What solutions are there to detect return fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A proper fraud detection solution allows you to flag suspicious orders, while connecting your risk team with your refund processing department and setting up information sharing can help you curb fraudulent returns before they happen.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#article","isPartOf":{"@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Virtual SIM Cards: What They Are &amp; How Fraudsters Use Them","datePublished":"2020-10-16T10:59:23+00:00","dateModified":"2025-11-18T16:54:09+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/"},"wordCount":1987,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"How and why do fraudsters use virtual SIM cards? And how do you stop them?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/","url":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/","name":"What Is a Virtual SIM Card? Detect Fake SIM Cards | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2020-10-16T10:59:23+00:00","dateModified":"2025-11-18T16:54:09+00:00","description":"Phone numbers are often used for authentication and account creation. Here's why it will backfire without virtual SIM card detection tools, try our tool.","mainEntity":[{"@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#faq-question-1632142294681"},{"@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#faq-question-1632142399932"},{"@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#faq-question-1632142479798"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#faq-question-1632142294681","position":1,"url":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#faq-question-1632142294681","name":"How is a virtual SIM card used for fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraudsters use virtual SIM cards to receive OTP and 2FA messages without linking their phone numbers to an identity. It allows them to commit ID fraud, transaction fraud, and even account takeover attacks.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#faq-question-1632142399932","position":2,"url":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#faq-question-1632142399932","name":"How to spot fake SIM cards used for fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Using a phone analysis tool, you can immediately know if the phone number is from a legitimate carrier or a third-party app. The latter doesn't always mean it's fraud, but it should increase your suspicions that someone is trying to hide something.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#faq-question-1632142479798","position":3,"url":"https://seon.io/resources/virtual-sim-card-detection-this-is-how-you-spot-a-fake-phone-number/#faq-question-1632142479798","name":"What are popular SIM Card fraud techniques?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraudsters who want to bypass phone verification and authentication can either use fake phone numbers, stolen phone numbers, or virtual SIM cards and eSIMs. This allows them to receive SMS and phone calls without tying the number to someone's name. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/identity-proofing-what-is-it/#article","isPartOf":{"@id":"https://seon.io/resources/identity-proofing-what-is-it/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Identity Proofing: What Is It &amp; How Can It Prevent Fraud?","datePublished":"2020-10-26T08:00:00+00:00","dateModified":"2026-01-16T13:52:54+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/identity-proofing-what-is-it/"},"wordCount":1903,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/identity-proofing-what-is-it/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Have you ever wondered what kind of scams hide behind these “make money from home” adverts? \n\n\n\nWell, after receiving a referral link, you’ll be prompted to sign up for their service. It’s an exclusive club, which requires you to submit a few documents. Once all your ID details have been submitted, you’ll receive your free $150.&nbsp;\n\n\n\nIt only takes one quick glance at the required fields to understand what’s going on: The service is essentially buying your personal ID documents.&nbsp;\n\n\n\nHow are they worth $150? Well, these documents are increasingly valuable to fraudsters and criminals. And in this post, we’ll look at the many ways they acquire them, use them, and why identity proofing is more important than ever in the online world.\n\n\n\nWhat Is Identity Proofing?\n\n\n\nIdentity proofing is the act of authenticating a person's identity when they are either making a purchase, submitting an application, or simply engaging with something that needs a level of verification.\n\n\n\nPreviously customers often had to send a physical form of identity documents for verification purposes however with biometrics, video identity verification, and other modern tech, the company can carry out KYC checks in a much more user-friendly manner.\n\n\n\nIt’s a legal requirement in certain industries (banking, fintech), and a must-have in fraud prevention but it’s a slow process, which can increase churn and turn your users away.\n\n\n\nHow Does Identity Proofing Work?\n\n\n\nAccording to the US National Institute of Standards and Technology, remote identity proofing has three key factors to ensure full protection: resolution, validation, and verification.\n\n\n\n\nIdentity resolution is the act of distinguishing a users identity amist a customer database, population or another similar user-based system.\n\n\n\nIdentity validation: gathering unique evidence from the person ie password, security questions etc.\n\n\n\nIdentity verification: before finally confirming the evidence submitted matches the data provided. \n\n\n\n\nWhy Is Identity Proofing Important?\n\n\n\nFor companies that look to streamline onboarding processes, identity proofing is important to protect businesses, and its users, against fraudsters as this extra layer looks to ensure only trusted individuals are able to access any data/products.\n\n\n\nScenarios include:\n\n\n\n\nKYC requirements: financial institutions, for instance, are under pressure to prove their users’ identities under Know Your Customer procedures.\n\n\n\nDigital credit scoring: Similarly, a loan provider would need to build a user profile based on user IDs.\n\n\n\nSCA/PSD2: Strong Customer Authentication, which is recommended under the PSD2 directive, aims to increase checks against stolen authentication elements\n\n\n\nAML: Anti money laundering checks, found, amongst others, in iGaming and forex exchanges, also require document verification\n\n\n\nFraud prevention: confirming your user’s identity is one way to flag fraudsters. This helps reduce transaction fraud, and in turns chargebacks. You can also confirm a user’s identity if you flag a suspicious login attempt. Similarly, strange online behaviour (large cash deposits and withdrawals) could warrant an extra authentication step.\n\n\n\n\nHow Big of a Problem Is Identity Fraud?\n\n\n\nAs the world continues to become more digital, so do the opportunities to steal personal/sensitive information and according to the Aite Group, losses due to identity theft are forecasted to increase to a staggering $721.3 billion in 2021.&nbsp;\n\n\n\n\n\n\n\n\n      Want to Build Smarter, Safer Identity Proofing Flows?\n      Speak with one of our experts to see how SEON helps businesses catch high-risk users before document checks, and onboard trusted customers faster with risk-aware verification.\n    \n        Ask an Expert\n      \n    \n\n\n\nThe Limitations of Document Verification\n\n\n\nDocument verification can be an incredibly useful tool to help validate a customer on your site, however it does bring both compliance and security issues as fraudsters become better at acquiring IDs. \n\n\n\nAs we’ve seen in our opening example, some people willingly sell their IDs online, probably unaware of the consequences. But unscrupulous individuals who want to acquire IDs have no shortage of options.\n\n\n\nData breaches\n\n\n\nCriminal organizations are constantly targeting companies for their user data. In the first half of 2020 alone, Nintendo lost 160,000 accounts; Twitter lost 130,000; and EasyJet lost 9 million customer records.&nbsp;\n\n\n\nThese customer profiles are then sold in bulk on the darknet. Fraudsters trawl through the databases and use all the information they can exploit to create accounts based on real information – which is why it’s imperative to put measures in place designed to prevent identity theft.\n\n\n\nPhishing\n\n\n\nEssentially a scam or deceptive technique designed to get users to submit their ID documents by themselves. Users are targeted via SMS, email or even phone calls. The technique sometimes overlaps with what is known as “social engineering” whereby fraudsters steal information in real-life scenarios.\n\n\n\nOne interesting topical point: phishing techniques are constantly evolving and increasing in sophistication. In the COVID-19 era, when customers are increasingly online and confused, these attacks have multiplied. \n\n\n\nFraudsters will use communications related to travel refunds, Amazon Prime or banking, which redirect users to landing pages designed to farm personal data.&nbsp;\n\n\n\nFake ID Services/DIY Options\n\n\n\nNot all IDs are stolen. Some of them are falsified for specific purposes. For instance, a fraudster who only needs a selfie with a driving license could easily log onto a clearnet ID photoshopping website and buy the appropriate document.&nbsp;\n\n\n\nDarknet marketplace sellers also offer ID templates, so users can create their own documents with their preferred image editing software.&nbsp;\n\n\n\n\n\n\n\nIt takes very little know-how to get a fake selfie. And you can even find dozens of these services on the clearnet – no need for technical knowledge or crypto payments.\n\n\n\nCash In Hand/Low Tech\n\n\n\nA method increasingly found in developing markets, where organized criminals set up shops and purchase people’s IDs on-site. It’s also worth noting that fake IDs are almost considered a rite of passage in places like the U.S. where the market for fake driver licenses (to bypass underage drinking law) creates a constant supply.\n\n\n\nShortcomings of Current Identity Proofing Solutions &amp; Software\n\n\n\nSo what is an online business to do if they want to verify someone’s identity? Well, they can of course get the data checked manually, either by an in-house team or an outsourced one.\n\n\n\nThey can also use a third-party tool, such as Onfido or Veriff. The problems? These checks slow down the customer journey of legitimate users, and they are expensive. With an external service, for instance, each document check will cost an average of $2.&nbsp;\n\n\n\nAnd in terms of user friction, the costs of ID verification solutions are harder to measure, but no less significant. In the digital age, a seamless user experience is increasingly a competitive advantage. \n\n\n\nSEON helps filter out potential fraudsters pre-KYC by acting as an extension to your pre-existing requirements that's invisible to your customers, with all checks performed in real-time.\n\n\n\nCompanies that add more friction to their users at any stage (onboarding, login or money withdrawal) risk creating churn, and sending users towards their competitors.&nbsp;\n\n\n\nLast but not least, even if you go through a lengthy identity proofing process, chances are that your system can still be fooled by fake documents, synthetic identity frauds (mixing real and made-up customer data), and stolen IDs.\n\n\n\nMore Security with Digital Footprint Analysis\n\n\n\nA person's&nbsp;digital footprint&nbsp;can provide you with the history of a user's existence on social platforms; acting almost like an internet passport that can be used for verification purposes.\n\n\n\nFor many companies, the question is therefore to find a solution that is fast, effective, and affordable. This is precisely where digital footprint analysis, or digital footprint assessment, shines.&nbsp;\n\n\n\nPut simply: a user’s digital footprint contains only traces that can be acquired by your company and via data enrichment. For instance, if you have an email address, you can gather extra data points such as a social media bio, avatar, and understand if the user really is who they say they are.\n\n\n\nDigital Footprinting Examples\n\n\n\nThe beauty of digital footprint analysis is that you can learn a lot, starting with very little. This is particularly useful in industries where you are dealing with a paucity of data, or when you want user friction to remain as minimal as possible.\n\n\n\n\nDevice fingerprinting: the phone, computer or tablet that borrowers use to connect to the lending website contains tons of info. Are they using private mode or an emulator? This could increase suspicion that they are not who they claim to be.\n\n\n\nEmail profiling: does the address exist? Is it from a suspicious, disposable domain? does the email have any data breaches? Or one that doesn’t require any verification during sign up? Is it linked to a social media site? If so, when is the last time the user logged in?\n\n\n\nPhone analysis: are they signing up with a real phone number? From a fixed line or mobile? And did they use that number for messaging services like Viber, Telegram or Whatsapp? \n\n\n\nIP analysis: one of the oldest and easiest forms of security available: looking at the origin of the connection. Is it from the right location? Or likely to be masked via TOR or a VPN?\n\n\n\n\nWhether you answer these questions yourself or let an automated id verification solution calculate a risk score for you, there is clearly a lot of useful data here that should help your identity proofing process.\n\n\n\nDigital Identity Proofing Summary: Balance Friction with Security\n\n\n\nOnline businesses often need to balance security with friction. Too many authentication obstacles, and your users will look elsewhere. Too few, and fraudsters can easily fool your team to exploit your company.\n\n\n\nThe key is therefore to make better educated guesses about your visitors, by creating an invisible layer of protection on your site.\n\n\n\nThis is precisely what data enrichment can help with, allowing you to perform a complete digital footprint analysis. Best of all, you can do it in real-time, and without slowing legitimate customers who can help bring revenue to your business.\n\n\n\nFrequently Asked Questions\n\n\n\nWhat is digital identity proofing? Digital identity proofing is the process of verifying and authenticating the identity of individuals in an online context. This can come into play at both sign-up and withdrawal.   How do I verify my identity? A person can verify their identity through a range of ways including biometrics and government document submissions; which method depends on what is required by the business and the corresponding regulatory body.  How can I verify someone's identity? Requiring some form of physical or digital evidence is the best way to verify a person's identity. A business will need proof of factors like name, date of birth or look to invest in digital identity proofing methods like asking them to take a selfie.   \n\n\n\n\n      Discover Identity Verification Built on Fraud Signals\n      See how SEON combines document checks with real-time device, behavior and digital footprint signals all in one platform to stop synthetic IDs, deepfakes and bonus abuse.\n     \n        Explore SEON Identity Verification\n      \n    \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON:  How to Use KYC Verification for Fraud Detection &amp; Prevention\n\n\n\nSEON:  Top Identity Verification Software\n\n\n\nSEON:  What is Identity Verification and Validation and How to do them Right\n\n\n\n\nSources used for this article:\n\n\n\n\nNIST Special Publication:  Digital Identity Guidelines\n\n\n\nGiact- U.S. Identity Theft: The Stark Reality\n\n\n\nKeepnet Labs:  The Biggest Data Breaches in the first half of 2020\n\n\n\nThe Guardian:  Scammers exploit Covid to steal from stressed bank customers\n\n\n\nBBC: Why fake ID is an American rite of passage"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/identity-proofing-what-is-it/","url":"https://seon.io/resources/identity-proofing-what-is-it/","name":"Identity Proofing: What Is It & How Can It Prevent Fraud | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/identity-proofing-what-is-it/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2020-10-26T08:00:00+00:00","dateModified":"2026-01-16T13:52:54+00:00","description":"Identity proofing is an integral part of authentication for compliance and fraud prevention. But how does it work, and how can you improve yours?","mainEntity":[{"@id":"https://seon.io/resources/identity-proofing-what-is-it/#faq-question-1637317873650"},{"@id":"https://seon.io/resources/identity-proofing-what-is-it/#faq-question-1637317884508"},{"@id":"https://seon.io/resources/identity-proofing-what-is-it/#faq-question-1637317890395"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/identity-proofing-what-is-it/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/identity-proofing-what-is-it/#faq-question-1637317873650","position":1,"url":"https://seon.io/resources/identity-proofing-what-is-it/#faq-question-1637317873650","name":"What is digital identity proofing?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Digital identity proofing is the process of verifying and authenticating the identity of individuals in an online context. This can come into play at both sign-up and withdrawal. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/identity-proofing-what-is-it/#faq-question-1637317884508","position":2,"url":"https://seon.io/resources/identity-proofing-what-is-it/#faq-question-1637317884508","name":"How do I verify my identity?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A person can verify their identity through a range of ways including biometrics and government document submissions; which method depends on what is required by the business and the corresponding regulatory body.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/identity-proofing-what-is-it/#faq-question-1637317890395","position":3,"url":"https://seon.io/resources/identity-proofing-what-is-it/#faq-question-1637317890395","name":"How can I verify someone's identity?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Requiring some form of physical or digital evidence is the best way to verify a person's identity. A business will need proof of factors like name, date of birth or look to invest in digital identity proofing methods like asking them to take a selfie. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/accelerating-the-anti-fraud-system-integration-process/#article","isPartOf":{"@id":"https://seon.io/resources/accelerating-the-anti-fraud-system-integration-process/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Accelerating the Anti Fraud System Integration Process","datePublished":"2020-11-02T05:40:00+00:00","dateModified":"2023-03-23T10:36:22+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/accelerating-the-anti-fraud-system-integration-process/"},"wordCount":1705,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/accelerating-the-anti-fraud-system-integration-process/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/10/Fraud_System_Integration_10_16.png","keywords":["Data Enrichment"],"articleSection":["Article"],"inLanguage":"en-US","description":"Key obstacles for businesses in need of fraud management are the integration time and costs. Let’s demystify the process.\n\n\n\nIn early 2010, an unknown startup with a strange name began making waves in Silicon Valley. Its goal was simple: to allow anyone to accept card payments.&nbsp;\n\n\n\nHere is what an early adopter had to say about it on the Y Combinator forum:\n\n\n\n\n“I've been using it for a few months and honestly it’s the best API I've ever used. The documentation is clear and concise. It's customized to your account so you can literally copy and paste and see the result. Just like it says, it gets out of your way. I was up and running and accepting recurring payments in less than an hour or so. Looking forward to them eating every other payment processor's lunch.”&nbsp;\n\n\n\n\nYou’ve guessed it: the company in question is Stripe. Fast forward a decade, and the company has indeed become one of the most trusted, powerful, and profitable payment processors on the planet.\n\n\n\nThe early adopter’s words sound more true than ever. And as they put it, the company’s success had everything to do with its ability to simplify the integration process. As we’ll see, it’s also something that can be done with fraud detection.\n\n\n\nFraud Prevention: Buy or Build?\n\n\n\nMost newer online businesses experience fraud prevention as part of their default payment system. These one-stop-shops do offer a level of protection, but often fail to really cover specific use cases. They take a one-size-fits-all approach, which cannot be tailored to your own fraud needs.You then find yourself at a crossroad: should you build a layer of protection in-house, or outsource the tech to a third party company? Each provider has its pros and cons.\n\n\n\n\n\n\n\nAnd to add to the list against outsourced solutions: relying on a third party provider is always risky. Even something as highly regulated as payments, where trust is primordial, can backfire if things go wrong, as exemplified by the recent Wirecard failure.\n\n\n\nBut what if we told you that all the cons of outsourced fraud detection had been anticipated by more modern vendors? Let’s break down each point and see if they still stand.\n\n\n\nCalculated Integration Complexity\n\n\n\nIn many cases, integrating a fraud detection solution is still a huge obstacle for online businesses - and for good reasons.\n\n\n\nThis is because when people think of fraud prevention, they tend to gravitate towards legacy solutions, which are convoluted by design. Their business model is to insert themselves into your business operations so that discontinuing the service would eventually become too painful to consider. And their marketing and sales budgets ensure they will convince your business that they’re the only alternative.\n\n\n\nCertain providers also target industries like banking with multi-billion dollar yearly deals. The integrations are measured in years, providing a plethora of professional services, and complicated project timeframes.\n\n\n\nIn fact, the incentive is to drag the integration process out for as long as possible. But what if newer, innovative vendors wanted to disrupt that model?\n\n\n\nChanging the Integration Game\n\n\n\nIn essence, the biggest challenge of integrating fraud systems is in understanding where the system should go. Should it communicate with the frontend, backend or payment system?\n\n\n\nTo answer that question, many modern fraud prevention vendors are now offering innovative plug and play solutions. And the integrations come in many shape and forms, all purpose-built with the goal of simplifying life for developers:\n\n\n\n\nPublic API Documentation: the more confident fraud prevention providers will let anyone peruse their API docs, to offer transparency into the integrations before purchasing their services.\n\n\n\nBrowser extension: for fraud managers who need extra help, for instance in the form of data enrichment, you can now query certain fraud providers directly from the comfort of your web browser\n\n\n\n\nAnd best of all, businesses needn’t be entrapped by the old “rip and replace” mentality, thanks to a new approach to multi-layered protection.\n\n\n\nModular Risk Tools for Multi-Layered Protection\n\n\n\nThe most innovative anti fraud software companies know and understand that risk needs to be reduced with tailored tools.&nbsp;\n\n\n\nThis is why you will find more and more solutions breaking down their features into modules, which you can add or remove as needed, based on your business model:\n\n\n\n\nDevice fingerprinting: ideal for companies who need to understand connections between users. Flag attempts at browser spoofing, proxy connections and emulators, by creating an ID for each software and hardware configuration. You only need to integrate a JavaScript snippet to your web app, or iOS / Android app. \n\n\n\nData enrichment tools: perform social media lookup and get a user’s digital footprint based on a single datapoint. For instance, an email address, phone number or IP address is enough to build a profile by aggregating related data from external open sources.\n\n\n\n\nThe goal is to let fraud managers pick and choose the best tools for their needs. No need to install on a full platform. This reduces integration cost and effort, and combined with a transparent API-call-based-fee, gives your company complete control over the fraud reduction ROI.\n\n\n\nHow Long Should It Take To Integrate Fraud Prevention Software?\n\n\n\nIt depends a lot on the kind of solution you choose. As previously mentioned, integration of a legacy solution with a financial institution’s internal systems can take years, and cost hundreds of thousands.\n\n\n\nAt the other end of the spectrum, using a plugin like SEON’s Chrome Extension only takes minutes.\n\n\n\n\nDownload the SEON extension\n\n\n\nCreate an account with SEON\n\n\n\nEnter an email address, IP address or phone number\n\n\n\nGet data enrichment results in seconds\n\n\n\n\nFor more complex platform integrations, things can be just as seamless. Here is what our integration timeline says about getting started with the platform.&nbsp;\n\n\n\n\nKick off meeting: your team and ours will create a SEON demo account, and identify your use case. Do you need data enrichment or not? Which stage should we monitor to catch the most possible fraud (e.g. signup or withdrawal)?\n\n\n\nProviding historical data: We can begin collecting historical data such as transactions, and use positive or negative labels to sort through fraudulent cases. \n\n\n\nData science analysis: the SEON data science team will analyse the historical data and create a report.\n\n\n\nTechnical integration: this is when we begin looking at the SEON Fraud API. We select the data fields that make sense for your industry, or use payload templates that match your specific needs to save time. You can also implement device fingerprinting, using a simple JS or SDK code.\n\n\n\nFeedback loop: Time to adjust the scoring thresholds to fine-tune false positives and negatives. This stage also helps ensure that the API and manual labels are working properly.\n\n\n\nPassive listening: where the teams work on fine-tuning the right rules to increase fraud detection rates. The rules are suggested by Machine Learning based on historical data, or manually created using custom parameters. \n\n\n\nLive Mode: the anti fraud system is up and running. SEON still provides continuous support if you need help with custom rules or to make the most from the machine learning-suggested rules.&nbsp;\n\n\n\n\nThe entire process can take 1-2 days.&nbsp;\n\n\n\nOf course, it’s important to remember that the longer the system runs, the more precise the results will be. But in terms of integration time and effort, a modern fraud management system won’t stop your operations, neither will it eat into your budget by creating too much business downtime.\n\n\n\n\n How Does the SEON FRAUD API Look for Developers\n\n\n\nAt its core, the SEON fraud prevention platform operates in three simple steps.\n\n\n\nYou send user / transaction / device dataWe enrich the data and deliver a risk score based on rulesYou give feedback on the results\n\n\n\nRegarding step 1: all the user, transaction and device data is sent via the Fraud API. Your first step is to define payloads for the API, populating it with as many relevant data points as possible. All the fields are optional, but the more you fill, the more precise our results will be.\n\n\n\nFor custom business-specific data points, use the\ncustom_fields object.The config object helps you to fine-tune settings such as versions, response and aggregating data enrichment APIs, when required.You must define the authentication points aka. action_type-s (account_register, account_login, purchase etc.) where risk assessment data can be collected or fraud should be prevented.For device fingerprinting, you can use our JavaScript snippet for web apps, and the SDKs for iOS and Android mobile apps. Use session_id as your key for device data collection.\n\n\n\nFor more information, please see our developer page here.\n\n\n\nThe Stripe of Fraud Prevention\n\n\n\nCircling back to our initial story about the success of Stripe, we can now see many parallels between the innovative payment provider and modern fraud prevention vendors.\n\n\n\nAt SEON, for instance, our developer-focused approach has earned us the nickname of “the Stripe of fraud prevention”, due in part thanks to:\n\n\n\n\nOur Public API documentation: Lists 70+ predefined data points, and allows for unlimited custom fields. Select your point of authentication (login, withdrawal, deposit or signup...)\n\n\n\nModular tools: Integrate the modules you need to build your dream risk tech stack.\n\n\n\nWhitebox decision-making: Get the reasons and rules that led to the risk score and state. \n\n\n\nCustomer success team: Free of charge, and ready to help you both with the integration process and further questions.\n\n\n\nFastest to go live: Our integration timeline is one of the fastest available on the market. \n\n\n\nTrue proof of technology: A traditional proof of concept in fraud prevention rarely makes sense, due to the prohibitive initial investment. SEON is the only provider where the integration is so flexible that you can witness results using your data in a testing environment.\n\n\n\nFree trial and transparent pricing: Last but not least, you can see for yourself how SEON works in practice, and calculate your ROI in advance with our clear, transparent pricing model.\n\n\n\n\nStill unsure about integrating an anti fraud system into your business? You can speak to our team today, and see how SEON could benefit your business in days, not months.&nbsp;"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/accelerating-the-anti-fraud-system-integration-process/","url":"https://seon.io/resources/accelerating-the-anti-fraud-system-integration-process/","name":"Anti Fraud System Integration: It Can Be Fast and Affordable","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/accelerating-the-anti-fraud-system-integration-process/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/10/Fraud_System_Integration_10_16.png","datePublished":"2020-11-02T05:40:00+00:00","dateModified":"2023-03-23T10:36:22+00:00","description":"Anti fraud system integration is often worrisome for businesses. Too complex and costly. True for legacy systems, but newer vendors are changing the game.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/accelerating-the-anti-fraud-system-integration-process/#primaryimage","url":"https://seon.io/wp-content/uploads/2020/10/Fraud_System_Integration_10_16.png","contentUrl":"https://seon.io/wp-content/uploads/2020/10/Fraud_System_Integration_10_16.png","width":1400,"height":800,"caption":"Fraud System Integration cover graphics"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#article","isPartOf":{"@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"What Is Enterprise Fraud Management (EFM)? Trends &amp; How It Works","datePublished":"2020-11-27T08:00:00+00:00","dateModified":"2026-04-13T16:47:40+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/"},"wordCount":1731,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how Enterprise Fraud Management detects AI-driven fraud and unifies risk signals in real time."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/","url":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/","name":"Enterprise Fraud Management (EFM): Trends & How It Works","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2020-11-27T08:00:00+00:00","dateModified":"2026-04-13T16:47:40+00:00","description":"Learn how Enterprise Fraud Management (EFM) detects AI-driven fraud, unifies risk signals and enables real-time response across all channels.","mainEntity":[{"@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#faq-question-1632095775448"},{"@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#faq-question-1632095796875"},{"@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#faq-question-1763392467334"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#faq-question-1632095775448","position":1,"url":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#faq-question-1632095775448","name":"Is enterprise fraud software expensive?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"In short, likely yes. Layering your defenses with more modern fraud solutions can help cut costs but cost can vary depending on your requirements, as explained below.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#faq-question-1632095796875","position":2,"url":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#faq-question-1632095796875","name":"How does EFM help with synthetic identity fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"By analyzing digital footprint behavior, device consistency, <a href=\"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/\">network signals</a> and early-stage metadata, EFM can flag synthetic profiles long before traditional KYC or document checks would detect anything suspicious.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#faq-question-1763392467334","position":3,"url":"https://seon.io/resources/the-101-guide-to-enterprise-fraud-management/#faq-question-1763392467334","name":"Why do financial institutions need Enterprise Fraud Management today?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud attacks now move across devices, sessions and channels faster than legacy tools can respond. EFM gives organizations a single system to spot coordinated activity, analyze intent and take action before money or data is lost.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-reduce-customer-acquisition-risk-in-affiliate-marketing/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-reduce-customer-acquisition-risk-in-affiliate-marketing/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"How to Reduce Customer Acquisition Risk In Affiliate Marketing","datePublished":"2020-12-04T08:00:00+00:00","dateModified":"2025-05-24T08:46:54+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-reduce-customer-acquisition-risk-in-affiliate-marketing/"},"wordCount":1370,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-reduce-customer-acquisition-risk-in-affiliate-marketing/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","keywords":["Affiliate Fraud"],"articleSection":["Article"],"inLanguage":"en-US","description":"User acquisition fraud is damaging the marketing campaigns’ success rates. Here’s how to reduce customer acquisition risk today.\n\n\n\nAffiliate marketing, or performance-based marketing, was once seen as the sale technique of snake oil salesmen and pyramid schemers. It’s also the key tool of iGaming marketers, who are not otherwise allowed on ad networks for customer acquisition.\n\n\n\nBut these days, affiliate marketing is increasingly legitimized by media publishers, the influencer culture, and price comparison websites. Even fintechs and challenger banks rely on the model to gain traction quickly.\n\n\n\nIn fact, according to Forrester research, affiliate marketing spend has been growing at a CAGR of 10.1%, reaching $6,8M in 2020. Amazon associates have 900,000+ affiliates. ShareASale has 700,000+. This isn’t a marketing trick any longer, but a mainstream tactic.\n\n\n\nThe problem? Fraudsters are rapidly infiltrating affiliate marketing, which simply means your advertising dollar brings a lot less ROI.&nbsp;\n\n\n\nToday we’ll examine the key challenges of affiliate marketing when it comes to fraud, and we’ll look at steps you can take to reduce customer acquisition risk.\n\n\n\nThe How and Why of Ad Fraud\n\n\n\n\n“Some fraudsters will even sell opt-out lead lists as opt-ins, which means a number of upset people could report your email marketing campaign as spam.”\n\n\n\n\n\n\n\n\nPay-per-lead and cost-per-acquisition models are at risk the most. And research by Juniper found that advertisers’ total loss to fraud will rise to $100 billion by 2023. Here are the key kinds of ad fraud you might be a victim of:\n\n\n\n\nDomain spoofing: fraudsters create fake landing pages designed to replicate legitimate ones. They collect user data through forms, and redirect them towards your site.\n\n\n\nCookie stuffing: a fraudster will somehow add fraudulent cookies to a legitimate website, and earn a commission if the user carries on all the way to the conversion stage.\n\n\n\nInfluencer marketing fraud: unscrupulous influencers will boost their own numbers using bots. Some fraudsters will even create fake influencer profiles, which are in fact run by bots.\n\n\n\nClick farms / click bots: if you reward affiliates on a pay per click model (PPC), some of them will hire the services of click farms to boost their numbers.\n\n\n\nAd impression fraud: similarly, if you pay per thousand impressions (CPM), bad affiliates will stack ads on their site. The webpage only shows one ad to the users, but will fool your system into thinking your ad has been seen too.\n\n\n\nLead Fraud: an increasingly worrying trend in marketing fraud. You, as a buyer, employ the service of a lead provider. There are many details they can misrepresent to you. The lead authenticity, collected data, site origin, etc… They can falsify opt-in leads using farmed data or databases found on the darknet. Some will even sell opt-out lead lists as opt-ins, which means a number of upset people could report your email marketing campaign as spam.\n\n\n\n\nWhy User Acquisition Fraud is Damaging\n\n\n\nThe immediate impact of affiliate fraud is that you waste precious marketing dollars.&nbsp;\n\n\n\nSecondly, you are bringing in users who have no desire of going forward, and lose the conversion. It can play havoc with your analytics and make it harder to optimize later campaigns.&nbsp;\n\n\n\nBut, the long term effects can be more insidious, especially when affiliate fraudsters are smart and only bringing a small percentage of fraudulently-acquired traffic to you.\n\n\n\nDo you have to bite the bullet and just accept your losses? Or take a stand and end the partnership altogether?\n\n\n\nHopefully, with the right fraud prevention tool, you should be able to know exactly which parts of your traffic are valid and which aren’t.\n\n\n\nStep 1: Enable Proper Traffic Monitoring\n\n\n\nA fraud prevention solution should give you robust traffic monitoring. Each customer will be tagged with their referral’s ID, so you should be able to slice and dice the data, either manually or automatically with filters.\n\n\n\nInternal analytics will also keep track of the number of conversions affiliates bring to your business, by exposing the percentage of approved vs declined users at the onboarding stage.\n\n\n\nSorting merchants by conversion success to reduce customer acquisition risk\n\n\n\nStep 2: Deploy a Device Fingerprinting Tool\n\n\n\nWhen users reach your site, you might think the only data you can get is their IP address and referral link. But there’s a lot more data you can extract thanks to enrichment tools.&nbsp;\n\n\n\n\n\n\n\nThis can help you in two ways:&nbsp;\n\n\n&nbsp;\n\n\n\n\n\n\nSpot hidden customer connections: too many hashes point to the same user data, repeatedly? Have they appeared on the site before? You could be dealing with fake user info that’s been found in multiple lists and databases, for example, used here for the purpose of multi accounting.\n\n\n&nbsp;\n\n\n\n\n\n\nDetect bots: the use of emulators or other tools like frauFox, Kameleo, Linken Sphere, MultiLogin or AntiDetect can strongly point to bot usage for scaled affiliate referral.\n\n\n&nbsp;\n\n\nAnd if you’re concerned about creating too much friction for your users, don’t worry. Device fingerprinting and other data enrichment tools such as email profiling, IP address monitoring and phone number lookup all happen in real-time. And these tools will help you answer questions like:\n\n\n&nbsp;\n\n\n\n\n\n\nDoes the user have a suspicious IP?  If the connection is too far from the country where their address is registered, for instance. Or you can also see if it points to certain proxies and VPNs.\n\n\n&nbsp;\n\n\n\n\n\n\nHave they registered with any social media networks? A lack of online social media presence could point to a hastily created profile from stolen or fake documents.\n\n\n&nbsp;\n\n\n\n\n\n\n\n\n\n&nbsp;\n\n\n\n\n\n\nDoes their phone number look legitimate? Discrepancies between the country of origin, network and carrier type could also point to fraudulent users.\n\n\n&nbsp;\n\n\nAnswering all these questions help you create a complete digital profiling process at the customer acquisition stage and it also helps you fight different types of scams such as referral fraud.\n\n\n\nStep 3: Analyze and Score the Behaviour\n\n\n\nBy that stage, you should have collected enough useful information to get a better sense of who users in your traffic are. It’s now time to see how they act.&nbsp;\n\n\n\nWith your fraud prevention solution, this behaviour analysis will come in the form of risk rules. Each rule increases or decreases the risk score, which gives you insights about what users are really doing on your site. For instance:&nbsp;\n\n\n\n\nAre they attempting too many connections per minute?\n\n\n\nHow fast are the form fields completed?\n\n\n\nHow quickly are they proceeding to the checkout stage?\n\n\n\nAnd many more other parameters...\n\n\n\n\nThese rules can be set manually, or a good fraud prevention solution may give you a set of basic rules as part of an industry-specific template. For instance, a set that's ready to tackle bonus abuse in the gambling industry or eCommerce.\n\n\n\nAdvanced solutions will also leverage machine learning to suggest rules based on historical data. The longer you run the system, the more precise the suggestions will become. Just make sure your system is transparent (whitebox) so that the risk team can understand exactly what’s going on behind the scenes.&nbsp;\n\n\n\nListing the machine learning held rules help understand the risk scoring process\n\n\n\nStretch Your Marketing Budget Further With a Fraud Detection Solution\n\n\n\nModern online marketing is all about bringing traffic to your site. But if you pay someone to help, you’d better be sure they aren’t trying to take advantage of your partnership.&nbsp;\n\n\n\nWhether it’s combined as a tool to reduce bonus abuse or to lower onboarding risk, the good news is that fraud detection solutions can act as a filter to vet good and bad affiliates. By measuring the number of legitimate users they bring to your site, you should be able to see exactly which affiliates are worthy of your time.&nbsp;\n\n\n\nAnd best of all: thanks to modern integration techniques, you’ll be able to get started in hours, not months – so you can start boosting your marketing ROI, reduce customer acquisition risk and improve conversion rates today.\n\n\n\nYou might also be interested in reading about\n\n\n\n\nSEON:&nbsp;Best Fraud Prevention Software\n\n\n\nSEON:&nbsp;Reverse Email Lookup: How It Works &amp; How to Perform It\n\n\n\nSEON: Affiliate Fraud Detection Essentials"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-to-reduce-customer-acquisition-risk-in-affiliate-marketing/","url":"https://seon.io/resources/how-to-reduce-customer-acquisition-risk-in-affiliate-marketing/","name":"How to Reduce Customer Acquisition Risk","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-reduce-customer-acquisition-risk-in-affiliate-marketing/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","datePublished":"2020-12-04T08:00:00+00:00","dateModified":"2025-05-24T08:46:54+00:00","description":"Modern marketing relies on affiliates, networks and partnerships for customer acquisition. Don't let user acquisition fraud damage your marketing campaigns.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-reduce-customer-acquisition-risk-in-affiliate-marketing/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#article","isPartOf":{"@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/"},"author":{"name":"Ádám Vass","@id":"https://seon.io/#/schema/person/1dc48ec21a336313ac6a5ef7ede65297"},"headline":"What is Payment Fraud? Detection &amp; Types Explained","datePublished":"2020-12-10T08:00:00+00:00","dateModified":"2026-04-14T13:09:06+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/"},"wordCount":2005,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Discover tools to detect and prevent payment fraud. Protect your business and secure transactions effectively."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/","url":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/","name":"What is Payment Fraud? Detection & Types Explained","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2020-12-10T08:00:00+00:00","dateModified":"2026-04-14T13:09:06+00:00","description":"Learn how payment fraud detection works — from device intelligence and behavioural analytics to real-time monitoring and machine learning.","mainEntity":[{"@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1630593943837"},{"@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1630594010310"},{"@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1776172088596"},{"@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1776172111138"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/1dc48ec21a336313ac6a5ef7ede65297","name":"Ádám Vass","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2026/04/cropped-T0ETE1T7W-U07UD9F015J-92831b67c1b0-512-96x96.jpeg","url":"https://seon.io/wp-content/uploads/2026/04/cropped-T0ETE1T7W-U07UD9F015J-92831b67c1b0-512-96x96.jpeg","contentUrl":"https://seon.io/wp-content/uploads/2026/04/cropped-T0ETE1T7W-U07UD9F015J-92831b67c1b0-512-96x96.jpeg","caption":"Ádám Vass"},"description":"Ádám Vass is a Senior Fraud Consultant at SEON, focused on supporting MRS clients in retail and adjacent services with end-to-end fraud and compliance strategy. He brings 10 years of combined experience spanning fraud analysis, KYC/KYB and AML reporting, with prior roles at institutions including BNP Paribas and Wise, as well as high-risk industry environments. This cross-sector background gives him a rare breadth of perspective across financial crime risk, from customer onboarding to transaction monitoring. At SEON, he applies this expertise to help clients build robust, scalable fraud and compliance frameworks suited to their operational context. His work bridges the gap between fraud prevention, identity verification and regulatory compliance.","sameAs":["http://www.linkedin.com/in/adam-vass-b24337a8"],"knowsAbout":["AML Compliance","Transaction Monitoring","Payment Fraud"],"jobTitle":"Senior Fraud Consultant","url":"https://seon.io/resources/author/adamvass/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1630593943837","position":1,"url":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1630593943837","name":"Why is payment fraud detection important?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Strong detection reduces fraud loss, chargebacks, manual reviews and customer trust erosion across the payment journey. Without detection coverage at registration and login, fraud that occurs earlier in the customer journey reaches the payment stage undetected, making it significantly harder and more expensive to stop.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1630594010310","position":2,"url":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1630594010310","name":"How is payment fraud detection different from payment fraud prevention?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Detection identifies risky activity in real time and surfaces it for a decision. Prevention focuses on stopping fraud from succeeding through controls and workflow design. The two functions are complementary: detection provides the signal, prevention applies the response.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1776172088596","position":3,"url":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1776172088596","name":"What are the most common types of payment fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"CNP fraud, card testing, <a href=\"https://seon.io/resources/dictionary/bin-attack/\" type=\"link\" id=\"https://seon.io/resources/dictionary/bin-attack/\">BIN attacks</a>, APP fraud, account takeover at checkout, gift card fraud and synthetic identity fraud are the most common categories. Each requires different detection signals and response approaches","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1776172111138","position":4,"url":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#faq-question-1776172111138","name":"What signals are used in payment fraud detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Core signals include device, IP and geolocation intelligence, digital footprint analysis across email and phone data, behavioral analytics, velocity rules and card and issuer data. Layered signals reduce blind spots and improve decision accuracy compared with single-point checks.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/#article","isPartOf":{"@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"Affiliate Fraud Detection: What Is It &amp; How Does It Work?","datePublished":"2020-12-17T08:00:00+00:00","dateModified":"2025-11-18T16:51:16+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/"},"wordCount":2316,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Affiliate marketing is an inherently fast-growing industry. Astute Analytica forecasts a dramatic increase in revenue for the global affiliate marketing platform market: Following its value of $19,217.4 million in 2021, it’s predicted to grow at a CAGR of 7.9% and reach $36.9 million by 2030.\n\n\n\nAccording to CHEQ, 2022 alone saw $35.7 billion of ad spend budget lost to fake and fraudulent web traffic. In fact, one in ten of the observed website visitors were found to be inauthentic – and one in fifty had outright malicious intent.\n\n\n\nWhat Is Affiliate Fraud?\n\n\n\nAffiliate fraud refers to any scheme that takes advantage of a company's marketing partnership programs that offer compensation for sending traffic through gateways that lead to sales. This form of fraud can be performed by forcing bad traffic through the website that almost never results in a sale, or else using automated bots to trigger the affiliate payout reward.\n\n\n\nWhy Does Affiliate Fraud Happen?\n\n\n\n\n\n\n\nAffiliate fraud is the product of inflated click-through rates (CTRs) that are used to manipulate exploitable software, such as pay-per-click (PPC) counters. Such software is used by organizations hiring affiliates who end up fraudulently manipulating the terms of their affiliation agreement with one or more technical machinations.\n\n\n\nHere’s a look at five examples of the many ways that fraudulent affiliates can exploit CTR counters for illicit gain:\n\n\n\n\nTraffic laundering: one or more middlemen misguide website visitors with multiple deceptive tactics, such as fake and click-baity articles (with hidden ads embedded within them), social engineering emails, and redirects\n\n\n\nBot attacks: when bots are used to “visit” target websites in an attempt to appear as legitimate human-made CTRs\n\n\n\nIdentity theft: fraudsters pretending to be multiple people by visiting target webpages from real profiles – whose owners are both unwilling and unaware\n\n\n\nAd stacking: multiple ads are stacked beneath one visible, surface advert, so any visitor making misguided and repeated clicks obliviously causes inflated CTRs\n\n\n\nPixel stuffing: multiple, tiny ads are “stuffed” into pixels to trick CTR counters into tracking a highly exaggerated number of ad impressions\n\n\n\n\nTypes of Affiliate Marketing Fraud\n\n\n\nFraudsters have created a range of ways to turn affiliate schemes to their advantage. Let’s look at some of the most common.\n\n\n\n\n\n\n\n\nDuplicate content and shell websites: Malicious affiliates may simply clone the website of a high-performing, legitimate affiliate, then manipulate search engine optimization to divert traffic to their cloned site.\n\n\n\nURL hijacking: The fraudster buys domain names that are similar to a genuine website with an affiliate scheme. They register for the affiliate service then, when a user accidentally visits their URL instead of the genuine site, they trigger an event click for that user. The user either realizes their mistake and types in the correct URL or the scammer sets up an immediate redirect that takes the user to the correct site automatically. Either way, the affiliate fraudster gets paid as a result of triggering the event click.\n\n\n\nClick stuffing: As cost-per-click models are common among affiliate programs, fraudsters may use dedicated bots or click farmers to maximize the number of clicks through a specific link and collect the associated rewards.\n\n\n\nClick spoofing: Fraudsters can set up sites with affiliate links, then fire click-tracking events to those running the affiliate schemes for users who visit the fraudster’s site – even if the users themselves don’t click any affiliate links. Then, if the user goes on to make a purchase via any other route, the fraudster gets the credit even though the user didn’t click any of their links.\n\n\n\nCookie stuffing: This also targets users who may not have clicked any affiliate links. The user visits the fraudster’s website, which uses automation to drop cookies on the user’s browser. Should the user go on to make a purchase from the affiliate scheme owner at a later date, the fraudster will get the credit for it.\n\n\n\nHidden landing pages: Similar to cookie stuffing, hidden landing pages with affiliate links drop cookies on the user’s browser when they open. Again, the fraudster gets the undeserved credit should the user go on to make a purchase. Fraudsters can trigger these hidden landing pages to pop up when a user visits their site.\n\n\n\nFake conversions: Affiliate programs often use cost-per models, such as cost-per-acquisition (CPA) or cost-per-click (CPC) but can be changed to reward affiliates who provide anything, such as leads, impressions, or app installs. These kinds of payout models can be exploited through either click farms or automated bots that can click links, fill out applications, and even make purchases with stolen credentials, all of which may trigger payouts to the fraudulent affiliate.\n\n\n\nMalware: Fraudsters can use malware to target online shoppers. They register for an affiliate scheme, then use malware to inject their affiliate codes into infected shoppers’ transaction processes, triggering payouts to the fraudster. Serving ads with infected code (known as malvertising) is one way that affiliate fraudsters can spread their malware. Those ads – purchased and served on other sites – can also infect the user’s machine with a click-generating virus, making it appear to the affiliate scheme operator that the fraudster has generated more clicks than they have.\n\n\n\n\nA range of other types of affiliate fraud exist, from using stolen credentials to generate fake leads or make purchases to more complex schemes, meaning that any business that runs an affiliate scheme must be permanently on guard.\n\n\n\n\n      Is Your Business Revenue Suffering from Affiliate Fraud?\n      Protect your business with SEON's advanced real time fraud fighting tools to keep your business secure\n \n        Ask an Expert\n      \n    \n\n\n\n3 Ways to Detect Affiliate Fraud\n\n\n\nIf affiliate fraudsters are targeting your business, you want a three-pronged approach to check the quality of your marketing partner. Ideally, your fraud prevention solution should be able to deliver the following tools:\n\n\n\nMonitor the Traffic\n\n\n\nThe first step is to keep track of traffic quality. Make sure your system allows you to log affiliate IDs, and that you get an accurate view of how many of the users they bring. You should also know how many of their visitors go through the conversion stage successfully.&nbsp;\n\n\n\nHow SEON lets you filter out good from bad affiliates (merchants) based on approved or declined transactions.\n\n\n\nIn the screenshot above, we can clearly see that each merchant (or affiliate) brings in users whose transactions are approved, reviewed, or declined. These three results can of course be automated by your fraud prevention system.\n\n\n\nBut the key point is that after logging every conversion for a while, you’ll have enough data to start separating good affiliates from bad ones.&nbsp;\n\n\n\nBut what if you want to block fraudulent traffic before it enters your system? You can look at device fingerprinting.&nbsp;\n\n\n\nEnable Device Fingerprinting\n\n\n\nEach user that lands on your conversion page will arrive with some data. We call it a digital footprint, and it includes the configuration of their software and hardware.&nbsp;\n\n\n\nWith a device fingerprinting module on your site, you can create IDs for these configurations, and see when anything looks suspicious. For instance:\n\n\n\n\nHas this exact configuration already been found on your site? There is a possibility you could be dealing with a fraudster trying to fool your system with multi-accounting.\n\n\n\nDoes the device point to an emulator like FraudFox, Kameleo, Linken Sphere, MultiLogin or AntiDetect? These are tools favoured by fraudsters who use bots to abuse affiliate programs on a mass scale.\n\n\n\n\nCombined with other data enrichment tools, you will be able to build a pretty complete profile of your users – all in real-time.\n\n\n\nNote that device fingerprinting is also a fantastic tool for curbing bonus abuse, for instance in the gambling world, or even to reduce chargeback rates and manual reviews.\n\n\n\nBehavior Analysis\n\n\n\nIn fraud detection, the behavior is tracked via a series of risk rules. Every time the user data is checked against the rule, a risk score increases or decreases.&nbsp;\n\n\n\nThe most obvious example would be a standard IP analysis. Is the user’s IP address pointing to the same location as the cardholder’s address? But you can of course get much more sophisticated with the rules:\n\n\n\n\nHow many connection attempts did they make per hour?\n\n\n\nHow fast did they complete the fields on your signup form?\n\n\n\nWhat was the average time it took them between landing on your conversion page and going to checkout?\n\n\n\n\nWhen it comes to risk rules, the sky's the limit, and this is where having a talented team of fraud managers can make all the difference. Provided, of course, that your fraud management solution allows you to create risk rules manually – or to get suggestions from a machine learning engine.&nbsp;\n\n\n\nHow Affiliate Fraud Impacts Businesses\n\n\n\nAffiliate fraud can significantly impact businesses, leading to a range of detrimental consequences. When an organization inadvertently enters into a fraudulent affiliate agreement, it can experience:\n\n\n\n\ndisrupted web analytics due to bots\n\n\n\nmisused tracking cookies\n\n\n\nand other technical challenges.&nbsp;\n\n\n\n\nThese disruptions distort data, making it difficult for businesses to understand their audience's behavior and preferences. As a result, valuable marketing dollars are wasted on campaigns that yield little to no genuine return on investment, affecting the organization's overall financial health.&nbsp;\n\n\n\nMoreover, measuring and interpreting key performance indicators (KPIs) for ad campaigns becomes challenging, hindering the optimization of marketing strategies. Without reliable data, businesses struggle to make informed decisions, leading to further inefficiencies and potential revenue loss.&nbsp;\n\n\n\nBeyond these immediate issues, the long-term consequences of affiliate fraud can be even more severe.\n\n\n\nHow Affiliate Fraud Damages iGaming Companies\n\n\n\nAffiliate fraud poses an especially severe threat to the iGaming industry. The ramifications are extensive and can deeply affect iGaming operations.\n\n\n\n\nFinancial Losses: One of the most direct impacts of affiliate fraud is financial loss. Fraudsters manipulate affiliate systems using bots, fake accounts, and other methods to generate illegitimate clicks and conversions. This means iGaming companies end up paying for fake traffic that never converts into real customers.&nbsp;\n\n\n\nOperational Strain: Affiliate fraud places a heavy burden on company operations. Detecting and mitigating fraud requires significant effort and resources. Teams must sift through vast amounts of data to identify suspicious activities, detracting from other critical business functions.&nbsp;\n\n\n\nReputation and Compliance Risks: Engaging with fraudulent affiliates can severely damage an iGaming company's reputation. Customers expect a secure and fair gaming environment, and any association with fraud can lead to a loss of trust. Additionally, fraudulent activities can lead to regulatory scrutiny and fines, especially concerning compliance with Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations. Noncompliance with these regulations can result in hefty penalties and further tarnish the company's reputation??.\n\n\n\nPromo Abuse and Additional Fraud: iGaming companies often use promotions and bonuses to attract new players. However, these incentives can also be targeted by fraudsters. Promo abuse involves exploiting signup bonuses and other offers through fake accounts and manipulated referrals. This not only results in financial loss but also undermines the effectiveness of marketing strategies designed to attract genuine players?.\n\n\n\n\nAffiliate fraud inflicts multifaceted damage on iGaming companies, affecting their finances, operations, reputation, and compliance status. Addressing these challenges requires comprehensive fraud prevention strategies, including advanced monitoring systems and stringent affiliate vetting processes?.\n\n\n\nAn Example of Affiliate Marketing Fraud\n\n\n\nThe iGaming industry is susceptible to affiliate fraud because it relies on affiliate marketing more than many other types of businesses. However, many other industries also face the risk of affiliate marketing fraud. An example of this type of fraud in action looks like this:\n\n\n\n\nFraudsters sign up to your referral program.\n\n\n\nThey purchase stolen ID data on the dark web.\n\n\n\nBots automate the signup process on your site, using stolen IDs and multi-accounting.\n\n\n\nSophisticated bots can even replicate human behavior (browsing, transactions, etc).\n\n\n\nFraudsters get a referral fee because everything looks legitimate, while you are left with bad users.\n\n\n\n\nThe use of bots means that fraudsters can carry out affiliate marketing fraud such as the above example rapidly and at scale.\n\n\n\nHow Can SEON Help in Affiliate Fraud Detection\n\n\n\nCutting through the noise is harder than ever for marketers, and things are made more complicated by fraudulent affiliates. The thing is, affiliate marketing is more important than ever for modern online businesses. We live in the age of comparison websites, YouTube influencers, and heightened customer expectations for sourcing engaging content.\n\n\n\nThe good news, however, is that affiliate fraud software solutions are faster, easier, and more affordable than ever.\n\n\n\nUsing a simple combination of decent traffic monitoring, device fingerprinting, and tailored risk rules such as SEON's solution, you should be on your way to flag bad partnerships and focus on the best ones that can really help grow your business.\n\n\n\n\n      Detect Affiliate Fraud with SEON\n      SEON's anti-fraud tools are designed to detect suspicious usage and uncover hidden fraudsters\n \n        Ask an Expert\n      \n    \n\n\n\nFAQs\n\n\n\nHow much does affiliate fraud cost a business? According to Juniper, advertisers’ total loss to fraud will rise to $100 billion by 2023.  How can I detect an affiliate scam? To detect fraudulent affiliates, you must log the quality of the traffic they bring to your website. It's important to keep track of your conversion rates, but also of the typical user behavior. Monitoring data points relating to user behavior allows you to flag suspicious traffic that comes with affiliate fraud.  \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON: How to Prevent iGaming Fraud: Its Types, Consequences &amp; Methods\n\n\n\nSEON: How to Reduce Customer Acquisition Risk In Affiliate Marketing\n\n\n\nSEON: Fraud and Bot Attacks- What to Know to Stop Them\n\n\n\nSEON: Referral Fraud: Stop Fraudsters from Wasting Your Marketing Dollars\n\n\n\n\nSources:\n\n\n\n\nAWin: MoneySupermarket Insurance\n\n\n\nTripAdvisor: What is the Tripadvisor Affiliate Program?\n\n\n\nInfluencer Marketing Hub: How to Spot Fake Instagram Followers\n\n\n\nAstute Analytica: Affiliate Marketing Platform Market - Industry Dynamics, Market Size, And Opportunity Forecast To 2031\n\n\n\nCHEQ: Examining the State of Fake Traffic in 2023"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/","url":"https://seon.io/resources/affiliate-fraud-detection-essentials/","name":"Affiliate Fraud: How to Detect & Prevent | 3 Ways to Stop It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2020-12-17T08:00:00+00:00","dateModified":"2025-11-18T16:51:16+00:00","description":"Marketing online is hard enough without fraudulent affiliates. Here's how you can flag bad partnerships using simple affiliate fraud detection tools.","mainEntity":[{"@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/#faq-question-1632148207878"},{"@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/#faq-question-1632148248433"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/#faq-question-1632148207878","position":1,"url":"https://seon.io/resources/affiliate-fraud-detection-essentials/#faq-question-1632148207878","name":"How much does affiliate fraud cost a business?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"According to Juniper, advertisers’ total loss to fraud will rise to $100 billion by 2023.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/affiliate-fraud-detection-essentials/#faq-question-1632148248433","position":2,"url":"https://seon.io/resources/affiliate-fraud-detection-essentials/#faq-question-1632148248433","name":"How can I detect an affiliate scam?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To detect fraudulent affiliates, you must log the quality of the traffic they bring to your website. It's important to keep track of your conversion rates, but also of the typical user behavior. Monitoring data points relating to user behavior allows you to flag suspicious traffic that comes with affiliate fraud.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/would-you-flag-santa-as-a-fraudster/#article","isPartOf":{"@id":"https://seon.io/resources/would-you-flag-santa-as-a-fraudster/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Would You Flag Santa as a Fraudster?","datePublished":"2020-12-24T08:00:00+00:00","dateModified":"2025-08-12T15:15:23+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/would-you-flag-santa-as-a-fraudster/"},"wordCount":255,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/would-you-flag-santa-as-a-fraudster/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/12/Santa_Claus_12_16_cover.png","articleSection":["Article"],"inLanguage":"en-US","description":"The holidays are a busy season for some - notably, Mr Santa Claus."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/would-you-flag-santa-as-a-fraudster/","url":"https://seon.io/resources/would-you-flag-santa-as-a-fraudster/","name":"Would Your Risk Management Flag Santa as a Fraudster?","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/would-you-flag-santa-as-a-fraudster/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2020/12/Santa_Claus_12_16_cover.png","datePublished":"2020-12-24T08:00:00+00:00","dateModified":"2025-08-12T15:15:23+00:00","description":"It is the season when we wonder whether or not a fraud prevention system could ruin Christmas if Santa would decide to use some eCommerce services.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/would-you-flag-santa-as-a-fraudster/#primaryimage","url":"https://seon.io/wp-content/uploads/2020/12/Santa_Claus_12_16_cover.png","contentUrl":"https://seon.io/wp-content/uploads/2020/12/Santa_Claus_12_16_cover.png","width":1400,"height":800,"caption":"would you flag Santa as a fraudster article over graphics"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/the-art-of-risk-operations-riskops/#article","isPartOf":{"@id":"https://seon.io/resources/the-art-of-risk-operations-riskops/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Guide to Risk Operations (RiskOps)","datePublished":"2021-01-22T07:00:00+00:00","dateModified":"2025-11-18T16:50:40+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/the-art-of-risk-operations-riskops/"},"wordCount":2011,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/the-art-of-risk-operations-riskops/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/01/The_Art_of_Risk_Operations_01_21_cover.png","articleSection":["Article"],"inLanguage":"en-US","description":"The what, why and how of Risk Operations in the context of fraud."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/the-art-of-risk-operations-riskops/","url":"https://seon.io/resources/the-art-of-risk-operations-riskops/","name":"The Complete Guide to RiskOps (Risk Operations) - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/the-art-of-risk-operations-riskops/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/01/The_Art_of_Risk_Operations_01_21_cover.png","datePublished":"2021-01-22T07:00:00+00:00","dateModified":"2025-11-18T16:50:40+00:00","description":"RiskOps, or Risk Operations is a field that can be confusing and overwhelming for beginners. We break down the key concepts and misconceptions here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/the-art-of-risk-operations-riskops/#primaryimage","url":"https://seon.io/wp-content/uploads/2021/01/The_Art_of_Risk_Operations_01_21_cover.png","contentUrl":"https://seon.io/wp-content/uploads/2021/01/The_Art_of_Risk_Operations_01_21_cover.png","width":1400,"height":800,"caption":"The Art of Risk Operations cover graphics"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Effective Risk Management: KPIs Vs KRIs (Key Risk Indicators)","datePublished":"2021-01-26T08:00:00+00:00","dateModified":"2025-12-16T12:36:49+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/"},"wordCount":1966,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Key Risk Indicators are powerful metrics but are harder to understand than KPIs. Is it better to use KPIs or KRIs to measure your risk team’s success?\n\n\n\nThe short answer is that you need both. However, because there still seems to be confusion between the two types of metrics and their usage, we wanted to break them down so you understand these concepts better. Let’s start by looking at Key Risk Indicators and how they can help your risk operations.\n\n\n\nWhat Are Key Risk Indicators (KRIs)?\n\n\n\nA Key Risk Indicator (KRI) indicates how damaging an activity might be. It’s a key feature of RiskOps analysis and risk monitoring, which aim to predict how likely an action will hurt the company financially or through a bad reputation.\n\n\n\nThis is especially useful for upcoming projects, such as taking on more transactions, attending a public event, or launching a new product.\n\n\n\nKRIs Vs KPIs - What Are the Differences?\n\n\n\nThe key difference between a risk management KPI and a KRI is that key performance indicators are designed to measure how well (or badly) things are going using historical data. On the other hand, Key Risk Indicators point to future adverse impacts.\n\n\n\nIn other words, KRIs can measure risk that has yet to occur, which is useful for unveiling new growth opportunities or assessing which processes need to be optimized.\n\n\n\nAn example of KPI\n\n\n\nA good way to know if you're dealing with a KPI is to ask if it measure how well your risk team doing. A KPI example would be to log and monitor the chargeback dispute success rate per agent.\n\n\n\nAn example of KRI\n\n\n\nIf the data you use measure helps anticipate a risk factor, then it's a KRI.  An example would be to estimate how many more cybersecurity attacks you would risk by launching a new product. \n\n\n\n\n      \nAssess Risk Accurately with Fraud Scoring\n      Explore what fraud scores consist of, how they can be the most accurate indicator of risk and how you can leverage them to boost business efficiency.\n \n        More About Fraud Scores\n      \n    \n\n\n\nHow to Develop Key Risk Indicators\n\n\n\nAs mentioned above, KRIs help us see where risk could potentially exist. Using them can help with a multitude of scenarios when working with unknowns:\n\n\n\nKey Characteristics of a KRI\n\n\n\nA KRI should help you answer questions in the following scenarios:\n\n\n\n\nAnticipating new risk factors,\n\n\n\nJustifying additional headcount,\n\n\n\nIdentifying risk that doesn’t yet damage the company,\n\n\n\nSetting up defences before new risk vectors arise,\n\n\n\nOrganising team roles in anticipation of new risks,\n\n\n\n\nSelecting and Tracking a KRI\n\n\n\nAs you can imagine, there are two things you need to deploy them: a strategy and access to the right data. The strategy part has to do with the selection of the right KRI, but also understanding if you will be able to measure it.\n\n\n\nAccess to the right data comes from your tools. Is your data accurate? Can you quantify doubts with numbers? And which monitoring, tracking and reporting tools do you use?\n\n\n\nUsing KRIs to Calculate KPIs (and Vice Versa)\n\n\n\nAn interesting point is that you can actually use these large-scale metrics to focus on more granular KPIs. Following our key characteristics of KRI, you could use the cost of an attack against your business to:\n\n\n\n\nMonitor the team’s performance per shift,\n\n\n\nLook at individual agent’s performance,\n\n\n\nMeasure the cost of blocking certain user actions,\n\n\n\nMeasure the time lost to working on a specific task\n\n\n\n\nInteresting (and very useful questions you could answer include):\n\n\n\n\nHow much cost did you save by focusing on a specific task?\n\n\n\nHow expensive was it to miss actions that damaged your bottom line?\n\n\n\nHow much do you save when an agent meets a goal?\n\n\n\n\nAnd crucially, you could estimate the value of hidden or invisible risk.  \n\n\n\nHow to Share Your KRIs?\n\n\n\nOnce you have found a satisfactory way to calculate the metrics, you must decide how transparent you will be with them. Sharing these metrics with upper management can be beneficial, especially if there is a significant increase in risk. However, if the metrics touch upon personal performance, such as cost saved per agent, consider masking identities to avoid making employees uneasy and disincentivizing the worst performers.\n\n\n\nSharing enough data with the team can foster self-regulation and mutual support without management intervention. Additionally, Key Risk Indicators (KRIs) can justify promotions, bonuses, or internal training. They are also valuable for deciding on investments in software or infrastructure by providing concrete ROI measurements, such as hours saved and improvements in employee performance.\n\n\n\nKRIs &amp; KPIs: Taking a Holistic Approach to Fraud\n\n\n\nNow we've established the difference between KPIs and KRIs, let's see how this applies to fraud prevention.\n\n\n\nIn the context of risk management, KRIs help managers with their balancing act. On the one hand, they want to block as many fraudulent transactions as possible. On the other, they want to accept as many transactions as possible. If you were to block all transactions, the fraud rates would drop down to 0%.\n\n\n\nSo a standard KPI for measuring fraud rates would look like:\n\n\n\nFraud = chargebacks + refunds / total accepted transactions in a given time period.\n\n\n\nBut these results also need to weigh in your acceptance rate (ratio of approved vs declined transactions).\n\n\n\nMoreover, factoring false positives into the equation can be tricky, because you may lose more than the value of a transaction. A false positive could turn a loyal customer towards competitors, which means your customer lifetime value (CLV) and customer acquisition costs (CAC) are also wasted.\n\n\n\nSo we’re now already looking at a much more complex equation:\n\n\n\nCost of fraud = transaction value + chargeback fees vs. false decline = transaction value + CLV + CAC\n\n\n\nAs you can see, the cost of fraud can be a very strong KRI because it gives us a better view of how fraud affects various business areas.&nbsp;\n\n\n\nMore importantly, you can use that number to spot when something goes wrong. If, say, a payment service goes down, you should immediately see a change in the numbers.\n\n\n\n6 Examples of Useful Fraud KPIs\n\n\n\nFor this example, we’ll look at KPIs that are relevant for online stores and e-commerce, but many of them can be adapted to any kind of transaction, be it a SaaS or a B2B business.\n\n\n\n\nOriginal Approval Rates: Before looking at how to reduce fraud, you need to check what percentage of your transactions are approved. There are various schools of thought on how to best calculate that number, but it’s important to take into account things such as whether auto declines come from the issuer bank, payment gateway or your own fraud prevention system.&nbsp;\n\n\n\nChargeback Rates: Chargeback disputes &amp; chargeback fraud are the bane of any fraud manager’s existence. Should the rates trend above the dreaded 1% rate, an online store might even be labelled high risk, and lose a partnership with the card network. The challenge is that chargeback rates tend to be calculated differently depending on the credit card processor. It’s important to take these differences into account when calculating your own rates, and you can even break them down further by looking at individual payment methods (for instance PayPal vs WePay).\n\n\n\nAverage Manual Review Time Per Agent: A self-explanatory metric, but one that can be extremely useful to justify a promotion, assign various workloads, or to initiate a performance review.&nbsp;\n\n\n\nCheckout Abandonment Rates: A useful KPI to share with marketing, as they may use the numbers to test out automatic email campaigns. For fraud and payment, it’s useful to look at how much friction your payment gateways and prevention tools add to the customer journey.   For instance, if the checkout abandonment rates boom after implementing extra prevention checks, you could look at dynamic friction solutions (when extra KYC checks are only initiated after risk scores go above a set threshold).\n\n\n\nCost Per Analysis: One of the best ways to calculate ROI on your fraud detection platform, and to understand the full cost of fraud at your company. You should include all the expenses related to manual and automatic review, lost customer lifetime values from declined orders, and how much is saved when a fraud attempt is caught by the system.  This is especially useful when you work with a pay-per-API call fraud prevention engine. As we’ve previously covered, a chargeback-guarantee model may offer better value on paper, but also a strong incentive to be conservative when taking risks, resulting in a higher rate of false positives (which would impact your overall revenue in the long run).\n\n\n\nFraud to Sales Ratio: A simple metric that is useful both as a KPI and risk indicator. If the number rises too steeply, you know you’ll need to consider other fraud prevention solutions or strategies.\n\n\n\n\nHow SEON Can Help\n\n\n\nSEON provides a robust, customizable, and fully explainable fraud scoring system that enhances risk assessment for each transaction through a combination of human intelligence and machine learning. Here's how SEON helps with risk assessment and provides a risk score based on the following components:\n\n\n\n\nDefault rules: SEON’s platform includes best-practice default rules created by in-house fraud analysts. These rules can be easily toggled on or off, and are grouped into convenient categories.&nbsp;\n\n\n\nCustom rules: Users can create custom rules tailored to their specific needs, controlling the risk scoring down to the decimal point. Custom rules can automatically approve, reject, or send transactions based on predefined criteria for manual review.\n\n\n\nMachine learning rules: SEON’s algorithms generate explainable rule suggestions based on past activity. These suggestions come with confidence scores, allowing users to understand and modify them before implementation. Users can also automate the application of machine learning rules that meet a certain confidence threshold for a more hands-off approach.\n\n\n\nIndustry presets: SEON offers industry-specific rulesets based on observed fraud trends and patterns, catering to sectors like fintech, iGaming, BNPL, online lending, and travel.These presets provide targeted fraud prevention tailored to each industry's unique challenges.\n\n\n\nBlackbox fraud scoring: SEON also includes a blackbox machine learning module that independently calculates the likelihood of fraud for each transaction. This score operates alongside the whitebox scores and can identify new fraud patterns that predefined rules and the human eye may not catch.\n\n\n\n\nBy offering a comprehensive and flexible fraud scoring system, SEON enhances risk assessment capabilities, providing more accurate, real-time evaluations and helping to safeguard against fraud effectively.\n\n\n\n\n      Block Risky Transactions with Fraud Scores\n      SEON's customizable fraud score threshold automatically declines or alerts you to risky transactions to protect your business from online fraud\n \n        Ask an Expert\n      \n    \n\n\n\nKPIs Vs KRIs FAQ\n\n\n\nWhat are KRI examples? Key risk indicators are a form of measurement used by a business / organization to manage and analyse potential exposure to risk whether financial, reputational, or compliance-related. Some examples could be the turnover in staff, the number of processing errors or the number of viruses, phishing attempts, and other cyber attacks the company has faced.  Why are KRIs so important? KRIs allow companies to better identify and predict any potential exposure to risk, before anything serious takes place. Companies that understand where they need to strengthen can be more proactive in protecting their business.  \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON: Fraud Detection &amp; Prevention: What is it and How to Find the Right Features\n\n\n\nSEON: Using an IP Fraud Score to Detect High-Risk Users\n\n\n\nSEON: Fraud Risk Management: How to Implement It &amp; Advanced Technologies\n\n\n\n\nLearn more about:\n\n\n\nBrowser Fingerprinting&nbsp;|&nbsp;Device Fingerprinting&nbsp;|&nbsp;Device Intelligence&nbsp;|&nbsp;Fraud Detection with Machine Learning &amp; AI\n\n\n\nExternal Sources:\n\n\n\n\nEcommerce Nation:  How to Calculate Cart Abandonment Rate\n\n\n\nNeil Patel:  How to Calculate Lifetime Value"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/","url":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/","name":"What are KRIs & KPIs? Developing Key Indicators | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","datePublished":"2021-01-26T08:00:00+00:00","dateModified":"2025-12-16T12:36:49+00:00","description":"Learn about selecting and developing KRIs and how they differ from KPIs. Guide with examples and actionable take-aways.","mainEntity":[{"@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/#faq-question-1637579980545"},{"@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/#faq-question-1637580006215"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/#faq-question-1637579980545","position":1,"url":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/#faq-question-1637579980545","name":"What are KRI examples?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Key risk indicators are a form of measurement used by a business / organization to manage and analyse potential exposure to risk whether financial, reputational, or compliance-related. <br />Some examples could be the turnover in staff, the number of processing errors or the number of viruses, phishing attempts, and other cyber attacks the company has faced.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/#faq-question-1637580006215","position":2,"url":"https://seon.io/resources/effective-risk-management-kpis-vs-kris-fraud-detection-and-prevention/#faq-question-1637580006215","name":"Why are KRIs so important?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"KRIs allow companies to better identify and predict any potential exposure to risk, before anything serious takes place. Companies that understand where they need to strengthen can be more proactive in protecting their business.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-detection-and-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-detection-and-prevention/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"What Is Fraud Detection? Why It Matters &amp; Examples","datePublished":"2021-02-04T07:00:00+00:00","dateModified":"2025-12-09T11:32:19+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-detection-and-prevention/"},"wordCount":1892,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Explore AI-driven fraud detection, key fraud types, and strategies to choose the right system for real-time protection."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/fraud-detection-and-prevention/","url":"https://seon.io/resources/fraud-detection-and-prevention/","name":"What Is Fraud Detection? Why It Matters & Examples","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","datePublished":"2021-02-04T07:00:00+00:00","dateModified":"2025-12-09T11:32:19+00:00","description":"Discover fraud detection and prevention strategies, common fraud types, and how to build a system to protect revenue, stay compliant, and block attacks.","mainEntity":[{"@id":"https://seon.io/resources/fraud-detection-and-prevention/#faq-question-1632301722642"},{"@id":"https://seon.io/resources/fraud-detection-and-prevention/#faq-question-1693991853523"},{"@id":"https://seon.io/resources/fraud-detection-and-prevention/#faq-question-1757319804657"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-detection-and-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-and-prevention/#faq-question-1632301722642","position":1,"url":"https://seon.io/resources/fraud-detection-and-prevention/#faq-question-1632301722642","name":"What can fraud solutions help my business with?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud solutions can help you reduce chargeback rates, account takeover attempts (account hacking), and registration with fake IDs, amongst others. It can also help with compliance for KYC and AML checks.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-and-prevention/#faq-question-1693991853523","position":2,"url":"https://seon.io/resources/fraud-detection-and-prevention/#faq-question-1693991853523","name":"What data is needed for fraud detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"For fraud detection to be effective, you need as much data as possible. That includes user data (device, IP address), payment data (card BIN, shipping address), and even behavior data (login attempts, password resets, etc.). ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-and-prevention/#faq-question-1757319804657","position":3,"url":"https://seon.io/resources/fraud-detection-and-prevention/#faq-question-1757319804657","name":"How to implement a fraud detection system","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Implementing a fraud detection system starts with deploying tools that combine rules, machine learning, and real-time monitoring to catch suspicious activity early. To stay effective, run regular audits to fine-tune models, update thresholds, and analyze user behavior. Continuously monitor regulatory changes—such as AML, CDD, PCI DSS, and GDPR—to remain compliant, and scale your system as your business grows to address new fraud risks.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/kyc-verification-process/#article","isPartOf":{"@id":"https://seon.io/resources/kyc-verification-process/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"KYC Verification Explained: Process, Requirements, and Best Practices","datePublished":"2021-02-18T06:30:00+00:00","dateModified":"2026-04-10T10:28:43+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/kyc-verification-process/"},"wordCount":1752,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/kyc-verification-process/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn what KYC verification is, how it works, and why it matters, plus costs, compliance, and fraud prevention best practices.","keywords":["KYC"]}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/kyc-verification-process/","url":"https://seon.io/resources/kyc-verification-process/","name":"KYC Verification: What It Is, How It Works, and Why It Matters","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-verification-process/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2021-02-18T06:30:00+00:00","dateModified":"2026-04-10T10:28:43+00:00","description":"Learn what KYC verification is, how it works, and why it matters. Explore costs, compliance requirements, and fraud prevention best practices.","mainEntity":[{"@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1636451782307"},{"@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1643816925231"},{"@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1696844421808"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/kyc-verification-process/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1636451782307","position":1,"url":"https://seon.io/resources/kyc-verification-process/#faq-question-1636451782307","name":"How do businesses reduce KYC costs?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Companies reduce KYC costs by screening users before full verification, automating ID checks, and using digital data sources to assess risk early. This helps filter out fraudulent applicants and lowers manual review workloads without compromising compliance.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1643816925231","position":2,"url":"https://seon.io/resources/kyc-verification-process/#faq-question-1643816925231","name":"What tools combine KYC verification with AML screening in one platform?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Modern compliance platforms increasingly merge KYC and AML functions. They verify identities, screen for sanctions and politically exposed persons (PEPs), and <a href=\"https://seon.io/use-cases/transaction-monitoring-services/\">monitor transactions in real time</a> — helping compliance teams detect suspicious behavior and maintain audit-ready records efficiently.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1696844421808","position":3,"url":"https://seon.io/resources/kyc-verification-process/#faq-question-1696844421808","name":"What are the best KYC verification solutions for fintech startups?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fintech startups benefit most from KYC tools that combine fast onboarding with regulatory compliance. The best options automate document checks, biometric verification, and data enrichment, helping reduce manual reviews and onboarding friction while staying aligned with AML and CDD requirements.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/the-next-generation-fraud-fighter-community/#article","isPartOf":{"@id":"https://seon.io/resources/the-next-generation-fraud-fighter-community/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"The Next Generation Fraud Fighter Community","datePublished":"2021-02-26T07:02:30+00:00","dateModified":"2023-09-14T09:00:10+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/the-next-generation-fraud-fighter-community/"},"wordCount":883,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/the-next-generation-fraud-fighter-community/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/02/Next_gen_fraud_fighters_02_25.png","inLanguage":"en-US","description":"Wonder Why Fraudsters Are Still&nbsp;Ahead in the Arms Race?\n\n\n\nWhen we onboard new colleagues at SEON, who come from outside of the industry, one of the first things they are surprised about is just how much and how lively internet cybercriminal communities are. If you were an aspiring fraudster, you would need to spend a few hours googling stuff, and you'd learn everything you need to know with various services available to you.\n\n\n\nWe're not talking about the spooky corners of the dark web: by 2021, a lot of this is out in the clear.\n\n\n\nCarding Subreddit\n\n\n\nMeanwhile, if you run an online business, the first time you'll hear about fraud is when the chargebacks start kicking in. You would need to spend weeks researching the right fraud detection features, spend quite a lot of resources on integration, and even then it would take you months to establish best practices to protect your bottom line.\n\n\n\nThis situation is less than ideal: while we are under a digital transformation, it seems that the fraudsters are running laps around us.\n\n\n\nCarder Group on Telegram\n\n\n\nKnowledge Sharing Shouldn’t Be Just For Fraudsters\n\n\n\nAt SEON, that’s what we try to overcome: as a young company we were facing a similar problem, and throughout the years we have been striving to create material to cover this knowledge gap.&nbsp;\n\n\n\nOur articles, podcasts and webinars or guides, not to mention case studies with useful practices are a veritable knowledge hub for any company trying to understand the nature of cybercrime and how to tackle it.\n\n\n\nBut we can still do better.\n\n\n\nWhen it comes to information and knowledge sharing about anti-fraud, there is a limited number of professional networks. These are either focused on a specific area such as ACFE, or are born out of industry-specific needs.\n\n\n\nMembers of these organisations understand the benefits: adapting to changing regulations for example is such an area where every player gains if they follow the same set of best practices. Being alert to emerging fraud threats protects not only their businesses but their customers as well, as they can create \"network-wide\" blocks on schemes that otherwise wouldn't be caught with simple blacklisting.\n\n\n\nYet despite the fact that most online companies are targets of fraud, they are not part of such knowledge sharing organisations, while the cybercriminals are openly discussing how to best scam them.\n\n\n\nFacing New Challenges Requires a New Attitude\n\n\n\nThe fraudsters are at an advantage because they were nimble enough to adapt to new communication platforms and technologies, while companies are still lagging behind. There are many reasons for this:\n\n\n\n\nA conservative attitude: companies don't see the immediate benefit in partaking in such knowledge sharing, many preferring to keep their best practices secret, thinking of it as a competitive advantage\n\n\n\nNo established protocols on what is and what isn't okay to share: with data protection and non-disclosure agreements acting as barriers\n\n\n\nReckless attitude towards risk-taking: when capital is abundant and the company is growing rapidly, there is often little incentive to look under the hood\n\n\n\nBeing blindsided after building out their in house risk stack: companies think that their fraud is completely unique to them, whereas criminals don't think this way, they only look at opportunities to exploit\n\n\n\n\nBoth of these put the company's interest first and foremost.&nbsp;\n\n\n\nBut the reason we have fraud management is to protect consumers and customers from fraud - in which our businesses are just convenient avenues for cybercriminals.\n\n\n\n\nSecondly, at the heart of risk operations are the fraud managers - the people working the day to day operations, coming up with clever processes and procedures to block innovative fraud attempts. Within companies, they already teach each other, but at the present moment, they have no professional community for sharing knowledge and best practices, a place where they could build a common understanding of their craft.\n\n\n\nChange is in Our Collective Long Term Interest\n\n\n\nHaving a professional peer network available is immensely beneficial for an individual, but it pays dividends to the company as well.\n\n\n\nKnowledge and skill-sharing save time on training and allow best practices and innovative solutions to spread more quickly across industries.\n\n\n\nThis translates to better consumer protection and increases user trust, as the players involved in supporting such a network show that they are eager and proactive about preventing fraud.\n\n\n\nFurthermore: the rule of thieves is that they won't share their most lucrative schemes, as competition would spoil the available bounty. This means that information about the real heists are stuck in information silos at various companies, and once caught, criminals can just move on to the next target - hurting not just bottom lines, but innocent customers as well in the process.\n\n\n\nThe time is right to build out the next generation fraud fighter platform, to turn the tables on fraudsters, or at least to level the playing field in terms of information sharing.\n\n\n\nWe are probably not alone in thinking along these lines - so if such a platform is something you would be interested in, please share and discuss this idea.&nbsp;\n\n\n\nAnd sign up to our newsletter down below - we’ll keep you posted about further developments."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/the-next-generation-fraud-fighter-community/","url":"https://seon.io/resources/the-next-generation-fraud-fighter-community/","name":"The Time is Right to Build The Next Generation Anti-Fraud Community","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/the-next-generation-fraud-fighter-community/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/02/Next_gen_fraud_fighters_02_25.png","datePublished":"2021-02-26T07:02:30+00:00","dateModified":"2023-09-14T09:00:10+00:00","description":"Cybercriminals are ahead of the security industry because they embraced community knowledge sharing. Learn why fraud fighters should do the same.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/the-next-generation-fraud-fighter-community/#primaryimage","url":"https://seon.io/wp-content/uploads/2021/02/Next_gen_fraud_fighters_02_25.png","contentUrl":"https://seon.io/wp-content/uploads/2021/02/Next_gen_fraud_fighters_02_25.png","width":1400,"height":800,"caption":"The Next Generation Fraud Fighter Community article graphics"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/news/connect-seon-to-3000-apps-with-a-zapier-integration/#article","isPartOf":{"@id":"https://seon.io/resources/connect-seon-to-3000-apps-with-a-zapier-integration/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Connect SEON to 3000+ Apps With a Zapier Integration","datePublished":"2021-03-02T08:00:31+00:00","dateModified":"2025-11-18T16:47:51+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/connect-seon-to-3000-apps-with-a-zapier-integration/"},"wordCount":721,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/news/connect-seon-to-3000-apps-with-a-zapier-integration/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","inLanguage":"en-US","description":"You can now trigger instant actions between the most popular web apps and SEON via a Zapier integration.\n\n\n\nOne of the goals of SEON was always to be a one-stop-shop for all your fraud prevention needs.\n\n\n\nRealistically, of course, you cannot run software in a vacuum, especially in today’s interconnected world of business apps.\n\n\n\nThis is why we’re excited to announce that SEON is now part of the Zapier family.&nbsp;\n\n\n\nYou’ll be able to connect your fraud prevention with 3000+ of the most popular apps in the world, such as Slack, Google Sheets or Gmail, all via a no-code Zapier integration.\n\n\n\nProductivity Boost\n\n\n\nWhile some of our clients already integrate SEON seamlessly into their business workflow, we wanted to make sure you have full control over your productivity.&nbsp;\n\n\n\nA SEON and Zapier integration will help automate repetitive tasks with zero coding knowledge, and without the need for developers to build an integration.&nbsp;\n\n\n\nYou will be able to save time using our pre-built Zaps, which is the name Zapier gives to its integrations. You will also be able to write your own Zaps directly from the SEON app on Zapier.\n\n\n\nThe Basics of SEON and Zapier\n\n\n\nThe first thing to note is that you’ll need a SEON license key to get started.\n\n\n\nNow, in Zapier, each Zap consists of a trigger and one or more actions. When you turn your Zap on, the action will run automatically every single time, without the need for you to do anything.\n\n\n\nWhen you first set up a Zap using SEON, you will be able to test it using sample data. You can also change the interval at which Zapier checks for new triggers (note that this varies depending on your pricing plan).\n\n\n\n\n\n\n\nWhat Apps Work With Zapier?\n\n\n\nThere are currently more than 3,000 apps you can integrate into your automation with Zapier. The most famous ones include Gmail, Slack, Trello, and Twitter.&nbsp;\n\n\n\nThe apps are listed in 13 different business categories, including whole families of apps from Amazon, Facebook, Google, Microsoft, WordPress, Zoho and Zapier’s own.\n\n\n\nOther categories include Business Intelligence (to connect with analytics, dashboard and review apps (such as G2 crowd); Marketing (such as ActiveCampaign, GetResponse or HubSpot); and Sales and CRM (apps such as Typeform, Calendly, and Salesforce).\n\n\n\nExample of Zaps Using SEON\n\n\n\nLet’s start with a concrete example that can apply to numerous use cases: a trigger based on a score.\n\n\n\nFirst Example:\n\n\n\nThe first step will be to define the risk score interval that’s worth focusing on for you. We’ll set it above 9 / 10, based on the new user signups.\n\n\n\nThis would imply that the user is very high risk, but you still want to double-check it manually. In this case, you’ll get a Slack notification immediately.\n\n\n\n\n\n\n&nbsp;\n\n\nSecond Example:\n\n\n\nReviewing a transaction based on the label.\n\n\n\nNow let’s say you have a custom label in SEON for transactions that were declined due to AML risk. You want to keep that data for review and further investigation so you want the Zapier integration to send it to a Trello card.\n\n\n\n\n\n\n&nbsp;\n\n\nThird Example:\n\n\n\nSomeone marked themselves for self-exclusion on your gambling site. You want that user data to be saved in a Google Sheet.\n\n\n\n\n\n\n\nHow to Get Started with SEON and Zapier\n\n\n\nYou’ll need both a license key from your SEON account and a Zapier monthly subscription. There is a free plan that includes 100 tasks per month, and you can upgrade to higher plans for more tasks, access to premium apps, and multi-step zaps.&nbsp;&nbsp;\n\n\n\nZapier lets you enrol in a free 14-day trial of the Professional plan to test the premium features. Similarly, SEON gives you a free 30-day trial to test the anti-fraud features with your own business data in a sandbox environment.\n\n\n\nCustom Integrations - The Sky’s the Limit\n\n\n\nAt the time of writing, SEON and Zapier provide a handful of triggers that should be flexible enough to build powerful automation.\n\n\n\nBut of course, we will keep releasing new triggers, actions and examples – based on your feedback and industry-specific needs.\n\n\n\nThanks to Zapier, there is no limit to the kind of productivity hacks and shortcuts you can create – to fight fraud with complete control and flexibility."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/connect-seon-to-3000-apps-with-a-zapier-integration/","url":"https://seon.io/resources/news/connect-seon-to-3000-apps-with-a-zapier-integration/","name":"SEON is Now Available for Zapier Integrations","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/news/connect-seon-to-3000-apps-with-a-zapier-integration/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","datePublished":"2021-03-02T08:00:31+00:00","dateModified":"2025-11-18T16:47:51+00:00","description":"SEON now offers Zapier integrations to connect your anti-fraud with 3,000+ productivity apps and automate your workflows.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/news/connect-seon-to-3000-apps-with-a-zapier-integration/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/email-data-breach-to-verify-users/#article","isPartOf":{"@id":"https://seon.io/resources/email-data-breach-to-verify-users/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Email Data Breach: How to Use Email Breach Monitoring for ID Verification","datePublished":"2021-03-10T07:00:58+00:00","dateModified":"2026-03-26T15:31:25+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/email-data-breach-to-verify-users/"},"wordCount":2068,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/email-data-breach-to-verify-users/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","inLanguage":"en-US","description":"Every year sets a new record for the number of exposed records in email data breaches. In 2022, 15M records were lost due to leaks and breaches. Of course, this sounds like bad news for everyone involved –&nbsp;both companies and users whose records will be made public. But we can also use that information judiciously to protect them. Let’s see how it works in practice.\n\n\n\nWhat is an Email Data Breach?\n\n\n\nAn email data breach is an event where private email addresses are made public. It is also known as an email data leak, because the addresses and associated data are likely to be leaked on online forums, the darknet, or other public spaces. \n\n\n\nEmail data breaches can be the result of cybercrime, phishing, internal sabotage, or fraud attacks. Criminals usually target email addresses and their associated login details, such as passwords, to infiltrate existing user accounts. This is why email data breaches are often synonymous with account takeover fraud, where fraudsters access someone else's account in order to withdraw money, mine it for information, or use it as a phishing tool to target other victims.\n\n\n\nThe type of companies more likely to be targeted for email data breaches includes social media companies, neobanks, financial institutions, BNPLs, e-wallets, online stores, and iGaming accounts – among others. However, in recent years, email addresses have been leaked from any kind of company, including travel operators, car companies, healthcare, nonprofits, education, etc. \n\n\n\nWhy Does an Email Data Breach Happen?\n\n\n\nThe reason email data breaches happen in the first place is that criminals can resell the information on the dark web. That’s the first thing that will happen.&nbsp;You’ll come across huge data dumps, as they’re called, which are sold in bulk on shady internet forums.&nbsp;\n\n\n\nHow accounts from data leaks appear on the dark web\n\n\n\nThese account login details are used for account takeover (ATO attacks), or credential stuffing, where fraudsters attempt a combination of the email and password on numerous services.&nbsp;\n\n\n\nAs a side note, this is why using slightly customized passwords for different services can backfire. If your Gmail password is passw0rd4Gmail, it’s easy enough to infer what it will be for LinkedIn.\n\n\n\nIf fraudsters do succeed in getting in, they will mine the accounts for personal details or, ideally, currency (crypto fiat and even bonus points).\n\n\n\nNow, if we switch over to the side of the company that lost the data, it will probably have to inform its users. This is especially true for European companies since the GDPR forces companies to publicly acknowledge when they’ve lost customer records.\n\n\n\nOnce the user is made aware of the leak, they tend to change their passwords – but not their email address. This is where email intelligence for fraud prevention becomes critical, helping teams identify breached emails, assess risk, and stop account takeover attempts before they happen.\n\n\n\nHow to Prevent an Email Data Breach\n\n\n\nPreventing email data breaches takes effort from your security team, IT team, and every employee and executive. Training and education go a long way, and here are steps you can implement today:\n\n\n\n\nEducate employees about email security: That includes teaching everyone about how to securely open attachments, verify senders' information, and scan for malware and viruses.\n\n\n\nPromote anti-phishing practices: Another example where prevention is better than the cure. If you can teach everyone how to detect phishing attempts and social engineering, you're essentially blocking access to any potentially valuable data.\n\n\n\nSecure logins for everyone: A lot of data breaches happen after criminals log into your business using other people's accounts. You can secure the login stage to prevent what is known as an account takeover attack. \n\n\n\nBoost your IT security: Last but not least, you should ensure you are ready to handle potential DDoS attacks, MitM attacks, Cross-Site Scripting attacks and other techniques that could leave your site at the mercy of cybercriminals. \n\n\n\n\nAs an online user, if your email address has been leaked in a data breach, you may want to consider the following steps:\n\n\n\n\nFind out what other info was compromised: you may need to check manually if your password or PII (personal identifying information), such as a social security number, was also leaked.\n\n\n\nChange your passwords: if your email address was leaked, chances are that an account password was leaked with it too. Whether you reused your passwords or not, it's worth considering a quick update.\n\n\n\nMonitor your account for unusual activity: you may need to log into the account whose details were leaked. If the password has been changed, contact the company immediately. \n\n\n\nBe vigilant with your financial information: the worst-case scenario would be if your financial details were leaked. You may want to keep an eye on your credit card receipts, credit score reports, and even consider freezing your cards if needed. \n\n\n\n\nLast but not least, remember that the company that lost your data is responsible for the leak. You may be contacted about a class-action lawsuit or compensated for your loss.\n\n\n\nHow to Monitor Email Data Breaches for ID Verification?\n\n\n\nThere are three key ways to monitor email data breaches for ID verification:\n\n\n\n\nManual checks: you can find the leaked databases online, and search them for a specific email address. This is handy if you want to search the latest leaked database only, for instance, one that has been made public in the news.\n\n\n\nAggregate website: some websites let you manually check for specific data in all known leaked, or “pwned”, databases. By far the most popular of them all is haveibeenpwned.com, which, at the time of writing, has a database of 12M leaked accounts.\n\n\n\nAutomatic software solution: third-party software can query all the known leaked databases automatically for you. This is done via API request, and the advantage is that you get the results without having to do any manual work (besides the initial software integration).\n\n\n\n\nNote that some software solutions will return extra information such as an educated guess about the email address creation date. Reverse email lookup tools can also find social media accounts, give risk scores, and detect suspicious email addresses from free domain providers or disposable email services.\n\n\n\n\n\n\n\n\n\n\n\nHow Does Monitoring Email Data Breaches Help ID Verification?\n\n\n\nWhile email data breaches sound like bad news, they can be turned into a force for good. That is, in the context of fraud prevention and especially ID verification, where you can check if data has appeared in a breach before. Here are the key points to understand:\n\n\n\n\nAn email address that appears on a data breach check is likely from a legitimate user. It means the address is mature, and you may even be able to infer its age.\n\n\n\nAn email address that doesn’t appear on a data breach check should be considered riskier. It may be freshly created, or even a throwaway.\n\n\n\n\nIn other words, if you learn how to verify if an email was in a data breach, you have a tremendous advantage when it comes to creating a full user profile for ID verification.\n\n\n\nWhy Is It Important?\n\n\n\nID verification can create a lot of friction for users who want to sign up for your service. For instance, a full selfie ID video or uploading ID documents can be a frustrating experience. It’s also expensive, as you will need to deploy the appropriate resources (often a third-party solution).\n\n\n\nHowever, checking emails is a fast, frictionless solution that can give you a great pointer about whether the user should be trusted or not. It’s lightweight, affordable, and the solution of choice for companies that want to flag fraudsters as soon as possible (for instance as part of a pre-KYC check).\n\n\n\nHow to Verify Users with Email Data Breach Checks\n\n\n\nThe good news is that data breaches can be turned into a force for good. That is, in the context of fraud prevention, where you can check if data has appeared in a breach before. Here is how it works:\n\n\n\nEmail Checks at the Signup Stage\n\n\n\nWhen users sign up for your service, chances are they must provide an email address. We’ve previously covered the merits of an email analysis tool in another post, but in the context of data breaches, here’s the key takeaway:\n\n\n\n\nAn email address that appears on a data breach check is likely from a legitimate user. It means the address is mature, and you may even be able to infer its age.\n\n\n\nAn email address that doesn’t appear on a data breach check should be considered riskier. It may be freshly created, or even a throwaway.\n\n\n\n\nThis is a tremendous advantage in modern credit scoring, where you need to calculate how risky a user is based on as little data as possible.\n\n\n\nYou can read more about how to reduce fraud with reverse email lookup here.\n\n\n\nEmail Checks at the Login Stage\n\n\n\nThings get even more interesting at the login stage. One way to ensure only legitimate users get into their accounts would be to keep an eye out for the latest data breach news, and manually check if their login details have been leaked.\n\n\n\nBut there’s a smarter way to automate checks: using a combination of email analysis and device fingerprinting.\n\n\n\nPut simply, here are examples of rules you could set up:\n\n\n\n\nIf the email has recently appeared on a data breach check and the user seems to connect from a new device, you should increase the risk. This is highly likely pointing to an account takeover.\n\n\n\nIf the email has recently appeared on a data breach check and the user is connecting from a trusted device, you could suggest a password change. It’s never a bad idea to educate users about the value of their accounts to prevent later damages.\n\n\n\n\nYou could even go into more sophisticated setups using velocity rules, for instance. If a user email appears on a data breach, logs into their account, and makes a password reset request within a short timeframe: does it mean they are legitimate users worried about their accounts? Or an opportunistic fraudster?&nbsp;\n\n\n\nOnly a previously installed device fingerprinting solution will help complete the full picture to reduce customer insult rate and improve security.\n\n\n\n\nReduce Fraud Rates by 70–99%\nPartner with SEON to reduce fraud rates in your business with real-time data enrichment, whitebox machine learning, and advanced APIs.\n \n        Ask an Expert\n\n\n\n\n\nKey Takeaways\n\n\n\nIn conclusion, you can see how checking for a data breach can be a boon for fraud managers. It may seem counterintuitive, but sometimes, the work of cybercriminals can actually be employed against them.\n\n\n\nOf course, this is just one weapon in your email profiling arsenal. You’ll also need to complete the picture using every tool at your disposal, such as IP analysis, device fingerprinting, and, ideally, custom rules specific to your industry.\n\n\n\nSEON Email Lookup Tool\n\n\n\n \n\n\n\nFAQ\n\n\n\nCan I check if my email has been breached? Yes. You can go to a website or a fraud prevention tool and type in your email address. The system will check all the latest data breaches to let you know if your information has been compromised.  Is Google sending emails about compromised passwords? Yes. You may receive an email alerting you that your information has been found in a data breach.  What does it mean when your password has appeared in an email data leak? It means you are vulnerable to an account takeover attack, where someone logs into your account illegally. The best thing to do is to regularly change your passwords – especially if your data has been leaked online.  Is a phishing email a data breach? No. But a phishing email could lead to a data breach. Fraudsters use phishing emails to gather information about people, including company employees and those with access to business data. If they can impersonate them through social engineering, it is very likely that it will result in a data breach.   \n\n\n\nSources:\n\n\n\n• Statista: Number of data records exposed worldwide from 1st quarter 2020 to 3rd quarter 2022\n\n\n\nFurther Reading\n\n\n\n\nLearn about Digital Footprint Fraud &amp; Our API's Role\n\n\n\nLearn About Email Profiling and What They Can Reveal About Your Users\n\n\n\nHow to Find Social Media Accounts with E-mail\n\n\n\nHow Email Risk Assessment Can Help Your Business Grow Safely"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/email-data-breach-to-verify-users/","url":"https://seon.io/resources/email-data-breach-to-verify-users/","name":"Email Data Breach: Find Email Breaches & Verify Users | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/email-data-breach-to-verify-users/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","datePublished":"2021-03-10T07:00:58+00:00","dateModified":"2026-03-26T15:31:25+00:00","description":"Improving user verification will help your business reduce lots of problems. See here how email data breaches allow you identify bad users.","mainEntity":[{"@id":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1644244157658"},{"@id":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1644244661425"},{"@id":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1644244694352"},{"@id":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1651046344254"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/email-data-breach-to-verify-users/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1644244157658","position":1,"url":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1644244157658","name":"Can I check if my email has been breached?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. You can go to a website or a fraud prevention tool and type in your email address. The system will check all the latest data breaches to let you know if your information has been compromised.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1644244661425","position":2,"url":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1644244661425","name":"Is Google sending emails about compromised passwords?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. You may receive an email alerting you that your information has been found in a data breach.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1644244694352","position":3,"url":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1644244694352","name":"What does it mean when your password has appeared in an email data leak?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It means you are vulnerable to an account takeover attack, where someone logs into your account illegally. The best thing to do is to regularly change your passwords – especially if your data has been leaked online.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1651046344254","position":4,"url":"https://seon.io/resources/email-data-breach-to-verify-users/#faq-question-1651046344254","name":"Is a phishing email a data breach?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No. But a phishing email could lead to a data breach. Fraudsters use phishing emails to gather information about people, including company employees and those with access to business data. If they can impersonate them through social engineering, it is very likely that it will result in a data breach. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/customer-due-diligence/#article","isPartOf":{"@id":"https://seon.io/resources/customer-due-diligence/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"Customer Due Diligence (CDD): Comprehensive Guide for 2025","datePublished":"2021-03-17T07:00:00+00:00","dateModified":"2025-09-23T14:26:40+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/customer-due-diligence/"},"wordCount":1510,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/customer-due-diligence/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","inLanguage":"en-US","description":"Understand customer due diligence (CDD), its role in AML/KYC compliance, and how to detect risk and prevent fraud in 2025."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/customer-due-diligence/","url":"https://seon.io/resources/customer-due-diligence/","name":"Customer Due Diligence: What It is and How It Works","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/customer-due-diligence/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","datePublished":"2021-03-17T07:00:00+00:00","dateModified":"2025-09-23T14:26:40+00:00","description":"Learn what customer due diligence (CDD) means, why it matters for AML/KYC compliance, and how to verify identities, assess risk, and monitor customers.","mainEntity":[{"@id":"https://seon.io/resources/customer-due-diligence/#faq-question-1643815674846"},{"@id":"https://seon.io/resources/customer-due-diligence/#faq-question-1643815702565"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/customer-due-diligence/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-due-diligence/#faq-question-1643815674846","position":1,"url":"https://seon.io/resources/customer-due-diligence/#faq-question-1643815674846","name":"What is a due diligence checklist?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A due diligence checklist is a series of steps your organization must complete to ensure it remains legally compliant. The checklist steps may vary from one industry to the next, but they always include some form of identity and financial information verification.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-due-diligence/#faq-question-1643815702565","position":2,"url":"https://seon.io/resources/customer-due-diligence/#faq-question-1643815702565","name":"What are the four customer due diligence requirements?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Customer due diligence requirements vary from one industry to another, however, you will commonly find that a business must establish a user’s: 1) identity, 2) financial information, 3) residential address, 4) money-laundering risk.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/what-is-automated-identity-verification/#article","isPartOf":{"@id":"https://seon.io/resources/what-is-automated-identity-verification/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"What Is Automated Identity Verification &amp; How It Works","datePublished":"2021-03-25T08:27:08+00:00","dateModified":"2026-01-27T16:33:48+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/what-is-automated-identity-verification/"},"wordCount":1438,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/what-is-automated-identity-verification/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"See how automated identity verification uses AI to stop fraud, speed onboarding, and meet KYC/AML compliance."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/what-is-automated-identity-verification/","url":"https://seon.io/resources/what-is-automated-identity-verification/","name":"What Is Automated Identity Verification & Why It Matters","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/what-is-automated-identity-verification/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","datePublished":"2021-03-25T08:27:08+00:00","dateModified":"2026-01-27T16:33:48+00:00","description":"See how automated identity verification uses AI to stop fraud, speed onboarding, and meet KYC/AML compliance.","mainEntity":[{"@id":"https://seon.io/resources/what-is-automated-identity-verification/#faq-question-1644328858950"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/what-is-automated-identity-verification/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/what-is-automated-identity-verification/#faq-question-1644328858950","position":1,"url":"https://seon.io/resources/what-is-automated-identity-verification/#faq-question-1644328858950","name":"What is an identity verification service?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An <a href=\"https://seon.io/products/identity-verification/\">identity verification service</a> takes your user data and tries to match it with databases to confirm someone's identity. The original data can be a name and address or an ID document. Some ID proofing services look at an email address or phone number and enrich that data via digital footprint analysis. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#article","isPartOf":{"@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"Synthetic Identity Fraud: What Is It &amp; How to Detect it","datePublished":"2021-04-01T09:43:05+00:00","dateModified":"2025-12-08T10:30:02+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/"},"wordCount":1584,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","keywords":["Identity Verification"],"articleSection":["Article"],"inLanguage":"en-US","description":"Learn how to detect and prevent synthetic identity fraud with tools like digital footprinting, device intelligence, and machine learning."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/","url":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/","name":"Synthetic Identity Fraud: What Is It & How to Detect It","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2021-04-01T09:43:05+00:00","dateModified":"2025-12-08T10:30:02+00:00","description":"Explore effective strategies for synthetic identity fraud detection and learn how to protect your business from sophisticated fraud schemes.","mainEntity":[{"@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1631270113517"},{"@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1631270045068"},{"@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1690365323869"},{"@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1734715345129"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1631270113517","position":1,"url":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1631270113517","name":"What are the warning signs of synthetic identity fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If you notice strange payments on your statement or start receiving suspicious emails, it's possible some of your ID documents have been stolen and used for synthetic IDs. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1631270045068","position":2,"url":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1631270045068","name":"Why do fraudsters use synthetic IDs?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Synthetic IDs are harder to detect than made-up, completely fake IDs because they contain an element of truth (the person's ID documents). This is why fraudsters use them to bypass KYC checks or for fraudulent transactions, among others.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1690365323869","position":3,"url":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1690365323869","name":"What kind of stolen data is used in synthetic ID fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraudsters rely on any identifiable information they can find, including tax-related information, medical records, social security numbers, and even children’s identity records. <br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1734715345129","position":4,"url":"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/#faq-question-1734715345129","name":"How do you prevent synthetic identity fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Preventing synthetic identity fraud involves using unique, complex passwords with tools like password managers, staying cautious during online interactions to avoid social engineering, and leveraging cybersecurity measures such as antivirus software and two-factor authentication. Regularly monitor credit reports to catch suspicious activity early, and be careful when sharing personally identifiable information (PII) like Social Security numbers or ID copies. Additionally, consider freezing children's credit reports to prevent fraudsters from exploiting their identities.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"iGaming Affordability Checks: Source of Funds, CLV and Real-Time Monitoring","datePublished":"2021-04-15T09:36:48+00:00","dateModified":"2026-04-13T08:29:30+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/"},"wordCount":1258,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Consumer affordability means two very different things in iGaming. Confuse them — or fail to act on either — and you're exposed to regulatory fines, bonus abuse and players you should never have onboarded.\n\n\n\nHere's how to get both right.\n\n\n\nThe Regulatory Pressure Isn't Easing\n\n\n\nThe UK Gambling Commission has made its position clear. Record fines. Escalating scrutiny. Explicit expectations around affordability monitoring as a condition of operation — not an optional add-on.\n\n\n\nAnd the direction of travel is the same across regulated markets. Operators that treat affordability as a compliance checkbox are the ones ending up in enforcement notices.\n\n\n\nThe challenge is that affordability checks are genuinely hard to do well. They're expensive, they create friction and players actively resist them. Worse still, the official mechanisms have real limitations — especially in markets where financial data is sparse or outdated.\n\n\n\nThat's why the most effective operators aren't just running affordability checks. They're building a monitoring infrastructure around them.\n\n\n\nWhat Is a Consumer Affordability Check?\n\n\n\nFrom a player's perspective, an affordability check is a request to verify:\n\n\n\n\nProof of income\n\n\n\nSavings\n\n\n\nInheritance\n\n\n\nWinnings and one-off payments\n\n\n\n\nThis is commonly referred to as a source of funds (SOF) check.\n\n\n\nFrom an operator's perspective, it typically means purchasing a check from a third-party provider — Experian, Equifax or equivalent — which uses an Open Banking licence to access current account data with the player's consent.\n\n\n\nThat returns:\n\n\n\n\nIncome verification\n\n\n\nIncome estimation\n\n\n\nDebt information\n\n\n\nDisposable income estimation\n\n\n\n\nThe same infrastructure used for mortgage and loan approvals. Thorough in theory. Costly in practice.\n\n\n\nThe Problem With Relying on Official Checks Alone\n\n\n\nAffordability checks aren't cheap. When the Gambling Commission recommends triggering them at loss thresholds as low as £100, the unit economics start to look unsustainable fast.\n\n\n\nBut cost isn't the only problem.\n\n\n\nOpen Banking APIs regularly return low-quality or outdated data — particularly in emerging markets where financial records are incomplete. And players who want to keep playing will find ways around the barriers you put in front of them.\n\n\n\nThe largest responsible gambling fines issued in recent years weren't handed down because operators skipped affordability checks. They were issued because operators ran the checks and then stopped paying attention.\n\n\n\nChecks give you a snapshot. What you actually need is continuous visibility.\n\n\n\nReal-Time Affordability Monitoring: The Safety Net Official Checks Miss\n\n\n\nReal-time monitoring doesn't replace affordability checks — it catches what they can't.\n\n\n\nWith a fraud detection platform that supports custom rules and real-time alerting, operators can:\n\n\n\n\nCalculate spend rate continuously across the player session\n\n\n\nFlag unusually large or rapidly escalating bets before they become a liability\n\n\n\nTrigger automated interventions — soft blocks, step-up checks, account reviews — proportionate to the risk signal\n\n\n\n\nThis is the infrastructure that closes the gap between what a SOF check tells you at onboarding and what a player is actually doing six weeks later.\n\n\n\n\"Platforms that integrate fraud, AML and responsible gambling and that lean on predictive analytics and tailored interventions, reduce enforcement risk while building more durable player relationships.\" — Husnain Bajwa, SVP of Product, Risk Solutions\n\n\n\nFor a deeper look at how real-time behavioural monitoring sits within a broader responsible gambling framework, see Responsible Gambling and Player Protection in the Age of Data.\n\n\n\nIdentifying Low-CLV Players at Registration\n\n\n\nBy the time a player has made their first deposit, you already have enough data to make a meaningful CLV assessment — if you know what to look for.\n\n\n\nAt registration, the signals that point to low-CLV or fraudulent intent include:\n\n\n\n\nSignup reward vs. initial deposit ratio — a high bonus-to-deposit gap is a classic early indicator\n\n\n\nBehavioural similarity to known bonus abusers — pattern matching against historical cases\n\n\n\nDevice and hardware stack reuse — the same software environment appearing across multiple accounts points to multi-accounting\n\n\n\nAccount network connections — players linked to known fraud rings through shared identifiers\n\n\n\nBonus trigger speed — how quickly a new signup moves to claim an incentive\n\n\n\n\nSEON's risk engine surfaces all of these signals at the point of registration, combining them into a fraud score built on 900+ data points across email, phone, device and network.\n\n\n\nThe rule set comes preconfigured for iGaming operators. Custom rules can be added with full flexibility — and a machine learning engine can surface new rule suggestions based on your own historical data, so your detection logic improves as your player base grows.\n\n\n\nThe Signals That Define Your Highest-Risk Registrations\n\n\n\nBeyond behavioural indicators, the following technical signals are weighted in SEON's CLV and fraud scoring at onboarding:\n\n\n\n\nDoes IP analysis indicate a VPN, proxy or Tor node?\n\n\n\nWas the email address created recently?\n\n\n\nDoes the user have verifiable linked social media profiles?\n\n\n\nDoes browser fingerprinting indicate an emulated or spoofed environment?\n\n\n\nIs the phone number associated with an eSIM?\n\n\n\n\nEach of these alone is a weak signal. In combination, they form a reliable picture of whether you're looking at a genuine new player or a bad actor — or someone who looks legitimate today but represents minimal long-term value.\n\n\n\nFiltering these players at registration is significantly cheaper than managing them after they've claimed a bonus, triggered a chargeback or prompted a compliance review.\n\n\n\nAffordability Monitoring as a Growth Lever\n\n\n\nThe operators winning in regulated iGaming markets have stopped treating fraud prevention and player protection as separate cost centers.\n\n\n\nThey're the same infrastructure problem with the same solution: continuous, real-time visibility into player behaviour, from registration through to withdrawal.\n\n\n\nWhen that infrastructure is in place:\n\n\n\n\nCompliance teams get automated monitoring that catches affordability breaches before they become enforcement actions\n\n\n\nFraud teams get registration-stage signals that filter out low-CLV and abusive players before acquisition spend is wasted\n\n\n\nMarketing teams get protected campaigns — bonus structures that reach genuine players, not organised fraud rings\n\n\n\n\nSEON gives operators a single platform to manage all of it, with explainable AI, unlimited custom rules and integrations across the full player journey.\n\n\n\nFAQ\n\n\n\nWhat is a source of funds check in iGaming? A source of funds (SOF) check confirms a player's money comes from a legitimate source — income, savings, inheritance or winnings. Operators typically run these via a third-party provider using an Open Banking licence, returning income verification, debt information and disposable income estimation. Thorough in theory. Expensive and friction-heavy in practice.  What triggers an affordability check with the UK Gambling Commission? The UK Gambling Commission recommends triggering checks at loss thresholds as low as £100. But the expectation goes further — regulators want continuous visibility into player spending, not a one-off check at onboarding. Operators treating affordability as a single trigger point rather than an ongoing obligation are the ones accumulating enforcement actions.  What are the UK Gambling Commission's affordability requirements in 2026? Operators must demonstrate a clear understanding of what each player can afford, run SOF checks at defined thresholds, maintain real-time spend monitoring and show proportionate intervention when financial stress signals appear. Affordability is no longer a peripheral compliance concern — it is a core licensing condition.  What is the difference between an affordability check and real-time affordability monitoring? A check gives you a snapshot at onboarding. Monitoring gives you continuous visibility into how a player behaves on your platform over time. The two work together but serve different purposes. The largest responsible gambling fines weren't issued because operators skipped checks — they were issued because operators ran them and then stopped paying attention.  \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON: Guide to Preventing iGaming Fraud\n\n\n\nSEON: Affiliate Fraud: How to Stop It\n\n\n\nSEON: Preventing Online Gambling Fraud"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/","url":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/","name":"Real-Time Consumer Affordability Solutions for iGaming Platforms","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","datePublished":"2021-04-15T09:36:48+00:00","dateModified":"2026-04-13T08:29:30+00:00","description":"Consumer affordability solutions should help you avoid iGaming fines, improve compliance, and grow your business safely. Here are the tools you need.","mainEntity":[{"@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068815895"},{"@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068858778"},{"@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068869110"},{"@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068879396"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068815895","position":1,"url":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068815895","name":"What is a source of funds check in iGaming?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A source of funds (SOF) check confirms a player's money comes from a legitimate source — income, savings, inheritance or winnings. Operators typically run these via a third-party provider using an Open Banking licence, returning income verification, debt information and disposable income estimation. Thorough in theory. Expensive and friction-heavy in practice.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068858778","position":2,"url":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068858778","name":"What triggers an affordability check with the UK Gambling Commission?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The UK Gambling Commission recommends triggering checks at loss thresholds as low as £100. But the expectation goes further — regulators want continuous visibility into player spending, not a one-off check at onboarding. Operators treating affordability as a single trigger point rather than an ongoing obligation are the ones accumulating enforcement actions.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068869110","position":3,"url":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068869110","name":"What are the UK Gambling Commission's affordability requirements in 2026?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Operators must demonstrate a clear understanding of what each player can afford, run SOF checks at defined thresholds, maintain real-time spend monitoring and show proportionate intervention when financial stress signals appear. Affordability is no longer a peripheral compliance concern — it is a core licensing condition.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068879396","position":4,"url":"https://seon.io/resources/real-time-consumer-affordability-solutions-for-igaming/#faq-question-1776068879396","name":"What is the difference between an affordability check and real-time affordability monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A check gives you a snapshot at onboarding. Monitoring gives you continuous visibility into how a player behaves on your platform over time. The two work together but serve different purposes. The largest responsible gambling fines weren't issued because operators skipped checks — they were issued because operators ran them and then stopped paying attention.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/open-banking-risk-and-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/open-banking-risk-and-fraud/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"The Risks of Open Banking Fraud and How to Prevent Them","datePublished":"2021-04-21T12:18:07+00:00","dateModified":"2025-12-30T11:36:06+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/open-banking-risk-and-fraud/"},"wordCount":1754,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/open-banking-risk-and-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Key risks, common tactics, and prevention strategies for open banking fraud in fintech and digital banking."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/open-banking-risk-and-fraud/","url":"https://seon.io/resources/open-banking-risk-and-fraud/","name":"The Risks of Open Banking Fraud and How to Prevent Them","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/open-banking-risk-and-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","datePublished":"2021-04-21T12:18:07+00:00","dateModified":"2025-12-30T11:36:06+00:00","description":"Understand open banking fraud risks and how real-time registration monitoring helps prevent and stop fraud before accounts connect.","mainEntity":[{"@id":"https://seon.io/resources/open-banking-risk-and-fraud/#faq-question-1644327257181"},{"@id":"https://seon.io/resources/open-banking-risk-and-fraud/#faq-question-1644327303304"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/open-banking-risk-and-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/open-banking-risk-and-fraud/#faq-question-1644327257181","position":1,"url":"https://seon.io/resources/open-banking-risk-and-fraud/#faq-question-1644327257181","name":"What are the risks of open banking?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Open banking adds more points of failure where customer data can be stolen. The more data is shared between third-party companies and financial institutions, the more risk there is that the data could fall into the wrong hands.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/open-banking-risk-and-fraud/#faq-question-1644327303304","position":2,"url":"https://seon.io/resources/open-banking-risk-and-fraud/#faq-question-1644327303304","name":"Is open banking disruptive?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. Historically, financial institutions guarded their customers' information closely. But thanks to open banking, these large companies are forced to share information with smaller, more agile third-party companies providing financial services and products.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/google-floc-privacy-changes-and-device-fingerprinting/#article","isPartOf":{"@id":"https://seon.io/resources/google-floc-privacy-changes-and-device-fingerprinting/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Privacy Changes and Google FLoC &#8211; Will it Affect Device Fingerprinting?","datePublished":"2021-04-28T14:36:58+00:00","dateModified":"2025-04-03T09:34:40+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/google-floc-privacy-changes-and-device-fingerprinting/"},"wordCount":1123,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/google-floc-privacy-changes-and-device-fingerprinting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","inLanguage":"en-US","description":"Google announced it wants to stop tracking users - individually. That’s true, but the reality is more complicated...\n\n\n\nThe average internet user isn’t necessarily aware of it, but there’s a war raging on. It’s to do with tracking.\n\n\n\nIn one camp, you have advertisers, cybersecurity firms, and fraud prevention companies, whose entire business model relies on aggregating data.&nbsp;\n\n\n\nIn the other camp, you have the consumers and regulators, who have no interest in personalised ads, worry about their privacy, and generally distrust cookies.&nbsp;\n\n\n\nAnd the battleground? It takes place in your browser.\n\n\n\nNowhere is this more apparent than with the new privacy changes announced by Google and their new FloC model, described in this blog post by the tech giant’s User Trust and Privacy Manager.\n\n\n\nLet’s take a closer look at how it works, and how it might impact device fingerprinting for fraud prevention. But first, let’s go over the technical aspects of third-party cookie-tracking.\n\n\n\nHow Third-Party Cookie Tracking Works\n\n\n\n\nWebsites deploy cookies through code snippets, to collect information about visitors. Third-party cookies are used by advertisers or ad servers to track that information across multiple sites, in order to gather information about their profiles and behaviour. Basically, these trackers build their own version of your browsing history that they can later use to show you targeted advertisements.\n\n\n\nWhile it is one of the most effective tools in an online marketer’s arsenal, it’s also one of the most controversial. Which is why many privacy-oriented web browsers have disabled them by default. Safari started blocking them around 2017. Mozilla Firefox followed suit in 2019.&nbsp;\n\n\n\nToday, one of the friendliest browsers for cookie-based tracking is Google Chrome. It’s also the most popular browser on the planet.&nbsp;\n\n\n\nBut could this all change with the deployment of their new FLoC technology?\n\n\n\nWhat is Google FLoC?\n\n\n\nFLoC stands for Federated Learning of Cohorts. It is a system designed to eliminate privacy problems caused by third-party cookie tracking from websites.&nbsp;\n\n\n\nInstead, Google plans to use Google Chrome itself to analyse your browsing history. Rather than following and analysing each user individually, FLoC will create groups of users with similar interests, by feeding your browsing data to machine learning algorithms within the browser.\n\n\n\nLet’s say that you regularly check tech news, read about Italian food and listen to heavy metal on Youtube.&nbsp;\n\n\n\n\nChrome will put you in a bucket with other users with similar interests. This bucket is called a Cohort and will be assigned an ID. When you visit a website, advertisers can see that ID through an API and will display targeted ads for that specific ID rather than your personal data.&nbsp;\n\n\n\nThis would allow advertisers to target the right audience, without getting granular details about each individual user. It’s part of a larger pro-privacy effort known as the “privacy sandbox”.\n\n\n\nAt the time of writing, the changes are already implemented in Google Chrome 89 for testing.\n\n\n\n\n\n\n\nWhat Google Says About the Privacy Changes\n\n\n\nFor Google, FLoC technology is one step towards improving user privacy. It’s supposed to reassure anti-tracking Chrome users about the kind of information websites can learn about them.&nbsp;\n\n\n\nAll the tracking info is kept locally on your computer via Google Chrome and doesn’t need to be uploaded on different web servers worldwide. In theory, the only data you send is your Cohort ID.&nbsp;&nbsp;\n\n\nFor advertisers, Google claims that this new tracking method will barely affect their bottom line. The company calculated that FLoC-based advertising reduced conversion by 5%, and it hopes it will increase in precision in the future.\n\n\nWhat Others Say About It\n\n\n\nAccording to tech experts and advertisers, the problems with Google FLoC are threefold:\n\n\n\n\n\n\n\nGoogle Chrome will still be able to track your activity across every single website. Even on the ones that didn’t use third-party cookies before.\n\n\n\n\n\n\n\nGoogle Chrome will be designed to work best with Google AdSense, its own ad programme. If every website is optimised for FLoC, there will be very little incentive for website owners to work with other third-party ads providers.\n\n\n\n\n\n\n\nFinally, many websites will also prioritise working with Chrome instead of other browsers.\n\n\n\nIn effect, this could lead to a double monopoly from the tech giant, who already runs the most popular web browser in the world, as well as the most powerful advertising network, AdSense.\n\n\n\nHow Other Companies Are Reacting\n\n\n\nUnsurprisingly, the reaction to the announcement of FLoC has been largely negative. There has been no shortage of articles detailing how bad the idea appears to be. Privacy-focused browser Brave had a whole post about why it disables FLoC by default. Safari, Vivaldi, Mozilla and Edge are also unconvinced.\n\n\n\nThe Electronic Frontier Foundation (EFF) is standing firmly against the proposal and even launched their AmIFloced website, to see if you are currently part of a FloC ID.&nbsp;\n\n\n\nWill it Affect Device Fingerprinting?\n\n\n\nWhen it comes to fraud prevention, the more data you have about a user, the better. And we’ve already seen that there is a movement of device spoofing and anti fingerprinting browsers. So would disabling third-party cookies also affect the technology?\n\n\n\nFor some online fraud detection systems, yes.&nbsp;\n\n\n\nBut the good news is that SEON’s device fingerprinting works independently from cookie-tracking.&nbsp;\n\n\n\nWe specifically focus our efforts on creating a device ID, which is based on the technical parameters related to the configuration of software and hardware, but not the individual user’s behavioural patterns. It does not need cookies to work.\n\n\n\nMoreover, we also strive to be compliant with data collection practices. SEON is one of the rare fraud prevention systems to be fully GDPR compliant and to have ISO 270001 certification. (You can read more about GDPR and fraud prevention here).\n\n\n\nWe are committed to protecting data as part of our privacy policy as efficiently as possible, without making life too easy for fraudsters.\n\n\n\nData Collection for Advertising Vs Security\n\n\n\nWhile fraud prevention and advertising both work by collecting user data, the way in which they use it couldn’t be further apart. Targeting groups is possible in advertising, but in security, it is essential to identify individual users.\n\n\n\nThe new rift that Google’s FLoC technology opened between users, advertisers, and regulatory agencies only highlights that difference.\n\n\n\nWhile the technology hasn’t yet fully deployed, it certainly opened a dialogue about the difficult balancing act between privacy changes and delivering tailored services – especially when it comes to advertising.\n\n\n\nThe good news is that even without cookie-tracking technology, SEON’s device fingerprinting will still be able to protect both your users and your business.&nbsp;"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/google-floc-privacy-changes-and-device-fingerprinting/","url":"https://seon.io/resources/google-floc-privacy-changes-and-device-fingerprinting/","name":"Google's New Data Privacy Changes Affect Device Fingerprinting?","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/google-floc-privacy-changes-and-device-fingerprinting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","datePublished":"2021-04-28T14:36:58+00:00","dateModified":"2025-04-03T09:34:40+00:00","description":"Google is pioneering a new data collection method for its browser Chrome. Will the privacy changes affect device fingerprinting and GDPR?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/google-floc-privacy-changes-and-device-fingerprinting/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-risk-assessment-checklist/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-risk-assessment-checklist/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"The Ultimate Fraud Risk Assessment Checklist in 2023","datePublished":"2021-05-14T08:00:13+00:00","dateModified":"2025-08-12T15:08:18+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-risk-assessment-checklist/"},"wordCount":1940,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-risk-assessment-checklist/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","inLanguage":"en-US","description":"Fraud is pretty much a given these days. Just make sure you can anticipate the right attacks with the right tools using our fraud risk assessment checklist.\n\n\n\nIn an ideal world, every company would have a strong RiskOps team in place. The reality, of course, is that not every business can afford it. Even more worrying: the largest organisations in the world, with seemingly unlimited resources, still get defrauded on a daily basis.&nbsp;\n\n\n\nThis begs the question: how effective are the current risk audits performed by CFOs and other departments? And could we improve on them?\n\n\n\nWhat is a Fraud Risk Assessment Checklist?\n\n\n\nAs the name suggests, it's a list of points to verify to ensure you have a strong strategy to detect business fraud. It's industry-agnostic and should be understandable by every department, regardless of technical risk management knowledge. Our anti-fraud checklist is divided into three key categories where fraudsters can strike, namely: payments, user accounts, and marketing.\n\n\n\nWhy Use a Fraud Risk Assessment?\n\n\n\nOnline fraud is a tax on successful businesses. While this once only used to be true for high-value retailers or online banks, these days any kind of company is at the mercy of attacks. The problem is that fraud often takes companies by surprise. In order to be prepared, it's best to understand risk wherever it may lie. \n\n\n\nOur anti-fraud checklist should help anyone doing online business understand the potential risk – so that they may prepare against potential attacks using the right risk management system &amp; methods. This is true regardless of your risk management skill or experience, or even the kind of vertical you do business in.\n\n\n\n\n      Take Your Fraud Detection to the Next Level \n      Compare the best fraud detection software and see how it can help your business detect and prevent fraud.\n     \n        Find Out More\n      \n    \n\n\n\nYour Fraud Risk Assessment Checklist in 3 Steps:\n\n\n\nThis checklist is our attempt to help you identify risk before it happens and to understand which tools you’ll need to deploy to mitigate it.\n\n\n\n1. Payments\n\n\n\nThe general rule of thumb: if there’s money coming in and out through your website, someone will attempt to steal it. Let’s see where the risk lies.&nbsp;\n\n\n\n\n\n\n\n1.1 - Do You Accept Credit Card Payments / PayPal?\n\n\n\n\n\n\n\nIt doesn’t matter if you’re a SaaS, travel operator or only sell luxury items. When it comes to purchasing stuff with a stolen credit card, no prize is too small for fraudsters. In fact, low-value goods are often targeted to test that the credit card works, without raising suspicion.\n\n\n\n\n\n\n\nEven more concerning: the rise of friendly fraud. This is what happens when the legitimate cardholder contests a purchase they made (or a family member). If their intentions were malicious, it can be very hard to prove, unless you have the right data at hand. \n\n\n\n\nWhat you risk: paying a lot in chargeback fees. Card networks can put you on a high-risk list and take a larger cut for each transaction. In extreme cases, they may consider your business so risky that they’ll stop allowing you to accept card payments.\n\n\n\n\n\nWhat to look out for: high chargeback rates, obviously. Also worth keeping an eye on small purchases (under $1), that could point to card testing.\n\n\n\n\n\nThe tools to deploy: digital footprint analysis can reveal a lot about your customers. Use device fingerprinting and data enrichment to learn as much as possible about the customer. Reverse media lookup can point to suspicious accounts.\n\n\n\n\nYou can read more about how to prevent chargeback fraud here.\n\n\n\n\n\n\n\n1.2 - Do You Accept Digital Wallets?\n\n\n\n\n\n\n\nDigital wallets, also known as e-wallets include famous names such as Apple Pay, Google Pay and AliPay. They are considered safer than credit card payments, but accepting them may incentivise fraudsters to steal your users’ accounts.&nbsp;\n\n\n\n\nWhat you risk: account takeover and credential stuffing. That’s when fraudsters log into your customers’ accounts and purchase things for themselves. It’s bad for your reputation.\n\n\n\n\n\nWhat to look out for: logins from suspicious devices and locations.\n\n\n\n\n\nThe tools to deploy: device fingerprinting and IP analysis can reveal a lot about who is logging into a certain account. You can create IDs for each combination of software and hardware, and ask for extra authentication when the details don’t match.\n\n\n\n\n\n\n\n\n1.3 - Do You Allow Buy Now Pay Later?\n\n\n\n\n\n\n\nBuy Now, Pay Later (BNPL) payments are all the rage these days. They allow customers to spend more on your site, and you pay a small fee for the benefit.&nbsp;\n\n\n\n\nWhat you risk: the customer could default on their “loan” at any time. Most BNPL providers offer protection for that scenario but do keep an eye on how often it happens, and what the contract terms say about it.\n\n\n\n\n\nWhat to look out for: terms and conditions of the BNPL provider.\n\n\n\n\n\nThe tools to deploy: you could use custom rules and velocity rules to keep track of user behaviour and flag suspicious patterns. It would also be a good use case for Machine Learning, which could identify strange patterns and suggest risk rules.\n\n\n\n\n\n\n\n\n1.4 - What About Crypto Payments?\n\n\n\n\n\n\n\nThird-party solutions like Coinbase Commerce and BitPay are growing in popularity for businesses who want to accept cryptocurrencies. A low transaction fee and absence of chargebacks should make them a clear favourite. But they’re not without risk.\n\n\n\n\nWhat you risk: another good reason to steal your users’ accounts via an Account Takeover (ATO) attack. Crypto’s anonymous or pseudonymous nature could also put you at risk of AML (anti-money laundering) fines.\n\n\n\n\n\nWhat to look out for: large transactions from new accounts (which could point to money laundering). Suspicious logins.\n\n\n\n\n\nThe tools to deploy: here again, digital footprint analysis and IP analysis are great to authenticate logins. Some fraud prevention tools allow integration with communication tools, so you can use them for real-time monitoring and alerts.&nbsp;\n\n\n\n\n2. User Accounts\n\n\n\nFrom SaaS to neobanks, many companies count user onboarding as a metric for growth. This comes with its own set of fraud challenges.\n\n\n\n\n\n\n\n2.1 - Do You Need to Meet KYC Requirements?\n\n\n\n\n\n\n\nFinancial institutions, fintechs and neobanks are under constant scrutiny from regulators. It’s your duty to ensure the accounts created on your platform are by legitimate users, not fraudsters.\n\n\n\n\nWhat you risk: heavy KYC and AML fines. Damaged reputation. If you offer loans or financial products, chances are that fraudsters will default and leave you in a lurch.\n\n\n\n\n\nWhat to look out for: fake IDs and synthetic IDs (using a combination of real and made-up data).\n\n\n\n\n\nThe tools to deploy: digital footprint analysis via data enrichment can reveal a lot about who your users are, in real-time. KYC verification checks with official companies are also expensive, so filtering out junk users beforehand is cost-effective.\n\n\n\n\n\n\n\n\n2.2 - Do You Store User Data?\n\n\n\n\n\n\n\nChances are that your user accounts are linked to personal information. This can include an address, or better yet for fraudsters, payment information.&nbsp;\n\n\n\nBut do not be fool into thinking you have nothing to fear if your user accounts aren’t used for payments: fraudsters will attempt to steal any kind of login details to mine the accounts for personal information, or to phish for it.\n\n\n\n\nWhat you risk: ATO attack or account takeover. If fraudsters manage to mine a lot of data, you may also be under the obligation to publicly disclose it (for instance under the GDPR). This can seriously damage your company’s reputation.\n\n\n\n\n\nWhat to look out for: suspicious login attempts. Quick changes of personal information from a new device.&nbsp;\n\n\n\n\n\nThe tools to deploy: data enrichment and device fingerprinting can help authenticate users at login. Use velocity rules to see how often users attempt to login and to monitor their behaviour.\n\n\n\n\n\n\n\n\n2.3 - Are You a Marketplace?\n\n\n\n\n\n\n\nOnline marketplaces need user accounts and often operate as online wallets too. This makes them doubly vulnerable to attacks. But even those that don’t store funds can be high targets for fraudsters.\n\n\n\n\nWhat you risk: fake accounts, multi-accounting, fraudulent listings, fake content and reviews. Account takeover (ATO) and transaction fraud (chargebacks, for instance). \n\n\n\n\n\nWhat to look out for: suspicious login attempts. Connections between accounts (suspiciously similar data points). Spam and phishing attempts.\n\n\n\n\n\nThe tools to deploy: data enrichment can help onboarding new users safely, and spot connections between users to take down entire networks of bots or multi-accounting fraud. Device fingerprinting is useful to authenticate logins.&nbsp;\n\n\n\n\n\n\n\n\n2.4 - Gambling Requirements?\n\n\n\n\n\n\n\niGaming, online gambling and sports betting have their own sets of legal challenges. They must not only prove that users are who they say they are, but also that they are safe to play. Fraudsters abuse these systems and attempt to blackmail operators later.\n\n\n\n\nWhat you risk: self-exclusion fines. Customer affordability fines.\n\n\n\n\n\nWhat to look out for: players losing large amounts of money. Long gaming sessions. \n\n\n\n\n\nThe tools to deploy: aside from an affordability calculator and self-exclusion checkbox, you should also use AI to promote responsible online gambling. Your fraud prevention’s velocity rules can also spot unwanted user behaviour.\n\n\n\n\n3. Marketing\n\n\n\nRegardless of the tools you use to reach new users and customers, fraudsters have every reason to take advantage of them.&nbsp;\n\n\n\n\n\n\n\n3.1 - Do You Offer Promos, Bonuses and Rewards?\n\n\n\n\n\n\n\nOnce the favoured marketing tactic of iGaming and gambling operators, promos, bonuses and signup rewards are increasingly used as a growth hack by all kinds of industries, from challenger banks to online stores.\n\n\n\nThe problem has once again to do with how easily fraudsters create multiple accounts. They have no shortage of options there: emulators, spoofing software, virtual SIM cards, disposable email addresses…&nbsp;\n\n\n\n\nWhat you risk: waste marketing dollars on bad users. Incentivise fraudsters to check out your business and infiltrate it. Bad for analytics.\n\n\n\n\n\nWhat to look out for: connections between accounts. Fast signups immediately trigger rewards with accounts that then lay dormant.\n\n\n\n\n\nThe tools to deploy: device fingerprinting and IP analysis can help spot connections between user configurations, or highlight suspicious use of Tor, VPNs, proxies and emulators. Email and phone analysis can also point to risky user profiles. Velocity rules can identify suspicious behaviour.\n\n\n\n\n\n\n\n\n3.2 - Do You Work With Affiliates?\n\n\n\n\n\n\n\nDo you do CPA, CPL, CPC or CPM? It barely matters: sophisticated fraud rings with the largest resources will be able to exploit your affiliate programme in order to trigger the rewards and walk away with the payouts.&nbsp;\n\n\n\n\nWhat you risk: here again, you will waste entire marketing campaigns, and the results will waste budget, mess up the KIPs and flaw your analytics.\n\n\n\n\n\nWhat to look out for: high numbers of bad leads. Users opting out in droves. Low conversion rates with high signup rates.\n\n\n\n\n\nThe tools to deploy: traffic and merchant monitoring, plus device fingerprinting to spot bot traffic and multi-accounting. Behaviour analysis (via velocity rules) can also spot patterns such as suspiciously fast signups and conversions.\n\n\n\n\nWhat to Do After Your Fraud Prevention Checklist\n\n\n\nA fraud prevention checklist is a good start for your initial risk assessment. But for the best results, you should also calculate the severity of losses from each potential point of attack. It’s also a good idea to deploy roles whose goal is to stay abreast of the latest threats and scams. Fraud is adaptive, and blocking one avenue often opens two more.&nbsp;\n\n\n\nFinally, common sense also helps. If the numbers are too good to be true, there could be something fishy at play! For more information about the anti-fraud tools mentioned in this fraud risk assessment checklist, please check our guide on device fingerprinting, velocity rules, and customer due diligence proofing."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fraud-risk-assessment-checklist/","url":"https://seon.io/resources/fraud-risk-assessment-checklist/","name":"The Ultimate Fraud Risk Assessment Checklist | 2023","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-risk-assessment-checklist/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","datePublished":"2021-05-14T08:00:13+00:00","dateModified":"2025-08-12T15:08:18+00:00","description":"Fraudsters adapt to every kind of business. Use our checklist to anticipate attacks and to deploy the right prevention tools today.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-risk-assessment-checklist/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"6 Types of Ecommerce Fraud and How to Protect Against Them","datePublished":"2021-05-28T07:22:24+00:00","dateModified":"2025-12-09T11:37:11+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/"},"wordCount":2551,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","keywords":["Fraud Detection"],"inLanguage":"en-US","description":"We go through the most common attacks on online stores and give you pointers on how to defend yourself."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/","url":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/","name":"6 Types of Ecommerce Fraud & How to Detect Them | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","datePublished":"2021-05-28T07:22:24+00:00","dateModified":"2025-12-09T11:37:11+00:00","description":"Ecommerce fraud detection and prevention is vital. From chargebacks to account takeovers, explore tools to protect your business.","mainEntity":[{"@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491000470"},{"@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491010215"},{"@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491018974"},{"@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491031417"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491000470","position":1,"url":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491000470","name":"What kinds of fraud target ecommerce?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Ecommerce and online stores are the targets of transaction fraud attacks (paying with stolen credit card numbers), account takeovers (stealing user accounts), return fraud and more.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491010215","position":2,"url":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491010215","name":"How is ecommerce fraud detected?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Detecting ecommerce fraud starts by logging as much data about customers as possible. It helps to authenticate them at login, spot suspicious information that could point to chargeback fraud, and identify customers who abuse return policies.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491018974","position":3,"url":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491018974","name":"How do you detect ecommerce friendly fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Detecting friendly fraud is harder than standard payment fraud. However, fraud detection tools can help you acquire detailed transaction and user data, which will enable you to dispute a chargeback request from an unscrupulous buyer.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491031417","position":4,"url":"https://seon.io/resources/ecommerce-fraud-detection-and-prevention/#faq-question-1630491031417","name":"How do you prevent ecommerce chargebacks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The key to preventing ecommerce chargebacks is to create a full profile of your users based on minimal data points and with minimal friction. For instance, an email address could point to a social media profile, which lets you know the person really exists.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/social-engineering-attacks/#article","isPartOf":{"@id":"https://seon.io/resources/social-engineering-attacks/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"What Are Social Engineering Attacks? Techniques &amp; Protection","datePublished":"2021-06-17T20:28:30+00:00","dateModified":"2025-05-24T08:46:11+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/social-engineering-attacks/"},"wordCount":2120,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/social-engineering-attacks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","keywords":["Social Footprint"],"inLanguage":"en-US","description":"No matter how big or small your business is, chances are there’s something there to exploit. And it’s not always money. For fraudsters and cybercriminals, any amount of data and information is good enough.\n\n\n\nWhile we’ve already covered a wide range of attacks in the context of account takeover fraud, today, we’ll be looking at a very specific way in which fraudsters put their foot through the door: social engineering attacks.&nbsp;\n\n\n\nNow, let’s go over some of the basics.\n\n\n\nWhat Is a Social Engineering Attack?\n\n\n\nA social engineering attack takes place in three steps. First, the attacker targets a victim. Second, they earn their trust. Third, they gain what they were after, usually breaking security practices or stealing information.&nbsp;\n\n\n\nThese attacks tend to work based on six principles:\n\n\n\n\nAuthority and trust: where the attacker poses as an authority figure.\n\n\n\nConsensus and social proof: where peer pressure forces someone to commit an action.\n\n\n\nScarcity: the idea that a victim will miss out if they don’t act.\n\n\n\nUrgency: the idea that the victim will miss out if they don’t act fast.\n\n\n\nFamiliarity and liking: convincing victims to perform certain actions by earning their trust / faking attraction.\n\n\n\n\nPractically speaking, the angle of these attacks is increasingly shifting from email communication to phone calls. Email security is quite good these days, but a pressuring phone call can still trick both customers and employees, especially with how easy it is to spoof the caller number, making it seem like they are from a trusted entity.\n\n\n\n(Pro tip: if you get a phone call from someone who is claiming to be from your bank, offer to call them back.)\n\n\n\nAn excellent example of a sophisticated social engineering scam is the one perpetrated against Google and Facebook. A Lithuanian group set up a fake company pretending to be a manufacturer working with the two tech giants.They then sent phishing emails to Google and Facebook employees, invoicing them for services that were genuinely purchased, but directing them to send money into the wrong accounts. Between 2013 and 2015, this social engineering attack is estimated to have help steal more than $100M.\n\n\n\n8 Types of Social Engineering Attacks\n\n\n\nBelow are 8 examples of the most common scenarios you might encounter at your company.\n\n\n\nBecause social engineering is such a broad term, it helps to break it down into different attack techniques. \n\n\n\n1. Baiting\n\n\n\nBaiting, as the name suggests, takes advantage of a victim’s curiosity or greed. A trap is set up by the attacker and designed to push someone to commit a specific action.\n\n\n\nAn example of a physical bait would be a USB drive left unattended on someone’s desk. Would you plug it in to check out its contents? Unbeknownst to you, it could be deploying malicious software on your computer, such as ransomware.\n\n\n\nBut baiting can also work digitally. An online form or an enticing advertisement can accomplish the same goal.\n\n\n\n2. Catfishing\n\n\n\nA well-known form of social engineering is catfishing. It is a deceptive activity based on creating a fictional persona that earns a victim’s trust. A close relative is romance fraud, whose rates have skyrocketed in recent years.&nbsp;\n\n\n\nThe real-life equivalent is called a honey trap, where an attacker pretends to be romantically interested in the victim to extract what they want.\n\n\n\n\n\n\n\n\n\n\n\n3. Pretexting\n\n\n\nBy stringing a series of lies together, attackers can convince victims that they are a co-worker, bank official or government agency. They establish trust with the person and convince them to answer security questions to confirm their own identity.&nbsp;\n\n\n\nThe psychological trick puts victims on the defensive, who feel they need to clear their good name, revealing important personal information in the process (social security number, bank account details, etc…).\n\n\n\n4. Phishing (Vishing &amp; Spear-Phishing Attacks)\n\n\n\nBy far the most common type of social engineering has to be phishing and relatives such as vishing and spear-phishing attacks. All three are designed to extract user or employee information. The differences in the terms are purely technical:\n\n\n\n\nPhishing: any kind of messaging campaign designed to redirect the victim towards a specific form, site or checkout. Common examples include sending an SMS that tells the victim to log into their bank account to redirect them towards a copy of the bank’s website.\n\n\n\nVishing: phishing done using voice technology such as a Skype call or fraudulent voice message.\n\n\n\nSpear phishing: this is targeted phishing focusing on an individual. Company executives or customer service representatives are increasingly targeted due to their access to important company information.\n\n\n\n\nOther forms of this kind of social engineering include smishing (SMS phishing) or angler phishing (carried out via fake customer service accounts on social media).\n\n\n\nIt’s worth noting that recent years have seen an increase in phishing using deepfake technology, both for voice and video. The technology allows fraudsters to impersonate someone by feeding clips of a real person to software and reprogramming it to make it say what they want.\n\n\n\nIn the context of social engineering, it’s often used to gain trust, for instance by telling an employee to wire money to a specific account by posing as an executive.\n\n\n\n5. Scareware\n\n\n\nScams work at their best when the victim is under stress, which is why attackers have created an entire genre of malware called scareware. It involves frightening the victim into performing an action, such as downloading a malicious antivirus under the pretence of fixing a computer error.\n\n\n\nScareware is often distributed via spam email or pop up advertisements and tends to target older, less tech-savvy generations.&nbsp;\n\n\n\n6. Tailgating &amp; Piggybacking\n\n\n\nThe heist movie classic, which sees bad agents impersonate a delivery driver or janitor to access restricted areas. While most corporate settings have security systems in place to avoid this kind of infiltration, it can be surprisingly easy to get past a front desk if you’re confident enough.&nbsp;\n\n\n\n7. Water Holing\n\n\n\nRegular users of a website have already established trust with the company. While a victim may not click a link from an unrecognised email address, they’ll have no problem clicking it if it’s on a website they frequent often.&nbsp;\n\n\n\nA water hole attack involves injecting malicious code directly into a targeted website that the victim is known to frequent.\n\n\n\n8. Quid Pro Quo Attacks\n\n\n\nQuid Pro Quo attacks are named after the Latin term for a favour granted in return for something. These attacks simply involve promising services or goods in exchange for what the fraudsters are after.\n\n\n\nFunnily enough, the bar doesn’t have to be set particularly high. Attacks have been successfully launched on employees simply by offering them a bar of chocolate in exchange for their login credentials.\n\n\n\n\n\n\n\nHow to Protect from Social Engineering Attacks\n\n\n\nYou can’t teach common sense, but you can still put all the odds in your favour when it comes to anticipating how to prevent and protect your company against a social engineering attack, here are 11 examples:&nbsp;\n\n\n\nEducate Employees and Users \n\n\n\nFirst of all, make sure social engineering is covered as part of your employee security awareness training and that everyone has understanding of the current attack trends\n\n\n\nCheck Sources and IDs\n\n\n\nWhether it’s an email header, phone call or URL or contractor invoice. It’s worth doubling down on security measures by asking for ID or ID proofing online.\n\n\n\nHave Clear Security Protocols and Use Passwords\n\n\n\nClarify the exact steps for your agents on how to handle password or email changes or unblock requests. User accounts are valuable for fraudsters, and they will be persistent in keeping them, as explained by Anonymous G, an active fraudster, on our Cat &amp; Mouse podcast. \n\n\n\nCommunication Between Departments\n\n\n\nFor many companies, the weakest link is the customer support team, who might not have sufficient knowhow on fraud. For user verification purposes, there should be some sort of hotline between the departments for added security.\n\n\n\nRaising User Awareness\n\n\n\nThe most common form of social engineering attack against your customer will be a phone call where the scammer will claim to be a representative of your company. Educate and warn your customers, clarifying not just where you might contact them, but what is the type of data you would never request - such as card numbers, who they transact with, personal details, etc.\n\n\n\n\n\n\n\nLeverage ID Proofing Technology\n\n\n\nSocial engineering happens when you can’t confirm who you’re dealing with. In the digital world, this is exactly what ID proofing attempts to solve.&nbsp;\n\n\n\nA reverse email lookup search, for instance, can reveal the risks associated with a certain email address. An attacker might register an email that looks like it matches the details of the actual account holder (firstname.lastname), but it will not have the corresponding social media profiles you would expect.\n\n\n\nSimilarly, checking an IP address for people getting in touch via a contact page can immediately help you decide if you’re dealing with a legitimate user or someone using either a proxy or is attempting an attack from a country where the original user never was before.\n\n\n\nThe same can be said for phone numbers: a legitimate user will likely call you from a number that’s associated with their messenger profiles, while a fraudster will use a virtual number or a burner phone.\n\n\n\nFor more advanced verification methods, see our post on OSINT – Open Source Intelligence. You can also consult our list of the best reverse email lookup tools. \n\n\n\nSecure your Devices and Premises\n\n\n\nAnti-malware and anti-virus software should be deployed and kept up to date. Company software and firmware should also be patched against the latest vulnerabilities. Make sure employees are aware of the potential risks when using company equipment, especially things like public Wi-Fi or rooted phones.&nbsp;\n\n\n\nSimilar security measures apply to company premises. You need to control every aspect of your offices, from desk security to waste management.&nbsp;\n\n\n\nHire Social Engineering Services\n\n\n\nFinally, you may want to look at hiring social engineering services, performed by white hat security experts and consultants. They will test your employees, website and offices for vulnerabilities and deliver in-depth reports about where your weak spots are.\n\n\n\nSocial Engineering Scams vs Phishing\n\n\n\nIf social engineering sounds a lot like phishing, it is because both practices are related. Social engineering, however, is a broader term. Bad agents who use social engineering may do it to access secure areas or to find web vulnerabilities. Phishing, on the other hand, is specifically designed to gain personal information such as login credentials or credit card numbers.\n\n\n\nIn that sense, every phishing attack is a form of social engineering. But not all social engineering is necessarily phishing.\n\n\n\nWhat Are Social Engineering Services? \n\n\n\nThere are companies that act as security consultants for your business. They will perform certain tests to attempt to obtain information from your website, users or employees. By highlighting vulnerabilities, they can help you protect against cybersecurity and fraud attacks, such as social engineering.When it comes to social engineering attack prevention, education is the best tool in your arsenal. Simply being aware of the scope, resources and sophistication of social engineering attacks can be enough to spot something suspicious before it’s too late.At SEON, we help companies deploy tools that protect employees and users – especially in the context of authentication at login and signup. \n\n\n\n\n      Still worried about Social Engineering Attacks?\n      SEON is more than just a software solution, it is your business partner in fraud fighting\n \n        Ask an Expert\n      \n    \n\n\n\nFrequently Asked Questions \n\n\n\nWhat is the most common type of social engineering attack? The most common type of social engineering attack is by far phishing. It exploits human error in combination with technology, such as malicious links or SMS sent under a fraudulent identity.  Is social engineering illegal? Yes. It social engineering is a crime that may lead to legal penalties.  Is social engineering hacking? Technically, social engineering is not hacking as it only deals with people, not IT equipment. However, social engineering is often performed in combination with other cybercrime, one of which is account hacking.  How common are social engineering attacks? According to a 2018 study, two out of ten company employees will be targeted – and fall for social engineering techniques.  \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON:&nbsp;Browser Spoofing: How It Works\n\n\n\nSEON:&nbsp;Payment Fraud Detection and Prevention\n\n\n\n\nLearn more about:\n\n\n\nDigital Footprinting | Browser Fingerprinting | Device Fingerprinting | Fraud Detection API\n\n\n\nExternal Sources:\n\n\n\n\nJustice.gov:  Lithuanian Man Pleads Guilty To Wire Fraud\n\n\n\nBBC: Romance fraud on rise in coronavirus lockdown\n\n\n\nForbes: A Voice Deepfake Was Used To Scam A CEO Out Of $243,000\n\n\n\nScience Daily: Social engineering: Password in exchange for chocolate"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/social-engineering-attacks/","url":"https://seon.io/resources/social-engineering-attacks/","name":"What Are Social Engineering Attacks and How to Prevent Them - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/social-engineering-attacks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2021-06-17T20:28:30+00:00","dateModified":"2025-05-24T08:46:11+00:00","description":"Social engineering attacks operate at the intersection of fraud, scamming, cybercrime and Risk Ops. Let’s break down everything you need to know here","mainEntity":[{"@id":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490364040"},{"@id":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490333451"},{"@id":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490346985"},{"@id":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490355739"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/social-engineering-attacks/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490364040","position":1,"url":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490364040","name":"What is the most common type of social engineering attack?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The most common type of social engineering attack is by far phishing. It exploits human error in combination with technology, such as malicious links or SMS sent under a fraudulent identity.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490333451","position":2,"url":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490333451","name":"Is social engineering illegal?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. It social engineering is a crime that may lead to legal penalties.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490346985","position":3,"url":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490346985","name":"Is social engineering hacking?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Technically, social engineering is not hacking as it only deals with people, not IT equipment. However, social engineering is often performed in combination with other cybercrime, one of which is account hacking.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490355739","position":4,"url":"https://seon.io/resources/social-engineering-attacks/#faq-question-1630490355739","name":"How common are social engineering attacks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"According to a 2018 study, two out of ten company employees will be targeted – and fall for social engineering techniques.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/friendly-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/friendly-fraud/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"Friendly Fraud: What Is It &amp; How Do You Stop It?","datePublished":"2021-06-25T11:13:23+00:00","dateModified":"2025-12-24T12:31:11+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/friendly-fraud/"},"wordCount":1342,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/friendly-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","inLanguage":"en-US","description":"Despite the misleading name, friendly fraud is not “friendly.” This deceptive practice costs online retailers over $132 billion annually — a figure that doesn’t account for additional losses from refunded goods and services or operational costs. A recent survey revealed that nearly three-quarters of merchants have experienced friendly fraud, with incidents rising by an average of 18% over the past three years.Unlike traditional fraud by external bad actors, friendly fraud often originates from legitimate customers through misunderstanding, misuse of return policies or intentional abuse. This makes it harder to detect and even harder to prove. But with the right strategies, businesses can mitigate risks and protect their revenue.\n\n\n\n\n\n\n\nWhat Is Friendly Fraud?\n\n\n\nFriendly fraud occurs when a cardholder disputes a legitimate transaction despite the card not being stolen. Unlike card-not-present (CNP) fraud, where criminals use stolen card data, friendly fraud involves the real cardholder themselves. It can happen in several ways:\n\n\n\n\nFamily fraud: A child or household member uses a saved card to make purchases without the owner’s knowledge.\n\n\n\nFirst-party fraud: A cardholder forgets a purchase, misunderstands billing details or mistakenly believes a recurring subscription charge is unauthorized.\n\n\n\nIntentional fraud occurs when the cardholder knowingly disputes a valid purchase to secure a refund while keeping the item or service.\n\n\n\n\nMerchants find it complicated to challenge friendly fraud. Distinguishing between accident, misunderstanding or deliberate abuse can be a lengthy, resource-heavy process without clear proof of intent.\n\n\n\nFriendly Fraud vs Chargeback Fraud\n\n\n\nThe terms friendly fraud and chargeback fraud are often used interchangeably, but there are significant differences:\n\n\n\n\nFriendly fraud: Involves legitimate customers disputing transactions — sometimes by mistake, sometimes deliberately.\n\n\n\nChargeback fraud: Typically intentional. A cardholder knowingly exploits the chargeback process, aiming to receive goods or services for free.\n\n\n\n\nBoth harm merchants by triggering costly disputes, but chargeback fraud is generally more malicious, whereas friendly fraud often blurs the line between fraud and poor customer experience. Understanding these nuances helps merchants refine their fraud prevention strategies.\n\n\n\n\n\n\n\nFive Examples of Friendly Fraud\n\n\n\nFriendly fraud comes in many forms. Here are some of the most common examples:\n\n\n\n\nAccidental friendly fraud occurs when customers forget about purchases or fail to recognize charges on their statements. This is especially common with recurring subscriptions, where shoppers overlook ongoing billing.\n\n\n\nIntentional friendly fraud: Shoppers dispute legitimate transactions to obtain refunds while retaining goods. Some practice double dipping,” requesting both a refund from the merchant and a chargeback from the bank.\n\n\n\nMerchant error: Customers may wrongly assume fraud when billing descriptors are unclear or delivery issues occur. Disputes based on dissatisfaction with service or product quality fall into this category.\n\n\n\nFamily fraud occurs when a family member, often a child, makes a purchase using another family member’s payment information without their knowledge. The unaware family member may later dispute the charge, thinking it was fraudulent.\n\n\n\nRefund abuse: Customers request refunds for products or services they have received and continue to use. They exploit lenient return policies, taking advantage of merchants’ willingness to process refunds without returning the item.\n\n\n\n\n\n      Stop Chargebacks & Friendly Fraud\n      Discover how SEON's frictionless fraud prevention can help you tackle friendly fraud without impacting the shopper journey.\n     \n        Speak with an expert\n      \n    \n\n\n\nConsequences of Friendly Fraud for Your Business\n\n\n\nFriendly fraud creates a triple threat for online retailers: financial costs, operational burdens, and reputational risks.\n\n\n\n\nChargeback Fees: Merchants pay $15 to $50 in fees for each dispute, regardless of the outcome. With hundreds of disputes, these costs quickly escalate.\n\n\n\nNarrow Timeframes: Merchants have just 45 days to contest a chargeback, and the process heavily favors cardholders without compelling evidence.\n\n\n\nOperational Costs: Businesses must absorb shipping, handling and administrative expenses tied to disputed transactions.\n\n\n\nReputation &amp; Compliance Risks: High chargeback ratios can trigger warnings from payment processors. If thresholds are breached, merchants risk fines, higher processing fees,or even being placed on industry watchlists like MATCH.\n\n\n\n\nUltimately, friendly fraud prevention is not just about reducing disputes but protecting long-term profitability and safeguarding payment processing capabilities.\n\n\n\nHow to Prevent Friendly Fraud\n\n\n\nWhile merchants often start at a disadvantage in disputes, proactive strategies can minimize risks. Effective friendly fraud prevention aligns with broader chargeback and refund fraud prevention practices, emphasizing verifying customer identity and intent.\n\n\n\nKey prevention tactics are:\n\n\n\n\nIdentity Verification: Use digital footprint analysis and device-related data to confirm customer identities and intentions and establish a clear connection between the customer and their transaction.\n\n\n\nComprehensive Record Keeping: Maintain detailed records of transactions and customer interactions; documentation can be invaluable when disputing chargebacks.\n\n\n\nPattern Monitoring: Monitor suspicious behaviors, such as frequent refund requests from the same customer, which might indicate potential friendly fraud.\n\n\n\nCustomer Communication: Provide accessible channels for customers to reach out with concerns before they resort to chargebacks. Clear communication can often resolve issues amicably.\n\n\n\nRefund Policy Adjustments: Consider refining your refund policies to reduce chargeback opportunities. For example, request specific customer evidence or ask for returns in disputes.\n\n\n\n\nBy implementing these strategies, businesses can reduce the likelihood of friendly fraud and protect their revenue.\n\n\n\nHow SEON Helps Combat Friendly Fraud\n\n\n\nWith advanced technology and a comprehensive approach that detects and prevents fraud at every step of the customer journey, SEON enables merchants to verify identities in real time. Here’s how SEON’s solutions help businesses effectively combat friendly fraud:\n\n\n\n\nDigital Footprint Analysis &amp; Device Intelligence: Assess customer identities based on online behavior, social and digital profiles and device characteristics.\n\n\n\nContinuous Activity Monitoring &amp; Behavioral Tracking: Monitor all transactions and user activity before purchases to spot behavioral patterns indicative of friendly fraud and recognize repeat offenders and unusual refund requests.\n\n\n\nCustomizable Fraud Rules: Set up tailored rules to flag suspicious activities and automate responses based on previously identified fraudulent behaviors.\n\n\n\nMachine Learning-Enhanced Detection: Spot patterns and anomalies the human eye might fail to recognize, and implement machine learning-suggested rules based on your historical data to fine-tune your defense.\n\n\n\n\nIn addition, SEON offers a fully&nbsp; automated chargeback management solution designed to maximize revenue recovery. By removing the need for tedious manual work, it enables businesses to reclaim chargebacks faster, reduce operational costs, and minimize lost revenue. This not only frees up valuable resources for growth but also strengthens customer trust and resilience against fraud-related losses.\n\n\n\nSEON empowers businesses to take control of chargeback processes and reduce the incidence of friendly fraud. Merchants can enhance their fraud prevention strategies by leveraging real-time data and machine learning insights while maintaining a seamless customer experience.\n\n\n\n\n      Protect Your Business from Friendly Fraud\n      Discover effective strategies and advanced tools to combat friendly fraud, verify identities, and minimize chargebacks to safeguard your revenue.\n     \n        Speak with an expert\n      \n    \n\n\n\nFrequently Asked Questions\n\n\n\nHow do you know if a chargeback is friendly fraud? Sadly it's near on impossible to 100% confirm if friendly fraud as the customer can simply deny any claims.    How do you prove friendly fraud? For merchants, proving friendly fraud is a challenge, because it is a form of first-party fraud, where the fraud is being committed by the legitimate cardholder. You can prove friendly fraud to the bank or any other stakeholder by demonstrating that you have used best safety practices throughout the ordering, payment and fulfillment process.   Can machine learning detect friendly fraud? Machine learning can be trained to detect unusual patterns in purchases and other behavior, so it can flag potential cases of friendly fraud. What's more, it always improves over time, so it is more likely to do so in the longer run.  \n\n\n\nYou might also be interested in reading about:\n\n\n\n\nSEON: Guide to Chargeback Fraud: Detection and Prevention\n\n\n\nSEON: Best Fraud Detection Software and Tools in 2025\n\n\n\nSEON: Top Chargeback Management Software Solutions\n\n\n\n\nLearn more about:\n\n\n\nDigital Footprint | Browser Fingerprinting | Device Fingerprinting\n\n\n\nSources:\n\n\n\n\nQredible: In-App Purchases: Consumer Protection Rights in the UK\n\n\n\nExpert Market: Chargeback Fraud Statistics 2021: Everything You Need to Know About Chargeback Fraud\n\n\n\nJustice - United States Department of Justice: New Orleans Man Sentenced To Six Years in Prison for Charges Related To Credit Card Fraud Conspiracy\n\n\n\nRazorpay: Here’s Why Blacklisting Customers Is Bad for Your E-Commerce Business"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/friendly-fraud/","url":"https://seon.io/resources/friendly-fraud/","name":"Friendly Fraud: What Is It & How to Prevent It? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/friendly-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","datePublished":"2021-06-25T11:13:23+00:00","dateModified":"2025-12-24T12:31:11+00:00","description":"Friendly fraud affects businesses globally as CNP transactions rise. Learn how it works, how to spot it, and how to mitigate it in 2022.","mainEntity":[{"@id":"https://seon.io/resources/friendly-fraud/#faq-question-1631284570217"},{"@id":"https://seon.io/resources/friendly-fraud/#faq-question-1631284350019"},{"@id":"https://seon.io/resources/friendly-fraud/#faq-question-1672751152979"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/friendly-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/friendly-fraud/#faq-question-1631284570217","position":1,"url":"https://seon.io/resources/friendly-fraud/#faq-question-1631284570217","name":"How do you know if a chargeback is friendly fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Sadly it's near on impossible to 100% confirm if friendly fraud as the customer can simply deny any claims.  ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/friendly-fraud/#faq-question-1631284350019","position":2,"url":"https://seon.io/resources/friendly-fraud/#faq-question-1631284350019","name":"How do you prove friendly fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"For merchants, proving friendly fraud is a challenge, because it is a form of first-party fraud, where the fraud is being committed by the legitimate cardholder. You can prove friendly fraud to the bank or any other stakeholder by demonstrating that you have used best safety practices throughout the ordering, payment and fulfillment process. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/friendly-fraud/#faq-question-1672751152979","position":3,"url":"https://seon.io/resources/friendly-fraud/#faq-question-1672751152979","name":"Can machine learning detect friendly fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Machine learning can be trained to detect unusual patterns in purchases and other behavior, so it can flag potential cases of friendly fraud. What's more, it always improves over time, so it is more likely to do so in the longer run.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/gift-card-fraud-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/gift-card-fraud-prevention/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Gift Card Fraud: How to Prevent and Detect It","datePublished":"2021-07-09T08:11:08+00:00","dateModified":"2025-12-24T12:31:02+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/gift-card-fraud-prevention/"},"wordCount":2062,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/gift-card-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","inLanguage":"en-US","description":"Learn how you can improve your online store’s gift card fraud prevention."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/gift-card-fraud-prevention/","url":"https://seon.io/resources/gift-card-fraud-prevention/","name":"Gift Card Fraud: Risks & Prevention","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/gift-card-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","datePublished":"2021-07-09T08:11:08+00:00","dateModified":"2025-12-24T12:31:02+00:00","description":"Gift card fraud puts your online store at risk. Find out about the 11 different gift card fraud scams and how to protect your business.","mainEntity":[{"@id":"https://seon.io/resources/gift-card-fraud-prevention/#faq-question-1635510293746"},{"@id":"https://seon.io/resources/gift-card-fraud-prevention/#faq-question-1631120339715"},{"@id":"https://seon.io/resources/gift-card-fraud-prevention/#faq-question-1691396434212"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/gift-card-fraud-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/gift-card-fraud-prevention/#faq-question-1635510293746","position":1,"url":"https://seon.io/resources/gift-card-fraud-prevention/#faq-question-1635510293746","name":"How can I help my customers avoid gift card fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"As an ecommerce brand, it is a good idea to educate your customers on gift card fraud, especially if you've noticed an increase in attempts. This could be as simple as writing an informative blog article, email newsletter or social media post with a handful of general tips and best practices.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/gift-card-fraud-prevention/#faq-question-1631120339715","position":2,"url":"https://seon.io/resources/gift-card-fraud-prevention/#faq-question-1631120339715","name":"How do I report a gift card scammer?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Unfortunately, there’s not much to do from the business side. You could contact a local police department but the best thing to do is to log as much information as possible related to the scammer and blacklist it.  ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/gift-card-fraud-prevention/#faq-question-1691396434212","position":3,"url":"https://seon.io/resources/gift-card-fraud-prevention/#faq-question-1691396434212","name":"What should individuals do if they’ve been targeted by gift card fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"They should consult the authorities and other experts – all of which must be specific to their jurisdiction – and report the matter with as much evidence and other information as possible.<br />The US-based <a href=\"https://consumer.ftc.gov/articles/gift-card-scams#what%20to%20do\" target=\"_blank\" rel=\"noreferrer noopener\">FTC</a> (Financial Trade Commission), for example, offers advice to anyone who has been targeted by gift fraud, but this is far from the only authority. Also remember that retailers, especially the retailers that the given gift card belongs to, will be able to offer further advice as they should have a record of their transactions and how they work.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/stripe-identity-user-identification-and-kyc/#article","isPartOf":{"@id":"https://seon.io/resources/stripe-identity-user-identification-and-kyc/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Stripe Identity &#8211; Good for User Identification and KYC or Too Heavy-Handed?","datePublished":"2021-07-23T08:04:48+00:00","dateModified":"2025-12-24T12:38:18+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/stripe-identity-user-identification-and-kyc/"},"wordCount":1126,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/stripe-identity-user-identification-and-kyc/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","keywords":["Identity Verification"],"inLanguage":"en-US","description":"Stripe Identity can make online shopping frustrating. What are the risks and the alternatives?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/stripe-identity-user-identification-and-kyc/","url":"https://seon.io/resources/stripe-identity-user-identification-and-kyc/","name":"Stripe Identity - Our Perspective From a Fraud Management POV","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/stripe-identity-user-identification-and-kyc/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","datePublished":"2021-07-23T08:04:48+00:00","dateModified":"2025-12-24T12:38:18+00:00","description":"Stripe Identity is the fintech's new way to verify customer identities. Here's where we think it will work – and where you should consider alternatives.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/stripe-identity-user-identification-and-kyc/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"11 Types of Telecommunications Fraud: How to Detect &amp; Prevent It","datePublished":"2021-08-06T07:16:46+00:00","dateModified":"2026-01-12T17:33:45+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/"},"wordCount":2461,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","inLanguage":"en-US","description":"Telecommunications fraud is sophisticated, rampant and targets both businesses and customers."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/","url":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/","name":"Telecom Fraud: 11 Examples & How to Detect and Prevent It","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","datePublished":"2021-08-06T07:16:46+00:00","dateModified":"2026-01-12T17:33:45+00:00","description":"Telecommunications fraud includes IRSF, SIM swapping, wangiri scams, and account takeover. Learn how telecom operators detect and prevent fraud today.","mainEntity":[{"@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/#faq-question-1632226453807"},{"@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/#faq-question-1632226659063"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/#faq-question-1632226453807","position":1,"url":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/#faq-question-1632226453807","name":"What are the major categories of telecommunication fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The most costly fraud attacks for telecommunication companies include IRSF (international revenue share fraud), bypass fraud, and traffic pumping.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/#faq-question-1632226659063","position":2,"url":"https://seon.io/resources/telecommunications-fraud-detection-and-prevention/#faq-question-1632226659063","name":"How is telecommunications fraud detected?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraudulent attacks such as account takeover, transaction fraud, and subscription fraud targeting telecommunications operators can be detected with real-time monitoring, digital footprinting and data enrichment. This allows companies to learn more about users in order to accept or decline their actions, such as a payment or login.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-use-bin-lookup-for-fraud-detection/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-use-bin-lookup-for-fraud-detection/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How to Use BIN Lookup for Fraud Detection","datePublished":"2021-09-27T14:29:12+00:00","dateModified":"2025-12-24T12:35:33+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-use-bin-lookup-for-fraud-detection/"},"wordCount":1641,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-use-bin-lookup-for-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","inLanguage":"en-US","description":"A BIN lookup can reduce fraud rates. But how does it work? Manual vs automated? Learn all about BIN lookups, chargeback rates, and transaction fraud here."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-to-use-bin-lookup-for-fraud-detection/","url":"https://seon.io/resources/how-to-use-bin-lookup-for-fraud-detection/","name":"How to Use BIN Lookup for Fraud Detection | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-use-bin-lookup-for-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2021-09-27T14:29:12+00:00","dateModified":"2025-12-24T12:35:33+00:00","description":"A BIN lookup can reduce fraud rates. But how does it work? Manual vs automated? Learn all about BIN lookups, chargeback rates, and transaction fraud here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-use-bin-lookup-for-fraud-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/bopis-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/bopis-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"BOPIS Fraud: What Is It &#038; How To Stop It","datePublished":"2022-07-19T02:52:48+00:00","dateModified":"2025-04-29T17:41:25+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/bopis-fraud/"},"wordCount":2712,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/bopis-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/07/BOPIS_Fraud_cover.png","keywords":["Identity Verification"],"inLanguage":"en-US","description":"Since the pandemic, BOPIS fraud is on the rise."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/bopis-fraud/","url":"https://seon.io/resources/bopis-fraud/","name":"BOPIS Fraud: What Is It, Examples & How To Stop It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/bopis-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/07/BOPIS_Fraud_cover.png","datePublished":"2022-07-19T02:52:48+00:00","dateModified":"2025-04-29T17:41:25+00:00","description":"BOPIS sales increased in recent years and, as a result, BOPIS fraud increased too. Let's look at how to benefit from BOPIS without the risk of fraud.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/bopis-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/07/BOPIS_Fraud_cover.png","contentUrl":"https://seon.io/wp-content/uploads/2022/07/BOPIS_Fraud_cover.png","width":3360,"height":1920,"caption":"BOPIS Fraud Featured"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/global-cybercrime-report/#article","isPartOf":{"@id":"https://seon.io/resources/global-cybercrime-report/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Global Cybercrime Report: Which Countries Are Most at Risk in 2023?","datePublished":"2021-10-25T11:04:43+00:00","dateModified":"2025-04-30T13:29:28+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/global-cybercrime-report/"},"wordCount":2183,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/global-cybercrime-report/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2023/04/Featured-Image-Global-Cybercrime-Report-2023.png","inLanguage":"en-US","description":"To find out the true dangers of cybercrime, we’ve taken a look at how much of a threat cybercrime is globally."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/global-cybercrime-report/","url":"https://seon.io/resources/global-cybercrime-report/","name":"Global Cybercrime Report: Countries Most at Risk in 2023 | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/global-cybercrime-report/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2023/04/Featured-Image-Global-Cybercrime-Report-2023.png","datePublished":"2021-10-25T11:04:43+00:00","dateModified":"2025-04-30T13:29:28+00:00","description":"SEON's comprehensive report of cybercrime around the world in 2023 includes the safest countries for cybersecurity, the countries most at risk, and more.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/global-cybercrime-report/#primaryimage","url":"https://seon.io/wp-content/uploads/2023/04/Featured-Image-Global-Cybercrime-Report-2023.png","contentUrl":"https://seon.io/wp-content/uploads/2023/04/Featured-Image-Global-Cybercrime-Report-2023.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#article","isPartOf":{"@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"The 6 Best Transaction Monitoring Software &amp; Tools","datePublished":"2021-11-22T13:40:00+00:00","dateModified":"2026-03-03T20:16:21+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/"},"wordCount":1970,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","keywords":["Transaction Monitoring"],"articleSection":["Article"],"inLanguage":"en-US","description":"Transaction monitoring is easier with AI – but how do you make the most of it?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/","url":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/","name":"The 6 Best Transaction Monitoring Software & Tools","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","datePublished":"2021-11-22T13:40:00+00:00","dateModified":"2026-03-03T20:16:21+00:00","description":"Transaction monitoring software records and analyzes transaction data to detect fraud, money laundering, and other crimes. Find the best companies here.","mainEntity":[{"@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1637314639139"},{"@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1745850956469"},{"@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1637314650611"},{"@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1646317207961"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1637314639139","position":1,"url":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1637314639139","name":"How does transaction monitoring software work?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Transaction monitoring software automates the detection of suspicious transactions in real-time, essential for AML and <a href=\"https://seon.io/resources/transaction-fraud-detection/\">transaction fraud detection</a>. It collects and normalizes data, applies rules to identify suspicious activity, and uses advanced analytics to detect anomalies. The system generates alerts for flagged transactions, which AML analysts review and investigate. Confirmed suspicious transactions are reported to regulatory authorities. The software is continuously updated to adapt to new threats and regulatory changes.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1745850956469","position":2,"url":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1745850956469","name":"What are the challenges of transaction monitoring tools?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Deploying transaction monitoring tools presents several challenges. First, integration and maintenance costs can be high — especially for legacy systems or highly regulated sectors. Second, managing large volumes of alerts can overwhelm compliance teams, particularly when false positives are common. Finally, staying ahead of evolving threats and meeting changing regulatory expectations requires constant tuning, skilled personnel and access to high-quality data.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1637314650611","position":3,"url":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1637314650611","name":"Why is transaction monitoring important?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Transaction monitoring is critical for identifying and stopping money laundering, fraud and other illicit financial activity. It helps institutions protect themselves, their customers and the broader financial system. Beyond security, it's also a legal obligation — failure to implement effective monitoring can result in substantial regulatory fines and reputational damage.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1646317207961","position":4,"url":"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/#faq-question-1646317207961","name":"How do you perform transaction monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Businesses can manually monitor transactions, build in-house tools or deploy third-party transaction monitoring software. Increasingly, organizations choose third-party solutions for their speed, scalability and regulatory readiness. These tools integrate with internal systems to track deposits, withdrawals, payments and account activity — raising real-time alerts when thresholds are exceeded or behaviors deviate from expected patterns.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/risk-based-authentication/#article","isPartOf":{"@id":"https://seon.io/resources/risk-based-authentication/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Risk-Based Authentication: What Is It and How Can It Help Your Business?","datePublished":"2021-12-07T15:13:00+00:00","dateModified":"2024-11-01T10:09:05+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/risk-based-authentication/"},"wordCount":1689,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/risk-based-authentication/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/12/Risk_Based_Authentication_12_02-1.png","inLanguage":"en-US","description":"Risk-Based Authentication (RBA) is a anti-fraud method aimed at improving  both user security and experience."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/risk-based-authentication/","url":"https://seon.io/resources/risk-based-authentication/","name":"What Is Risk-Based Authentication (RBA)? Benefits for Business","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/risk-based-authentication/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/12/Risk_Based_Authentication_12_02-1.png","datePublished":"2021-12-07T15:13:00+00:00","dateModified":"2024-11-01T10:09:05+00:00","description":"What is risk-based authentication? Discover what RBA is, the benefits of implementing it for your business & how to deploy it. Here's our solution & guide.","mainEntity":[{"@id":"https://seon.io/resources/risk-based-authentication/#faq-question-1638868083172"},{"@id":"https://seon.io/resources/risk-based-authentication/#faq-question-1638868088274"},{"@id":"https://seon.io/resources/risk-based-authentication/#faq-question-1638868105491"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/risk-based-authentication/#primaryimage","url":"https://seon.io/wp-content/uploads/2021/12/Risk_Based_Authentication_12_02-1.png","contentUrl":"https://seon.io/wp-content/uploads/2021/12/Risk_Based_Authentication_12_02-1.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/risk-based-authentication/#faq-question-1638868083172","position":1,"url":"https://seon.io/resources/risk-based-authentication/#faq-question-1638868083172","name":"How does risk-based authentication work?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Risk-based authentication, or RBA, works by scoring user data points in order to measure how risky their actions are. Different parameters such as IP address, the device used, and more are broken down into parameters, which are fed through risk rules. The rules help calculate a score to let you know if the action is risky or not. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/risk-based-authentication/#faq-question-1638868088274","position":2,"url":"https://seon.io/resources/risk-based-authentication/#faq-question-1638868088274","name":"What can risk-based authentication do?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"With risk-based authentication, you can automatically approve or block a user action based on how risky it is. For instance, you can stop a transaction from someone with a high risk score, who may be a fraudster. <br />You can also remove obstacles such as 2FA or OTP for users who appear legitimate. Medium risk users can be asked for more information, or have their details manually reviewed by an agent.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/risk-based-authentication/#faq-question-1638868105491","position":3,"url":"https://seon.io/resources/risk-based-authentication/#faq-question-1638868105491","name":"Why use risk-based authentication?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Risk-based authentication allows companies to reduce the costs of fraud and risk management, so they can allocate more resources to manual review. It can also help protect user accounts from account takeovers. Ultimately, it helps reduce fraud rates, which has positive benefits for business growth, compliance, and user trust.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/business-fraud-hotspots/#article","isPartOf":{"@id":"https://seon.io/resources/business-fraud-hotspots/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"UK and US Business Fraud Hotspots in 2021","datePublished":"2021-12-13T15:23:00+00:00","dateModified":"2025-04-03T09:33:57+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/business-fraud-hotspots/"},"wordCount":1976,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/business-fraud-hotspots/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/12/Business_hotspots_social-1.png","inLanguage":"en-US","description":"A new report looking at the biggest hotspots for fraud in the UK and the US."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/business-fraud-hotspots/","url":"https://seon.io/resources/business-fraud-hotspots/","name":"UK and US Business Fraud Hotspots in 2021 - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/business-fraud-hotspots/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/12/Business_hotspots_social-1.png","datePublished":"2021-12-13T15:23:00+00:00","dateModified":"2025-04-03T09:33:57+00:00","description":"Since the digital revolution, cybercrime has exploded around the globe. We decided to deep dive into fraud trends in the US & UK","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/business-fraud-hotspots/#primaryimage","url":"https://seon.io/wp-content/uploads/2021/12/Business_hotspots_social-1.png","contentUrl":"https://seon.io/wp-content/uploads/2021/12/Business_hotspots_social-1.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/bin-iban-sponsorships/#article","isPartOf":{"@id":"https://seon.io/resources/bin-iban-sponsorships/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"The Security Headache Behind BIN / IBAN Sponsorships","datePublished":"2021-12-15T13:34:00+00:00","dateModified":"2025-05-24T08:40:15+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/bin-iban-sponsorships/"},"wordCount":669,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/bin-iban-sponsorships/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/12/The_Security_Headache_IBAN_11_24_social.png","inLanguage":"en-US","description":"Security-wise, what happens with cards and IBAN numbers acquired through fintech apps?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/bin-iban-sponsorships/","url":"https://seon.io/resources/bin-iban-sponsorships/","name":"The Security Headache Behind BIN / IBAN Sponsorships - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/bin-iban-sponsorships/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/12/The_Security_Headache_IBAN_11_24_social.png","datePublished":"2021-12-15T13:34:00+00:00","dateModified":"2025-05-24T08:40:15+00:00","description":"Security-wise, what happens with cards and IBAN numbers acquired through fintech apps? And what are the problems?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/bin-iban-sponsorships/#primaryimage","url":"https://seon.io/wp-content/uploads/2021/12/The_Security_Headache_IBAN_11_24_social.png","contentUrl":"https://seon.io/wp-content/uploads/2021/12/The_Security_Headache_IBAN_11_24_social.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/credit-card-fraud-detection/#article","isPartOf":{"@id":"https://seon.io/resources/credit-card-fraud-detection/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"Credit Card Fraud Detection: What is It, How It Works and Its Importance","datePublished":"2021-12-17T12:47:00+00:00","dateModified":"2025-12-24T12:35:17+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/credit-card-fraud-detection/"},"wordCount":1527,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/credit-card-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-dark.png","keywords":["Account Takeover","Card Fraud"],"inLanguage":"en-US","description":"Credit card fraud is only rising; but what can you do to mitigate risk?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/credit-card-fraud-detection/","url":"https://seon.io/resources/credit-card-fraud-detection/","name":"Credit Card Fraud Detection: What Is It and How it Works - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/credit-card-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-dark.png","datePublished":"2021-12-17T12:47:00+00:00","dateModified":"2025-12-24T12:35:17+00:00","description":"Discover the essentials of credit card fraud detection. Learn what it is, how it works, and the technologies used to protect your financial security.","mainEntity":[{"@id":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663165598"},{"@id":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663172849"},{"@id":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663179549"},{"@id":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663188582"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/credit-card-fraud-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663165598","position":1,"url":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663165598","name":"How long does it take to detect credit card fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud prevention software should be able to detect credit card fraud instantly. It will use a combination of risk rules to flag a transaction and prevent it before it happens. If you detect credit card fraud, you will need to initiate a chargeback request. The chargeback may take up to 120 days to be settled. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663172849","position":2,"url":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663172849","name":"Can credit card fraud be traced?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Theoretically, you can trace credit card fraud. In practice, however, it is very unlikely that the fraudster will be prosecuted – unless they are caught as part of a large-scale anti-fraud operation.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663179549","position":3,"url":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663179549","name":"Who is liable for credit card fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If your business processed a fraudulent credit card transaction, you are legally forced to repay the sum to the cardholder. You may also dispute the chargeback process, which may be a long and costly process. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663188582","position":4,"url":"https://seon.io/resources/credit-card-fraud-detection/#faq-question-1639663188582","name":"How does credit card fraud work?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Credit card fraud happens when a fraudster gets hold of someone else’s credit card details and makes a purchase with it. This is clear fraud, where the goal is to not pay for a good or service and still receive it. <br />Note that there is also another type of credit card fraud that happens when the cardholder is being dishonest. In that scenario, the payment looks legitimate, but the cardholder has already decided to return the item or ask for a refund.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-fighters-resource/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-fighters-resource/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Resources for Fraud Fighters","datePublished":"2022-01-11T16:02:11+00:00","dateModified":"2025-04-03T09:33:49+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-fighters-resource/"},"wordCount":1271,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-fighters-resource/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","inLanguage":"en-US","description":"I remember when I started in the industry as a risk manager – over a decade ago, when people still used MySpace! – what floored me was not the long list of acronyms to learn or the complexity of online payment systems.\n\n\n\nIt was the sheer amount of fraud.\n\n\n\nOf course I knew about hackers and scammers. But online commerce was still far from what it is today, and yet the fraudsters were already everywhere.\n\n\n\nIt was as if I had glanced at a whole new world – one which was hidden, with the majority of the population being blissfully unaware of it, up until the point that they themselves fall victim to it.\n\n\n\nWorking in this industry makes you see the world differently, much like how metro workers see the city differently from ordinary commuters. \n\n\n\nThere are of course hard skills that you can learn but at the end of the day, you're under the hood of the global ecommerce machine. Complex systems stand between you and the real world, and your job is to try to understand that human story on the other side.\n\n\n\nA bit like Morpheus from the Matrix. \n\n\n\nAll the signs, data points and picked-up information are just pieces of a puzzle.\n\n\n\nThe hard part is that you still have to make sense of the picture once you put it together. And what we call stories in the real world are nothing more than patterns when shown on a screen. A given case will be judged according to what pattern it fits, in the head of the analyst.\n\n\n\nBack in those days, you could only learn new patterns by shadowing more senior people or discovering them on your own.\n\n\n\nThese days, thankfully, there are many resources that you can use to build up your knowledge. While fraud and risk management has its own domain knowledge related to payments, regulation, and compliance, it's adjacent to cybersecurity, which has a large and mature community. \n\n\n\nThe more technically inclined anti-fraud people frequently transfer to security. The fact that both careers have paranoia practically as a job requirement certainly helps.\n\n\n\nBelow, I've collated some of our favorite sources of knowledge and information. The list is by no means exhaustive – there are many more out there. But it’s a good starting point.\n\n\n\nThe ability to spot patterns is not something that can be picked up from a handbook; it’s more of a mentality that you learn via osmosis. An eager fraud fighter is someone who submerges themselves into this world.\n\n\n\nPortals &amp; Blogs\n\n\n\nInfrequent activity on these sites means you have to grab your RSS reader or check on them every once in a while – or just spend an afternoon or two going through the archives. They range from industry publications to veritable influencers but if it’s newsworthy and concerns us, it will appear here.\n\n\n\nAssociation of Certified Fraud Examiners \n\n\n\nThe ACFE is the world's largest anti-fraud organization and as such the old-school resource kit.\n\n\n\nAbout Fraud \n\n\n\nOur friends at About Fraud are busy running the industry's go-to portal, with plenty of content, events, training courses and even a job board.\n\n\n\nFrank on Fraud\n\n\n\nIndustry veteran Frank McKenna's blog, with always up to date insights on what's happening in security worldwide.\n\n\n\nKrebs on Security \n\n\n\n The man. The legend. Brian Krebs. If something breaks, it'll appear here first.\n\n\n\nDark Reading \n\n\n\nRun by Informa, Dark Reading is a news portal specializing in security, with plenty of relevant expert commentary.\n\n\n\nThe Con Artist\n\n\n\n A now defunct substack publication that goes into depth on the various types of fraud &amp; scams out there.\n\n\n\nGru.gq \n\n\n\n The blog of Thaddeus Grugq, providing independent commentary on all things cybersecurity\n\n\n\nOkta \n\n\n\nThe identity as a service provider company's blog is a treasure trove of information.\n\n\n\nPodcasts\n\n\n\nPodcasts cast a wider net and as such, they deal with less techy stuff, focusing more on the story – as is the tradition of oral storytelling. The closest to what we have as an industry water cooler chat.\n\n\n\nSEON Cat and Mouse Podcast\n\n\n\nSEON's very own fraud-focused podcast is currently in its second season, featuring fascinating chats on everything fraud-related with brilliant guests, including fraud analysts and former fraudsters themselves. This podcast aims to provide insights into the psychology of those who attack and exploit systems and discuss true-life examples of the thrills and frustrations of risk management.\n\n\n\n\n\n\n\n\n\n\n\nH4unt3d Hacker\n\n\n\nHosted by Mike Jones, a former hacktivist, the H4unt3d Hacker show looks to break down barriers of entry to the industry and aims to inspire younger people to get stuck into the world of cybersecurity. Find industry interviews, a community on discord, and a magazine all part of its arsenal. Mike has also appeared in an episode of SEON's podcast.\n\n\n\nMalicious Life\n\n\n\nMalicious Life educates listeners about how the cybersecurity industry as a whole has transformed over the years, zeroing in on the ‘unknown stories\" of times gone by with comments from active hackers, security experts and more.\n\n\n\nThe Human Factor Security\n\n\n\nWinner of the European Cybersecurity Blogger Awards 2021 Best Podcast award, Jenny Radcliffe brings on board a range of industry leaders to discuss the human element of fraud and cybersecurity. Jenny is a true expert in social engineering, previously being hired specifically by companies to bypass security systems.\n\n\n\n\n\n\n\nThe Dark Money Files\n\n\n\nThe Dark Money Files is a podcast series run by two UK-based AML experts and aims to explain how dirty money enters financial markets around the world and what the broader consequences are in a conversational manner.\n\n\n\nScam Goddess\n\n\n\nThe Scam Goddess, hosted by US comedian Laci Mosley, is a more relaxed podcast breaking down some of the biggest cons throughout history and updates on some of the latest related news, with other comedians providing backup to her superb research. As the saying goes, if you don’t laugh… you cry.\n\n\n\nDarknet Diaries\n\n\n\nSaving the best for last? Jack Rhysider takes his audience on a storytelling journey through the world of cybercrime, highlighting the scary reality of the world wide web, including interviews with active hackers, defenders and subject matter experts.\n\n\n\nYouTube Channels\n\n\n\nNow ye enter the land of wizards: the hacker community proper. The archives of these channels are worth digging through, as some of these talks and events are legendary. As a fraud/risk manager, you can only get so far in understanding what’s possible, while the hackers will always be there to tell us that there is in fact no spoon, Neo.\n\n\n\nBlack Hat USA&nbsp;\n\n\n\nBlack Hat is the most respected information security conference on the planet, and their YouTube channel features the best lectures of the events.\n\n\n\nDEFCON \n\n\n\nThe most recognized hacker convention, annually held in Las Vegas. As you can expect, it features the forefront of things that are either scary or straight up terrifying in cybersecurity.\n\n\n\nChaos Computer Club \n\n\n\nThe CCC is Europe's largest hacker association, founded in 1981. They hold an annual conference called the Chaos Communication Congress, and their channel is an archive of the speeches and demonstrations.\n\n\n\nThe Cyber Mentor \n\n\n\nEthical hacker &amp; penetration tester Heath Maverick Adams' channel, with a wealth of information regarding infosec.\n\n\n\nBendobrown \n\n\n\nSimilar to the above, Digital Investigator Benjamin Stricks's channel is practically its own training course in the field.\n\n\n\nSubreddits\n\n\n\nYou know. Forums. Lurk more.\n\n\n\n/r/InfoSec\n\n\n\n/r/NetSec\n\n\n\nIf we've missed something you feel is important, or if you spot something cool that belongs on this list, feel free to throw us a message on any of our social channels!"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fraud-fighters-resource/","url":"https://seon.io/resources/fraud-fighters-resource/","name":"Resources for Fraud Fighters | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-fighters-resource/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","datePublished":"2022-01-11T16:02:11+00:00","dateModified":"2025-04-03T09:33:49+00:00","description":"An eager fraud fighter is someone who submerges themselves into this world. Here are the best anti-fraud resources to get you started.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-fighters-resource/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/iban-lookup/#article","isPartOf":{"@id":"https://seon.io/resources/iban-lookup/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"IBAN Lookup: What Is It And How Does It Help Reduce Fraud?","datePublished":"2022-01-13T11:36:32+00:00","dateModified":"2025-04-30T13:29:12+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/iban-lookup/"},"wordCount":722,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/iban-lookup/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/01/IBAN_lookup_22.01.11_social.png","inLanguage":"en-US","description":"Learn more about IBAN lookup and why it's an effective solution to detect fraud"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/iban-lookup/","url":"https://seon.io/resources/iban-lookup/","name":"IBAN Lookup: What Is It And How Does It Help Reduce Fraud?","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/iban-lookup/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/01/IBAN_lookup_22.01.11_social.png","datePublished":"2022-01-13T11:36:32+00:00","dateModified":"2025-04-30T13:29:12+00:00","description":"Learn more about IBANs, what an IBAN lookup can tell you, and why is it effective to reduce fraud","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/iban-lookup/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/01/IBAN_lookup_22.01.11_social.png","contentUrl":"https://seon.io/wp-content/uploads/2022/01/IBAN_lookup_22.01.11_social.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/risky-business-how-protected-are-us-businesses-against-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/risky-business-how-protected-are-us-businesses-against-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Risky Business: How Protected Are US Businesses Against Fraud?","datePublished":"2022-01-18T14:00:00+00:00","dateModified":"2025-04-03T09:33:24+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/risky-business-how-protected-are-us-businesses-against-fraud/"},"wordCount":1294,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/risky-business-how-protected-are-us-businesses-against-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/01/03-header.jpg","inLanguage":"en-US","description":"Our research on the measures US businesses have in place to prevent fraud."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/risky-business-how-protected-are-us-businesses-against-fraud/","url":"https://seon.io/resources/risky-business-how-protected-are-us-businesses-against-fraud/","name":"Risky Business: How Protected Are US Businesses Against Fraud? - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/risky-business-how-protected-are-us-businesses-against-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/01/03-header.jpg","datePublished":"2022-01-18T14:00:00+00:00","dateModified":"2025-04-03T09:33:24+00:00","description":"What measures do US businesses have in place to help prevent fraudulent activity? And just how protected are they? Read our research.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/risky-business-how-protected-are-us-businesses-against-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/01/03-header.jpg","contentUrl":"https://seon.io/wp-content/uploads/2022/01/03-header.jpg","width":645,"height":222,"caption":"risky business"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-compliance-program/#article","isPartOf":{"@id":"https://seon.io/resources/aml-compliance-program/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"The 5 Pillars of an AML Compliance Program","datePublished":"2022-01-30T08:15:00+00:00","dateModified":"2025-12-24T12:34:19+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-compliance-program/"},"wordCount":672,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-compliance-program/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","inLanguage":"en-US","description":"Establish the steps your company needs to take by implementing an AML compliance program."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/aml-compliance-program/","url":"https://seon.io/resources/aml-compliance-program/","name":"What Is an AML Compliance Program? Key Steps & Tools | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-compliance-program/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","datePublished":"2022-01-30T08:15:00+00:00","dateModified":"2025-12-24T12:34:19+00:00","description":"Build a strong AML compliance program with risk checks, training, and monitoring. See how SEON helps streamline compliance.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-compliance-program/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-toolkit/#article","isPartOf":{"@id":"https://seon.io/resources/aml-toolkit/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"AML Toolkit: What to Know And How to Build Yours","datePublished":"2022-02-08T10:39:00+00:00","dateModified":"2025-05-27T10:10:45+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-toolkit/"},"wordCount":1469,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-toolkit/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2023/02/AML_toolkit_featured.png","keywords":["AML"],"inLanguage":"en-US","description":"Why do you need an AML toolkit, and what should it contain?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-toolkit/","url":"https://seon.io/resources/aml-toolkit/","name":"AML Toolkit: What to Know And How to Build Yours | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-toolkit/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2023/02/AML_toolkit_featured.png","datePublished":"2022-02-08T10:39:00+00:00","dateModified":"2025-05-27T10:10:45+00:00","description":"An AML toolkit includes all the tools, software and features necessary for your company to ensure anti-money laundering compliance – find it here.","mainEntity":[{"@id":"https://seon.io/resources/aml-toolkit/#faq-question-1675329380535"},{"@id":"https://seon.io/resources/aml-toolkit/#faq-question-1675329396318"},{"@id":"https://seon.io/resources/aml-toolkit/#faq-question-1675329397177"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-toolkit/#primaryimage","url":"https://seon.io/wp-content/uploads/2023/02/AML_toolkit_featured.png","contentUrl":"https://seon.io/wp-content/uploads/2023/02/AML_toolkit_featured.png","width":5834,"height":3334,"caption":"AML Toolkit"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-toolkit/#faq-question-1675329380535","position":1,"url":"https://seon.io/resources/aml-toolkit/#faq-question-1675329380535","name":"What is the anti-money laundering clause?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The anti-money laundering clause is set out by the UK’s Proceeds of Crime Act 2002. It is designed to align the implementation of anti-money laundering requirements to meet the EU’s Money Laundering Directive.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-toolkit/#faq-question-1675329396318","position":2,"url":"https://seon.io/resources/aml-toolkit/#faq-question-1675329396318","name":"What are red flags in anti-money laundering?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Identifying money laundering begins by checking for names on databases created by the government and criminal agencies. You also want to look at complex ownership structures, corporate funds used for private spending, and suspicious transactions. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-toolkit/#faq-question-1675329397177","position":3,"url":"https://seon.io/resources/aml-toolkit/#faq-question-1675329397177","name":"What are the three lines of defense in AML?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML defenses can be organized into three blocks that include KYC for identity verification, AML screening to ensure you’re not dealing with high-risk individuals, and transaction monitoring to look at the movement of funds.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/loan-fraud-guide/#article","isPartOf":{"@id":"https://seon.io/resources/loan-fraud-guide/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"Guide to Loan Fraud: Business Risks for Lenders","datePublished":"2022-02-09T08:04:41+00:00","dateModified":"2025-12-24T12:33:27+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/loan-fraud-guide/"},"wordCount":2467,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/loan-fraud-guide/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","inLanguage":"en-US","description":"Let’s see how bad agents exploit the lending process and how to stop them."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/loan-fraud-guide/","url":"https://seon.io/resources/loan-fraud-guide/","name":"What Is Loan Fraud? Business Risks for Lending | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/loan-fraud-guide/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","datePublished":"2022-02-09T08:04:41+00:00","dateModified":"2025-12-24T12:33:27+00:00","description":"Prevent loan fraud with digital footprint analysis. Detect risks, stop bad actors, and streamline onboarding for safer lending.","mainEntity":[{"@id":"https://seon.io/resources/loan-fraud-guide/#faq-question-1688396758899"},{"@id":"https://seon.io/resources/loan-fraud-guide/#faq-question-1688396849544"},{"@id":"https://seon.io/resources/loan-fraud-guide/#faq-question-1741691631590"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/loan-fraud-guide/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/loan-fraud-guide/#faq-question-1688396758899","position":1,"url":"https://seon.io/resources/loan-fraud-guide/#faq-question-1688396758899","name":"How is loan fraud detected?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Loan applicants with malicious intent are detected through a combination of automated data-drive risk assessment, as well as manual review conducted by trained risk professionals. Software handles the detection of any obvious data outliers on online loan applications, noting things like discrepancies in IP geolocation versus the apparent address of the applicant, then the human loan risk assessment team can make the final decision on whether or not to approve the loan, often with follow-up involving a phone call or request for additional information.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/loan-fraud-guide/#faq-question-1688396849544","position":2,"url":"https://seon.io/resources/loan-fraud-guide/#faq-question-1688396849544","name":"What are the legal consequences of loan fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Depending on the type, jurisdiction, and immensity of the fraud, in the US loan fraud can carry a prison term of up to 30 years, and accrue penalty fines of up to $1 million.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/loan-fraud-guide/#faq-question-1741691631590","position":3,"url":"https://seon.io/resources/loan-fraud-guide/#faq-question-1741691631590","name":"How does SEON's anti-fraud solution enhance loan applicant assessments?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"<a href=\"https://seon.io/\">SEON's fraud prevention software</a> goes beyond digital footprint analysis by examining device, location and behavioral data. This approach enables the detection of suspicious devices (like emulators and VPNs), identification of users sharing devices linked to fraudulent activities, and monitoring of user behavior over time to spot anomalies. Additionally, SEON's system can adjust risk scores based on default and custom fields, leveraging whitebox machine learning to enhance fraud detection. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/metaverse-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/metaverse-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"The Metaverse Fraud Question: What Are the Risks?","datePublished":"2022-02-11T16:11:00+00:00","dateModified":"2025-04-30T13:19:32+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/metaverse-fraud/"},"wordCount":2357,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/metaverse-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Metaverse_Fraud_22.02.08_social.png","inLanguage":"en-US","description":"What risks surround the metaverse and how can we protect against metaverse fraud?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/metaverse-fraud/","url":"https://seon.io/resources/metaverse-fraud/","name":"Metaverse Fraud Risks: How It Works & 12 Examples | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/metaverse-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Metaverse_Fraud_22.02.08_social.png","datePublished":"2022-02-11T16:11:00+00:00","dateModified":"2025-04-30T13:19:32+00:00","description":"NFTs and the metaverse are everywhere at the moment. But what are the risks of metaverse fraud? And how do you stop it?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/metaverse-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Metaverse_Fraud_22.02.08_social.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Metaverse_Fraud_22.02.08_social.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ceo-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/ceo-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"How to Spot &amp; Stop CEO Fraud in 2023: Tips and Methods","datePublished":"2022-02-16T05:00:00+00:00","dateModified":"2025-04-03T09:26:10+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ceo-fraud/"},"wordCount":2195,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ceo-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Stopping_CEOFraud_social.png","inLanguage":"en-US","description":"CEO Fraud sees fraudsters impersonate executives to access sensitive information or money - but how do you stop it?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/ceo-fraud/","url":"https://seon.io/resources/ceo-fraud/","name":"How to Prevent CEO Fraud - 5 Best Practice Examples | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ceo-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Stopping_CEOFraud_social.png","datePublished":"2022-02-16T05:00:00+00:00","dateModified":"2025-04-03T09:26:10+00:00","description":"Find out how to detect and prevent CEO fraud style spear-phishing attacks so you can keep your company, employees and clients safe.","mainEntity":[{"@id":"https://seon.io/resources/ceo-fraud/#faq-question-1645091136125"},{"@id":"https://seon.io/resources/ceo-fraud/#faq-question-1645091897921"},{"@id":"https://seon.io/resources/ceo-fraud/#faq-question-1645091904062"},{"@id":"https://seon.io/resources/ceo-fraud/#faq-question-1645091909307"},{"@id":"https://seon.io/resources/ceo-fraud/#faq-question-1645091914584"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ceo-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Stopping_CEOFraud_social.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Stopping_CEOFraud_social.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ceo-fraud/#faq-question-1645091136125","position":1,"url":"https://seon.io/resources/ceo-fraud/#faq-question-1645091136125","name":"Is business email compromise the same as CEO fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Also known as email account compromise, the terms BEC and EAC scam are often used interchangeably with CEO fraud, although there technically can be some small differences. It is also the FBI’s preferred terminology, so you’ll see it often.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ceo-fraud/#faq-question-1645091897921","position":2,"url":"https://seon.io/resources/ceo-fraud/#faq-question-1645091897921","name":"Does CEO fraud still happen in 2023?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It certainly is still a popular means of attack against companies, their funds and their internal data. With new fraud technology, CEO scam methods evolve, but the central idea and goals are similar.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ceo-fraud/#faq-question-1645091904062","position":3,"url":"https://seon.io/resources/ceo-fraud/#faq-question-1645091904062","name":"What do criminals gain from CEO fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Most often, money – in the fraud of wire transfers, gift cards or even company credit card information. But they might also be trying to get business intel to sell to competitors, or access to your IT systems to then conduct other schemes.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ceo-fraud/#faq-question-1645091909307","position":4,"url":"https://seon.io/resources/ceo-fraud/#faq-question-1645091909307","name":"How can SEON help with CEO fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"SEON’s data enrichment module can be set to look up email addresses and phone numbers automatically. Employees can also conduct searches manually. Meanwhile, our fingerprinting, IP and other modes of analysis will also help catch fraudsters pretending to be upper management.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ceo-fraud/#faq-question-1645091914584","position":5,"url":"https://seon.io/resources/ceo-fraud/#faq-question-1645091914584","name":"How do I start fighting back against CEO fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Book a call with one of our customer support team members so we can talk about addressing your particular concerns.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/gen-z-report-online-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/gen-z-report-online-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"The Gen-Z Fraud Report: Young Americans &amp; Fraud","datePublished":"2022-03-04T15:57:26+00:00","dateModified":"2025-04-03T09:26:05+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/gen-z-report-online-fraud/"},"wordCount":1676,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/gen-z-report-online-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","inLanguage":"en-US","description":"How are young Americans and other age groups affected by fraud?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/gen-z-report-online-fraud/","url":"https://seon.io/resources/gen-z-report-online-fraud/","name":"Gen-Z Fraud Report: Fraud by Age Group in the USA - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/gen-z-report-online-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2022-03-04T15:57:26+00:00","dateModified":"2025-04-03T09:26:05+00:00","description":"How is each age group affected by online fraud in the USA? Are young people more resistant? Read the latest figures and comparisons.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/gen-z-report-online-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#article","isPartOf":{"@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"What Is SIM Swapping and How to Prevent It","datePublished":"2022-03-17T17:36:00+00:00","dateModified":"2024-10-30T15:24:49+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/"},"wordCount":1407,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","inLanguage":"en-US","description":"Read more about SIM swap fraud and solutions to protect your business."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/","url":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/","name":"SIM Swapping: What is it & How to Prevent It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2022-03-17T17:36:00+00:00","dateModified":"2024-10-30T15:24:49+00:00","description":"Do you think 2FA can protect you? SIM swap fraudsters think otherwise. Learn all about SIM swap fraud and how to prevent it in this article.","mainEntity":[{"@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#faq-question-1647600400927"},{"@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#faq-question-1647600405483"},{"@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#faq-question-1647600413750"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#faq-question-1647600400927","position":1,"url":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#faq-question-1647600400927","name":"What happens when you get SIM swapped?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A fraudster who SIM swaps your SIM card will take control of your phone number (but not your device), so they can receive SMS on your behalf. It is particularly dangerous as they can receive 2FA and OTP codes to log into your social media, banking, or even ecommerce accounts.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#faq-question-1647600405483","position":2,"url":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#faq-question-1647600405483","name":"How does SIM swap fraud happen?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"SIM swap fraud happens when a bad agent convinces a telco operator to switch a phone number to a new SIM. The victim isn’t aware of it, and the fraudster takes control of the new number. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#faq-question-1647600413750","position":3,"url":"https://seon.io/resources/sim-swap-fraud-and-how-to-prevent-it/#faq-question-1647600413750","name":"Is SIM swapping illegal?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. If you perform a SIM swap, you may be prosecuted and imprisoned. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/online-insurance-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/online-insurance-fraud/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"Insurance Fraud Prevention: How It Works and How to Stop It","datePublished":"2022-03-18T15:28:51+00:00","dateModified":"2026-02-20T16:32:59+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/online-insurance-fraud/"},"wordCount":1795,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/online-insurance-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how insurance fraud prevention stops fake claims before payout. Explore digital footprints and risk strategies for online insurers."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/online-insurance-fraud/","url":"https://seon.io/resources/online-insurance-fraud/","name":"Insurance Fraud Prevention: How It Works and How to Stop It","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/online-insurance-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2022-03-18T15:28:51+00:00","dateModified":"2026-02-20T16:32:59+00:00","description":"Learn how insurance fraud prevention stops fake claims before payout. Explore digital footprints and risk strategies for online insurers.","mainEntity":[{"@id":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604732645"},{"@id":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604770347"},{"@id":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604788202"},{"@id":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604799902"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/online-insurance-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604732645","position":1,"url":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604732645","name":"What is the difference between insurance fraud prevention and detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Prevention stops fraud before it enters the system — at onboarding, during application review or at the payment stage. Detection identifies fraud during or after the claims process. Both are important, but prevention reduces the volume of fraudulent activity that detection has to manage.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604770347","position":2,"url":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604770347","name":"What are the most common types of insurance fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Multi-accounting using stolen identities, intentional damage claims on insured devices, false or exaggerated claims and ghost broker scams are among the most prevalent. The shift to digital insurance platforms has made identity-based fraud significantly easier to execute at scale.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604788202","position":3,"url":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604788202","name":"What happens if you commit insurance fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Insurance fraud is a criminal offense. Consequences can include denied claims, canceled policies, fines, repayment of funds and imprisonment. Individuals may also be flagged within industry databases, making it harder to obtain insurance in the future.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604799902","position":4,"url":"https://seon.io/resources/online-insurance-fraud/#faq-question-1771604799902","name":"How do you detect insurance fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Insurance fraud is detected by analyzing identity, device and behavioral signals across the customer journey. Insurers use tools such as digital footprint analysis, anomaly detection and real-time risk scoring to identify suspicious applications or claims.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-in-banking/#article","isPartOf":{"@id":"https://seon.io/resources/aml-in-banking/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"AML In Banking And Finance: A Guide For Financial Institutions","datePublished":"2022-03-29T08:28:00+00:00","dateModified":"2025-11-05T12:26:40+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-in-banking/"},"wordCount":1632,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-in-banking/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn what AML in banking means, why it’s essential for compliance, and how financial institutions detect and prevent money laundering."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-in-banking/","url":"https://seon.io/resources/aml-in-banking/","name":"AML In Banking And Finance: A Guide For Financial Institutions","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-in-banking/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","datePublished":"2022-03-29T08:28:00+00:00","dateModified":"2025-11-05T12:26:40+00:00","description":"Learn what AML in banking means, why it’s essential for compliance, and how financial institutions detect and prevent money laundering.","mainEntity":[{"@id":"https://seon.io/resources/aml-in-banking/#faq-question-1648049362918"},{"@id":"https://seon.io/resources/aml-in-banking/#faq-question-1648049370961"},{"@id":"https://seon.io/resources/aml-in-banking/#faq-question-1648049377703"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-in-banking/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-in-banking/#faq-question-1648049362918","position":1,"url":"https://seon.io/resources/aml-in-banking/#faq-question-1648049362918","name":"What is the AML process in banking?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML in banking involves verifying the identity of your banking customers, checking that they do not appear on PEP or sanctions lists, and monitoring transactions over a certain threshold.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-in-banking/#faq-question-1648049370961","position":2,"url":"https://seon.io/resources/aml-in-banking/#faq-question-1648049370961","name":"What are AML policies?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML policies are a set of policies that your bank or neobank must clearly state regarding anti-money-laundering checks. You must write and publish an AML policy statement on your website.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-in-banking/#faq-question-1648049377703","position":3,"url":"https://seon.io/resources/aml-in-banking/#faq-question-1648049377703","name":"What tools can help with banking AML?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Banking AML checks can be performed with identity verification tools, transaction monitoring tools, and risk rating and alert solutions. Machine learning tools can also help suggest rules that reduce the risk of dealing with money laundering customers. <br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/buy-now-pay-later-global-trends/#article","isPartOf":{"@id":"https://seon.io/resources/buy-now-pay-later-global-trends/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"BNPL Global Trends in 2023","datePublished":"2022-04-04T08:05:00+00:00","dateModified":"2025-04-03T09:25:53+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/buy-now-pay-later-global-trends/"},"wordCount":1158,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/buy-now-pay-later-global-trends/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/03/Social-Header.png","inLanguage":"en-US","description":"How has the use of BNPL has changed in recent years?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/buy-now-pay-later-global-trends/","url":"https://seon.io/resources/buy-now-pay-later-global-trends/","name":"Buy Now Pay Later (BNPL) Global Trends in 2022 | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/buy-now-pay-later-global-trends/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/03/Social-Header.png","datePublished":"2022-04-04T08:05:00+00:00","dateModified":"2025-04-03T09:25:53+00:00","description":"Buy Now Pay Later is becoming one of the most popular alternative payments methods. Read about the current state of the industry and BNPL fraud.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/buy-now-pay-later-global-trends/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/03/Social-Header.png","contentUrl":"https://seon.io/wp-content/uploads/2022/03/Social-Header.png","width":1920,"height":1080}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/bank-account-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/bank-account-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"5 Types of Bank Account Fraud – And How to Prevent Them","datePublished":"2022-04-05T08:45:00+00:00","dateModified":"2025-04-29T17:42:00+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/bank-account-fraud/"},"wordCount":1948,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/bank-account-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/04/5_types_of_bank_account_fraud.png","keywords":["Account Takeover"],"inLanguage":"en-US","description":"A breakdown of the most common techniques and prevention methods."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/bank-account-fraud/","url":"https://seon.io/resources/bank-account-fraud/","name":"5 Types of Bank Account Fraud – And How to Prevent Them - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/bank-account-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/04/5_types_of_bank_account_fraud.png","datePublished":"2022-04-05T08:45:00+00:00","dateModified":"2025-04-29T17:42:00+00:00","description":"There's a range of methods that fraudsters use to gain access to bank accounts. This article dives into the most common ones and how to prevent them.","mainEntity":[{"@id":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805609835"},{"@id":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805619094"},{"@id":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805623134"},{"@id":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805632533"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/bank-account-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/04/5_types_of_bank_account_fraud.png","contentUrl":"https://seon.io/wp-content/uploads/2022/04/5_types_of_bank_account_fraud.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805609835","position":1,"url":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805609835","name":"How can I protect my bank account?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Make sure you have a strong password and login security in place. Be extra vigilant with unusual messages via SMS or email. Double-check every payment to an unknown source. If possible, enable a security phrase that your bank will include in every communication. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805619094","position":2,"url":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805619094","name":"How do fraudsters access bank accounts?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraudsters use social engineering and phishing techniques to get you to give them your bank account login details. They often create fake websites and communication that looks official. They are designed to capture your login details for an account takeover.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805623134","position":3,"url":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805623134","name":"What happens after a bank transfer scam?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Sadly, there is very little you can do to get your money back after a wire fraud scam. While you should immediately contact your bank, it may be powerless to refund you, unlike with a fraudulent card payment. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805632533","position":4,"url":"https://seon.io/resources/bank-account-fraud/#faq-question-1648805632533","name":"How to report bank account fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"First, make sure to create a claim with your bank. You can also contact the local authorities and victim support websites to create a paper trail of your claim, usually with a crime reference number.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-checklist/#article","isPartOf":{"@id":"https://seon.io/resources/aml-checklist/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"AML Checklist + SAR and Policy Forms","datePublished":"2022-04-05T08:53:26+00:00","dateModified":"2025-07-29T14:51:35+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-checklist/"},"wordCount":1801,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-checklist/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","keywords":["AML"],"inLanguage":"en-US","description":"A step-by-step guide to  setting up an AML checklist."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-checklist/","url":"https://seon.io/resources/aml-checklist/","name":"AML Checklist + SAR and Policy Forms - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-checklist/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2022-04-05T08:53:26+00:00","dateModified":"2025-07-29T14:51:35+00:00","description":"Our easy-to-read and actionable step-by-step guide to what you should consider when setting up an AML framework and processes - plus SAR and policy forms.","mainEntity":[{"@id":"https://seon.io/resources/aml-checklist/#faq-question-1647963048147"},{"@id":"https://seon.io/resources/aml-checklist/#faq-question-1647963068632"},{"@id":"https://seon.io/resources/aml-checklist/#faq-question-1647963077052"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-checklist/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-checklist/#faq-question-1647963048147","position":1,"url":"https://seon.io/resources/aml-checklist/#faq-question-1647963048147","name":"What are AML requirements?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML requirements are set by governments to ensure businesses do not help money laundering. They include a form of identity verification, PEP and sanctions check, and transaction monitoring.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-checklist/#faq-question-1647963068632","position":2,"url":"https://seon.io/resources/aml-checklist/#faq-question-1647963068632","name":"What is an AML policy?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An AML policy must be stated on your company website or in communications with customers. See our articles for a complete AML policy template.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-checklist/#faq-question-1647963077052","position":3,"url":"https://seon.io/resources/aml-checklist/#faq-question-1647963077052","name":"What is a SAR?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A SAR, or Suspicious Activity Report, must be submitted to authorities when you suspect you may be dealing with money laundering. See our article for a downloadable SAR template.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/kyc-checklist/#article","isPartOf":{"@id":"https://seon.io/resources/kyc-checklist/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"KYC Checklist: Template for Your Business","datePublished":"2022-04-11T08:39:50+00:00","dateModified":"2026-02-04T12:30:34+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/kyc-checklist/"},"wordCount":1201,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/kyc-checklist/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","inLanguage":"en-US","description":"Learn more about KYC frameworks and how you can build a frictionless onboarding process."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/kyc-checklist/","url":"https://seon.io/resources/kyc-checklist/","name":"KYC Checklist: Template Guide for Your Business | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-checklist/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2022-04-11T08:39:50+00:00","dateModified":"2026-02-04T12:30:34+00:00","description":"This downloadable checklist and guide give a clear overview of what businesses should look to implement when building a KYC framework and its key aspects.","mainEntity":[{"@id":"https://seon.io/resources/kyc-checklist/#faq-question-1688398328872"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/kyc-checklist/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-checklist/#faq-question-1688398328872","position":1,"url":"https://seon.io/resources/kyc-checklist/#faq-question-1688398328872","name":"What is a KYC checklist?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A KYC checklist is a best-practice framework for internal compliance teams to follow to help their organizations steer clear of violating safety mandates. These mandates are subject to frequent change, as do the resources that need to be referenced as part of KYC due diligence, so keeping an updated process checklist is essential.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#article","isPartOf":{"@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"How Do Fraudsters Open Bank Accounts?","datePublished":"2022-04-13T12:32:05+00:00","dateModified":"2025-04-30T13:15:48+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/"},"wordCount":1563,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/04/How-do-fraudsters-open-bank-accounts_2_featured.png","inLanguage":"en-US","description":"Understand how fraudsters create bank accounts, and read how to stop them."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/","url":"https://seon.io/resources/how-fraudsters-open-bank-accounts/","name":"How Do Fraudsters Open Bank Accounts? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/04/How-do-fraudsters-open-bank-accounts_2_featured.png","datePublished":"2022-04-13T12:32:05+00:00","dateModified":"2025-04-30T13:15:48+00:00","description":"Find out exactly how fraudsters open bank accounts to launder money and what you can do to stop this method, protecting your bank or fintech.","mainEntity":[{"@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396422256"},{"@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396446127"},{"@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396465055"},{"@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396472066"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/04/How-do-fraudsters-open-bank-accounts_2_featured.png","contentUrl":"https://seon.io/wp-content/uploads/2022/04/How-do-fraudsters-open-bank-accounts_2_featured.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396422256","position":1,"url":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396422256","name":"Can someone steal your identity and open a bank account?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Unfortunately, if your identity is stolen, including personal identifying information, or a copy of a government-issued ID, it is possible that a fraudster might be able to open an account in your name and use it for nefarious purposes. This is especially true of bank accounts that exist solely online, where stolen digital identities are more easily used to sign up. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396446127","position":2,"url":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396446127","name":"What bank details do fraudsters need to open an account in your name?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If a fraudster is armed with your stolen personal information, including your name, address, sensitive data like social security numbers, AND they have hacked into your email account, it is possible that they can access your account and drain it of funds, or potentially open an account impersonating you. This is especially true if no form of multi-factor authentication exists that sends an alert to your mobile device when someone attempts to access your bank account from an unknown location.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396465055","position":3,"url":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396465055","name":"What is the most common form of loan fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Application fraud is the most common, and potentially the least malicious form of loan fraud. It may include lying about assets to get better terms on a loan, but can range in severity to impersonating another person to take out a loan with no intention of repaying it.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396472066","position":4,"url":"https://seon.io/resources/how-fraudsters-open-bank-accounts/#faq-question-1688396472066","name":"What should you do if your bank account gets hacked?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Though the bank will ultimately be liable for unauthorized payments made from a hacked account, you should report fraudulent transactions as soon as possible to mitigate further damage and inconvenience. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-transaction-monitoring/#article","isPartOf":{"@id":"https://seon.io/resources/aml-transaction-monitoring/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"What Is Transaction Monitoring in AML &amp; Its Importance","datePublished":"2022-04-25T15:00:13+00:00","dateModified":"2026-04-14T08:57:13+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-transaction-monitoring/"},"wordCount":1852,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-transaction-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how real-time AML transaction monitoring helps detect suspicious activity. Use automation to boost compliance and cut risk.","keywords":["Transaction Monitoring"]}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-transaction-monitoring/","url":"https://seon.io/resources/aml-transaction-monitoring/","name":"What Is AML Transaction Monitoring & Why It Matters","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-transaction-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","datePublished":"2022-04-25T15:00:13+00:00","dateModified":"2026-04-14T08:57:13+00:00","description":"Learn what AML transaction monitoring is, why it’s essential for compliance, and how real-time systems detect suspicious activity.","mainEntity":[{"@id":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1758808506644"},{"@id":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1648543362057"},{"@id":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1758808615301"},{"@id":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1773245707619"},{"@id":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1776157012128"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-transaction-monitoring/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1758808506644","position":1,"url":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1758808506644","name":"What AML typologies can be detected through transaction monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Transaction monitoring helps identify key AML typologies such as structuring, layering, mule activity, high-risk jurisdiction transfers and sudden account behavior changes. By analyzing transaction patterns, customer history and contextual data, institutions can detect abnormal movements that may indicate money laundering or other financial crimes.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1648543362057","position":2,"url":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1648543362057","name":"What global regulations govern AML transaction monitoring, and what are the penalties for non-compliance?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Global AML regulations, such as the FATF Recommendations, the <a href=\"https://finance.ec.europa.eu/financial-crime/eu-anti-money-laundering-policy_en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">EU AML Directives</a>, and the U.S. Bank Secrecy Act, require financial institutions to monitor transactions for suspicious activity. Failure to implement effective monitoring can result in significant penalties, including multimillion-dollar fines, regulatory sanctions and even criminal liability for compliance failures. Regulators like <a href=\"https://www.fincen.gov/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">FinCEN</a>, the <a href=\"https://www.eba.europa.eu/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">European Banking Authority</a> and the <a href=\"https://www.fca.org.uk/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">UK's FCA</a> actively enforce these obligations worldwide.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1758808615301","position":3,"url":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1758808615301","name":"What are examples of suspicious activity detected by AML transaction monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML transaction monitoring detects financial behaviors that may indicate money laundering, fraud, or terrorist financing — such as large or frequent cash deposits, transfers just below reporting thresholds, or movements involving high-risk jurisdictions. Automated <a href=\"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/\">transaction monitoring tools</a> help uncover these patterns efficiently across large transaction volumes.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1773245707619","position":4,"url":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1773245707619","name":"What role does transaction monitoring play in AML compliance?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Transaction monitoring is the primary mechanism for detecting suspicious activity on an ongoing basis. It connects the initial risk assessment performed during customer onboarding with continuous oversight throughout the customer relationship, supporting the identification and reporting of potential financial crime.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1776157012128","position":5,"url":"https://seon.io/resources/aml-transaction-monitoring/#faq-question-1776157012128","name":"How does transaction monitoring work in banks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Banks apply transaction monitoring across high volumes of retail and corporate activity. Retail accounts are typically monitored for structuring and unusual cash patterns, while corporate accounts are screened for anomalous cross-border transfers and trade finance flows. Banks are subject to direct regulatory examination of their monitoring programs, making consistent alert handling and documented audit trails especially important.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/#article","isPartOf":{"@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Fraud Rings: How to Spot, Detect and Prevent Them Online","datePublished":"2022-04-26T10:00:17+00:00","dateModified":"2025-04-03T09:15:45+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/"},"wordCount":2188,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","inLanguage":"en-US","description":"Fraud rings cause even more harm than individual fraudster accounts – find how to stop them."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/","url":"https://seon.io/resources/detect-and-prevent-fraud-ring/","name":"Fraud Rings: How to Detect and Prevent Them Online","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","datePublished":"2022-04-26T10:00:17+00:00","dateModified":"2025-04-03T09:15:45+00:00","description":"A fraud ring is an organized group of fraudsters. With more hands on board, they can do much more harm. So, how can your company stop them?","mainEntity":[{"@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/#faq-question-1650643709228"},{"@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/#faq-question-1650644037389"},{"@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/#faq-question-1650644051907"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/#faq-question-1650643709228","position":1,"url":"https://seon.io/resources/detect-and-prevent-fraud-ring/#faq-question-1650643709228","name":"How can you tell you're targeted by a fraud ring vs one fraudster?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A fraud ring is simply a group of fraudsters sharing resources to commit fraudulent acts. It is hard to distinguish between fraud rings and one fraudster targeting companies under multiple aliases. However, once apprehended, it often becomes more clear whether you were dealing with one person or multiple accomplices by looking at the methods they're using.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/#faq-question-1650644037389","position":2,"url":"https://seon.io/resources/detect-and-prevent-fraud-ring/#faq-question-1650644037389","name":"What do fraud rings target?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"There are as many types of fraud rings as there are types of fraud. Over the years, authorities have caught fraud rings specializing in romance scams, account takeover, and SIM jacking. What they all have in common is that they pool resources to coordinate and automate attacks at scale.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/detect-and-prevent-fraud-ring/#faq-question-1650644051907","position":3,"url":"https://seon.io/resources/detect-and-prevent-fraud-ring/#faq-question-1650644051907","name":"How do you catch fraud rings?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Like multi-accounting, you can detect fraud rings by identifying patterns in your fraudulent users. It may be that they often hide behind the same VPN or use a rotation of similar devices. In one of our use cases at SEON, we found that similar email addresses and ISPs could point to fraud rings, for example.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#article","isPartOf":{"@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/"},"author":{"name":"Christina Brichetto","@id":"https://seon.io/#/schema/person/78a49f752b06e61f2f524036856e0ab7"},"headline":"KYC and AML for Buy Now Pay Later (BNPL)","datePublished":"2022-04-28T09:20:18+00:00","dateModified":"2025-04-16T18:01:55+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/"},"wordCount":1960,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","keywords":["AML","KYC"],"inLanguage":"en-US","description":"How do KYC and AML mandates apply to BNPL and how can you avoid the risks?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/","url":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/","name":"KYC and AML for Buy Now Pay Later (BNPL) - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","datePublished":"2022-04-28T09:20:18+00:00","dateModified":"2025-04-16T18:01:55+00:00","description":"If you run a BNPL company, you have to stay on top of KYC and AML requirements. It is now your legal obligation – but you can learn to do it right.","mainEntity":[{"@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#faq-question-1651228744323"},{"@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#faq-question-1651228764047"},{"@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#faq-question-1651228777370"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#faq-question-1651228744323","position":1,"url":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#faq-question-1651228744323","name":"Do BNPL companies need KYC and AML checks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. While the success of the BNPL industry took everyone by surprise, regulators have now realized that it could facilitate fraud and money laundering. You now have to meet local KYC and AML checks.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#faq-question-1651228764047","position":2,"url":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#faq-question-1651228764047","name":"How do you deploy KYC and AML for a BNPL?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To remain competitive, BNPL companies need to reduce user friction as much as possible. This is why KYC and AML checks would ideally be performed behind the scenes, using alternative data. By deploying data enrichment modules at the onboarding stage, you can learn more about users using a single email address, phone number, or IP address.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#faq-question-1651228777370","position":3,"url":"https://seon.io/resources/kyc-and-aml-for-buy-now-pay-later/#faq-question-1651228777370","name":"What is AML transaction monitoring for BNPL?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"<a href=\"https://seon.io/resources/aml-transaction-monitoring/\">AML Transaction monitoring</a> is a key feature of the anti-money laundering process, which ensures you check how much your customers spend. <a href=\"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/\" target=\"_blank\" rel=\"noreferrer noopener\">Transaction monitoring software</a> logs large purchases over a certain amount, to decrease the risk of money laundering.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/us-igaming-industry-learn-from-uk/#article","isPartOf":{"@id":"https://seon.io/resources/us-igaming-industry-learn-from-uk/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"What Can the US iGaming Industry Learn from UK Operators?","datePublished":"2022-05-03T14:39:50+00:00","dateModified":"2025-01-29T09:18:51+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/us-igaming-industry-learn-from-uk/"},"wordCount":1312,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/us-igaming-industry-learn-from-uk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","inLanguage":"en-US","description":"Read intel and tips from UK iGaming operators to help fight fraud."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/us-igaming-industry-learn-from-uk/","url":"https://seon.io/resources/us-igaming-industry-learn-from-uk/","name":"What Can the US iGaming Industry Learn from UK Operators? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/us-igaming-industry-learn-from-uk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2022-05-03T14:39:50+00:00","dateModified":"2025-01-29T09:18:51+00:00","description":"The US online gambling market is similar to where the UK was “a decade ago” but it has the opportunity to strengthen its strategy. Read actionable advice.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/us-igaming-industry-learn-from-uk/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/industry-fraud-index/#article","isPartOf":{"@id":"https://seon.io/resources/industry-fraud-index/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Industry Fraud Index: Which Industries Are Most at Risk?","datePublished":"2022-05-07T12:00:00+00:00","dateModified":"2024-05-29T11:43:47+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/industry-fraud-index/"},"wordCount":1257,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/industry-fraud-index/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/04/Blog-Header.png","inLanguage":"en-US","description":"Our research on industries that have seen the biggest increase in fraud."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/industry-fraud-index/","url":"https://seon.io/resources/industry-fraud-index/","name":"Industry Fraud Index: Which Industries Are Most at Risk? - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/industry-fraud-index/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/04/Blog-Header.png","datePublished":"2022-05-07T12:00:00+00:00","dateModified":"2024-05-29T11:43:47+00:00","description":"We picked apart ACFE Reports to uncover which industries have suffered the largest increase in fraud schemes in the past few years – and why.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/industry-fraud-index/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/04/Blog-Header.png","contentUrl":"https://seon.io/wp-content/uploads/2022/04/Blog-Header.png","width":1920,"height":1080}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/kyc-in-crypto/#article","isPartOf":{"@id":"https://seon.io/resources/kyc-in-crypto/"},"author":{"name":"Agnes Csoka","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6"},"headline":"KYC in Crypto: What is It &amp; Why It&#8217;s Important","datePublished":"2022-05-10T08:14:00+00:00","dateModified":"2026-02-04T12:28:08+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/kyc-in-crypto/"},"wordCount":1323,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/kyc-in-crypto/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Discover the unique challenges of KYC in crypto and learn best practices to balance user experience with regulatory requirements."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/kyc-in-crypto/","url":"https://seon.io/resources/kyc-in-crypto/","name":"KYC in Crypto: Best Practices & Challenges | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-in-crypto/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2022-05-10T08:14:00+00:00","dateModified":"2026-02-04T12:28:08+00:00","description":"Discover the unique challenges of KYC in crypto and learn best practices to balance user experience with regulatory requirements.","mainEntity":[{"@id":"https://seon.io/resources/kyc-in-crypto/#faq-question-1649256709547"},{"@id":"https://seon.io/resources/kyc-in-crypto/#faq-question-1691070345770"},{"@id":"https://seon.io/resources/kyc-in-crypto/#faq-question-1672750088897"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/kyc-in-crypto/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-in-crypto/#faq-question-1649256709547","position":1,"url":"https://seon.io/resources/kyc-in-crypto/#faq-question-1649256709547","name":"Why do crypto exchanges ask for KYC?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Crypto exchanges have to verify IDs and perform KYC checks as a legal requirement. They face hefty fines from authorities if they don’t, regardless of where they are based.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-in-crypto/#faq-question-1691070345770","position":2,"url":"https://seon.io/resources/kyc-in-crypto/#faq-question-1691070345770","name":"What is identity verification (IDV) in crypto?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"IDV verification in cryptocurrency is the process by which crypto exchanges check the official ID documents and proof of address of new customers in order to be certain that these individuals are who they say they are. IDV is one of the main KYC requirements in cryptocurrency.<br />This can involve asking them to upload scans of their passports or driver's licenses, for example, or to join a video chat with an agent who will ask them to speak their name and show these documents to the camera.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-in-crypto/#faq-question-1672750088897","position":3,"url":"https://seon.io/resources/kyc-in-crypto/#faq-question-1672750088897","name":"Do crypto wallets need KYC?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No, crypto wallets do not need to conduct KYC on their customers. However, crypto exchanges who also provide wallets will need to do KYC, unless they keep the two products entirely separate. What's more, certain wallet operators may choose to do KYC proactively. As a consumer, you can choose to use a crypto wallet that does not require KYC compliance, or one that does.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/proxy-detection-via-api/#article","isPartOf":{"@id":"https://seon.io/resources/proxy-detection-via-api/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"Proxy Detection Tool: How It Works and Why It Matters","datePublished":"2022-05-11T12:22:08+00:00","dateModified":"2026-01-07T11:35:41+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/proxy-detection-via-api/"},"wordCount":2454,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/proxy-detection-via-api/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how proxy detection works and how to detect anonymized IPs, proxies, and VPNs using IP intelligence and device fingerprinting."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/proxy-detection-via-api/","url":"https://seon.io/resources/proxy-detection-via-api/","name":"Proxy Detection Tool: How It Works and Why It Matters","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/proxy-detection-via-api/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","datePublished":"2022-05-11T12:22:08+00:00","dateModified":"2026-01-07T11:35:41+00:00","description":"Learn how proxy detection works, why fraudsters use proxies and VPNs, and how to detect anonymized IPs with IP intelligence and device fingerprinting.","mainEntity":[{"@id":"https://seon.io/resources/proxy-detection-via-api/#faq-question-1671540487803"},{"@id":"https://seon.io/resources/proxy-detection-via-api/#faq-question-1671544451526"},{"@id":"https://seon.io/resources/proxy-detection-via-api/#faq-question-1671544625903"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/proxy-detection-via-api/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/proxy-detection-via-api/#faq-question-1671540487803","position":1,"url":"https://seon.io/resources/proxy-detection-via-api/#faq-question-1671540487803","name":"How do hackers bypass proxy detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Hackers can use a variety of techniques to bypass proxy detection, from built-in browser tools to paid residential proxies and VPNs. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/proxy-detection-via-api/#faq-question-1671544451526","position":2,"url":"https://seon.io/resources/proxy-detection-via-api/#faq-question-1671544451526","name":"How accurate is proxy detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Proxy detection can be extremely accurate if you rely on more than one detection technique at once. Because proxies always modify the connection details in one way or another, a webRTC test or latency test can reveal when a proxy is in use.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/proxy-detection-via-api/#faq-question-1671544625903","position":3,"url":"https://seon.io/resources/proxy-detection-via-api/#faq-question-1671544625903","name":"Can you detect if an IP address is a proxy?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, proxy detection is possible based on a variety of techniques, such as webRTC tests or open port pings. The idea is to look for suspicious delays in data delivery compared with a standard connection. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/cost-of-kyc/#article","isPartOf":{"@id":"https://seon.io/resources/cost-of-kyc/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Keeping the Cost of KYC in Check: Stop Paying for Fraudsters to Fail Your KYC","datePublished":"2022-05-12T07:22:10+00:00","dateModified":"2025-12-24T12:41:55+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/cost-of-kyc/"},"wordCount":848,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/cost-of-kyc/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/05/Keeping-the-Cost-of-KYC-in-Check-Stop-Paying-for-Fraudsters-to-Fail-Your-KYC.png","keywords":["KYC"],"articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Lower KYC costs and improve onboarding by filtering fraudsters before verification. Discover smarter pre-KYC fraud detection strategies."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/cost-of-kyc/","url":"https://seon.io/resources/cost-of-kyc/","name":"Keeping KYC Costs in Check: Stop Paying for Fraudsters","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/cost-of-kyc/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/05/Keeping-the-Cost-of-KYC-in-Check-Stop-Paying-for-Fraudsters-to-Fail-Your-KYC.png","datePublished":"2022-05-12T07:22:10+00:00","dateModified":"2025-12-24T12:41:55+00:00","description":"Lower KYC costs and improve onboarding by filtering fraudsters before verification. Discover smarter pre-KYC fraud detection strategies.","mainEntity":[{"@id":"https://seon.io/resources/cost-of-kyc/#faq-question-1651167274201"},{"@id":"https://seon.io/resources/cost-of-kyc/#faq-question-1651167310795"},{"@id":"https://seon.io/resources/cost-of-kyc/#faq-question-1651167324642"},{"@id":"https://seon.io/resources/cost-of-kyc/#faq-question-1729007914983"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/cost-of-kyc/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/05/Keeping-the-Cost-of-KYC-in-Check-Stop-Paying-for-Fraudsters-to-Fail-Your-KYC.png","contentUrl":"https://seon.io/wp-content/uploads/2022/05/Keeping-the-Cost-of-KYC-in-Check-Stop-Paying-for-Fraudsters-to-Fail-Your-KYC.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/cost-of-kyc/#faq-question-1651167274201","position":1,"url":"https://seon.io/resources/cost-of-kyc/#faq-question-1651167274201","name":"How can you reduce the cost of KYC?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Reducing KYC costs starts with early fraud filtering. Pre-KYC screening prevents high-risk individuals from reaching costly verification stages, while tools like device intelligence and behavioral data detect fraud early. Automating parts of the process lowers labor costs, reduces errors, and accelerates verifications, streamlining workflows and focusing on genuine customers.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/cost-of-kyc/#faq-question-1651167310795","position":2,"url":"https://seon.io/resources/cost-of-kyc/#faq-question-1651167310795","name":"Why is KYC so expensive?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"KYC and compliance in general require companies to hire specialists, deploy software, and dedicate more resources to managing identity verification. To make matters worse, the KYC process can also add friction that drives potential customers away by creating churn. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/cost-of-kyc/#faq-question-1651167324642","position":3,"url":"https://seon.io/resources/cost-of-kyc/#faq-question-1651167324642","name":"How can I pay less for KYC?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"While KYC software is a great first step, you can also deploy pre-KYC checks that help immediately filter out junk users – saving you on official, costly KYC checks. For instance, by looking at alternative digital data, you can start spotting bad users as soon as they begin the onboarding process. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/cost-of-kyc/#faq-question-1729007914983","position":4,"url":"https://seon.io/resources/cost-of-kyc/#faq-question-1729007914983","name":"How much does KYC cost?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The cost of KYC can vary significantly depending on several factors, including the method used (manual vs. automated), the technology adopted, the volume of verifications processed and the compliance requirements in different regions. Direct costs typically include identity verification software, processing fees and staff training, while Indirect costs, such as time spent on manual reviews, failed verifications and compliance management, can also add up quickly, impacting overall profitability.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/referral-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/referral-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Referral Fraud: Stop Fraudsters from Wasting Your Marketing Dollars","datePublished":"2022-05-16T10:55:42+00:00","dateModified":"2025-12-24T12:38:57+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/referral-fraud/"},"wordCount":2160,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/referral-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","inLanguage":"en-US","description":"Let’s see how referral fraud works and  how to prevent it today."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/referral-fraud/","url":"https://seon.io/resources/referral-fraud/","name":"Referral Fraud: How It Works And How To Prevent It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/referral-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","datePublished":"2022-05-16T10:55:42+00:00","dateModified":"2025-12-24T12:38:57+00:00","description":"If you implement a referral marketing strategy to spread the word about products or services, you should ensure fraudsters don’t abuse your referral program.","mainEntity":[{"@id":"https://seon.io/resources/referral-fraud/#faq-question-1688398579701"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/referral-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/referral-fraud/#faq-question-1688398579701","position":1,"url":"https://seon.io/resources/referral-fraud/#faq-question-1688398579701","name":"Is referral fraud illegal?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Referral fraud, like all forms of fraud, is illegal in most jurisdictions. The act of participating in a company’s advertisement referral program, then forcing either illegal or ill-gotten traffic through the paid gateways is an illegal violation of the terms of the affiliate contract that insists on legitimate traffic that potentially leads to a conversion. As most referral fraudsters operate through shell companies and are digitally distributed, enforcement and punishment is rare and difficult, but cases do sometimes result in fines, recompensation, or in some cases even imprisonment.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-kyc-in-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/aml-kyc-in-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"KYC &amp; AML in Online Gambling: How to Stay Compliant","datePublished":"2022-05-17T09:59:59+00:00","dateModified":"2026-04-13T16:41:49+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-kyc-in-igaming/"},"wordCount":1337,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-kyc-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","keywords":["AML","KYC"],"inLanguage":"en-US","description":"Explore how KYC and AML shape online gambling. Get essential compliance tips, smart tools, and ways to stay secure without losing players."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-kyc-in-igaming/","url":"https://seon.io/resources/aml-kyc-in-igaming/","name":"KYC & AML in Online Gambling: Key Insights for Operators | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-kyc-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2022-05-17T09:59:59+00:00","dateModified":"2026-04-13T16:41:49+00:00","description":"Explore how KYC and AML shape online gambling. Get essential compliance tips, smart tools, and ways to stay secure without losing players.","mainEntity":[{"@id":"https://seon.io/resources/aml-kyc-in-igaming/#faq-question-1712920200155"},{"@id":"https://seon.io/resources/aml-kyc-in-igaming/#faq-question-1712920213314"},{"@id":"https://seon.io/resources/aml-kyc-in-igaming/#faq-question-1747739558734"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-kyc-in-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-kyc-in-igaming/#faq-question-1712920200155","position":1,"url":"https://seon.io/resources/aml-kyc-in-igaming/#faq-question-1712920200155","name":"How does KYC differ for online casinos compared to other sectors?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"KYC in online casinos is tailored to address the sector's unique risks, such as frequent large transactions and rapid bankroll fluctuations, which heighten money laundering concerns. This makes the KYC process more rigorous compared to other industries, where financial activities are more stable.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-kyc-in-igaming/#faq-question-1712920213314","position":2,"url":"https://seon.io/resources/aml-kyc-in-igaming/#faq-question-1712920213314","name":"What happens if a gambling platform does not comply with KYC and AML regulations?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Non-compliance with KYC and AML regulations can lead to severe penalties for gambling platforms, including hefty fines and license revocation, in addition to player dissatisfaction, user churn, negative publicity, and hindered growth.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-kyc-in-igaming/#faq-question-1747739558734","position":3,"url":"https://seon.io/resources/aml-kyc-in-igaming/#faq-question-1747739558734","name":"What Is AML in online gambling?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML (Anti-Money Laundering) in online gambling refers to measures that prevent platforms from being used to hide or move illicit funds. This includes monitoring transactions, verifying users and reporting suspicious activity.<br/>Since real-money gaming often involves large and fast-moving sums, it can attract money launderers and money mules. <a href=\"https://seon.io/resources/aml-verification/\">AML verification</a> helps detect and block such activity to ensure legal compliance and platform integrity.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/bot-detection/#article","isPartOf":{"@id":"https://seon.io/resources/bot-detection/"},"author":{"name":"Dora Pinter","@id":"https://seon.io/#/schema/person/83524103262f8afb1f0587a7c27b7334"},"headline":"Bot Detection: What It Is &amp; Its Importance","datePublished":"2022-05-23T07:50:48+00:00","dateModified":"2026-02-24T11:41:23+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/bot-detection/"},"wordCount":1592,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/bot-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"What is bot detection? Learn the main signals and techniques used to detect and mitigate bad bots."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/bot-detection/","url":"https://seon.io/resources/bot-detection/","name":"Bot Detection: What It Is & Its Importance in 2025","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/bot-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","datePublished":"2022-05-23T07:50:48+00:00","dateModified":"2026-02-24T11:41:23+00:00","description":"What is bot detection? Learn the main signals and techniques used to detect and mitigate bad bots.","mainEntity":[{"@id":"https://seon.io/resources/bot-detection/#faq-question-1653291742790"},{"@id":"https://seon.io/resources/bot-detection/#faq-question-1653291761214"},{"@id":"https://seon.io/resources/bot-detection/#faq-question-1752573387576"},{"@id":"https://seon.io/resources/bot-detection/#faq-question-1752573405086"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/bot-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bot-detection/#faq-question-1653291742790","position":1,"url":"https://seon.io/resources/bot-detection/#faq-question-1653291742790","name":"How do you deploy bot detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Bot detection starts with gathering data about your user’s behavior and connection. By looking at whether they connect with proxies, VPNs, or Tor, you can increase suspicions. Emulators and virtual machines should also raise red flags. Then you need to compare such data and user actions with others to spot patterns. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bot-detection/#faq-question-1653291761214","position":2,"url":"https://seon.io/resources/bot-detection/#faq-question-1653291761214","name":"How do you know if an IP is a bot?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An IP address isn’t usually enough to let you know if you’re dealing with a bot or not. However, you can assess whether it points to a VPN, proxy or Tor browser. This can help you raise red flags, depending on the user’s behavior. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bot-detection/#faq-question-1752573387576","position":3,"url":"https://seon.io/resources/bot-detection/#faq-question-1752573387576","name":"Can an IP address reveal a bot?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Not directly. An IP address alone won’t confirm whether you're dealing with a bot, but it can provide useful context. If the IP is linked to a known proxy, VPN, data center or Tor exit node, that’s a signal worth investigating, especially when combined with behavioral data like high-speed clicks, repeated login attempts or identical browser fingerprints across multiple accounts.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bot-detection/#faq-question-1752573405086","position":4,"url":"https://seon.io/resources/bot-detection/#faq-question-1752573405086","name":"How do I find a bot?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The easiest way to block bots is to enable CAPTCHAs. However, it won’t stop the more sophisticated bots. To block those, you need to enable a combination of data enrichment (to learn more about how they connect to your site) and velocity rules (to understand their online behavior).","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/high-value-customers/#article","isPartOf":{"@id":"https://seon.io/resources/high-value-customers/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"High-Value Customers: How to Find Them to Boost Revenue","datePublished":"2022-05-26T12:38:16+00:00","dateModified":"2026-04-02T12:49:38+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/high-value-customers/"},"wordCount":1659,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/high-value-customers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","inLanguage":"en-US","description":"High-value customers will boost your revenue – and SEON can help you find them."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/high-value-customers/","url":"https://seon.io/resources/high-value-customers/","name":"High-Value Customers: How to Find Them to Boost Revenue - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/high-value-customers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2022-05-26T12:38:16+00:00","dateModified":"2026-04-02T12:49:38+00:00","description":"A high-value customer will significantly impact your bottom line. Many businesses identify them after a sale – but there are ways to do it earlier.","mainEntity":[{"@id":"https://seon.io/resources/high-value-customers/#faq-question-1653046976890"},{"@id":"https://seon.io/resources/high-value-customers/#faq-question-1653046988934"},{"@id":"https://seon.io/resources/high-value-customers/#faq-question-1653046990413"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/high-value-customers/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/high-value-customers/#faq-question-1653046976890","position":1,"url":"https://seon.io/resources/high-value-customers/#faq-question-1653046976890","name":"How do you identify high-value customers?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"You can identify high-value customers by keeping data logs relating to their interactions with your business. Monitoring KPIs, transactions, social media mentions, and other metrics can help you highlight your most valuable customers in the long run.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/high-value-customers/#faq-question-1653046988934","position":2,"url":"https://seon.io/resources/high-value-customers/#faq-question-1653046988934","name":"What do you call a valued customer?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A valued customer, or most valued customer, is a marketing term that denotes the most profitable customers for your company. However, profitability doesn’t always have to do directly with money. Sometimes, being profitable means spending money on your products or services. Sometimes it’s about the quality of the referrals a customer brings in, or other aspects of their impact.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/high-value-customers/#faq-question-1653046990413","position":3,"url":"https://seon.io/resources/high-value-customers/#faq-question-1653046990413","name":"What are the four types of customer value?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Marketers believe that customers look at value through the prism of four different categories: functional value, monetary value, social value, and psychological value.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/kyc-aml-differences/#article","isPartOf":{"@id":"https://seon.io/resources/kyc-aml-differences/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"KYC &amp; AML: Key Differences and How They Work Together","datePublished":"2022-05-30T11:43:10+00:00","dateModified":"2026-02-04T12:29:18+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/kyc-aml-differences/"},"wordCount":2211,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/kyc-aml-differences/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","keywords":["AML","KYC"],"inLanguage":"en-US","description":"KYC vs AML, from the basics to customer behavior."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/kyc-aml-differences/","url":"https://seon.io/resources/kyc-aml-differences/","name":"KYC & AML: What Are They & How They Work Together | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-aml-differences/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2022-05-30T11:43:10+00:00","dateModified":"2026-02-04T12:29:18+00:00","description":"Is KYC the same as AML? What sets them apart? We examine in detail and see how examining customer behavior can help keep you safer.","mainEntity":[{"@id":"https://seon.io/resources/kyc-aml-differences/#faq-question-1652684067637"},{"@id":"https://seon.io/resources/kyc-aml-differences/#faq-question-1671630908418"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/kyc-aml-differences/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-aml-differences/#faq-question-1652684067637","position":1,"url":"https://seon.io/resources/kyc-aml-differences/#faq-question-1652684067637","name":"Where are KYC and AML required?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"KYC and AML are required for banks, neobanks, exchanges, and FX trading platforms, among others. However, a growing number of verticals deploy KYC checks to learn more about their customers, reduce fraud, and ensure safer business operations. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-aml-differences/#faq-question-1671630908418","position":2,"url":"https://seon.io/resources/kyc-aml-differences/#faq-question-1671630908418","name":"What are KYC and AML checks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"KYC checks are run to check that someone is who they say they are. They can include various ways to verify their identity. AML checks is an umbrella term that includes KYC checks, as well as things like checking whether someone is on PEP lists, watchlists or other blacklists. In fact, for AML purposes, checks are expected to be conducted at regular intervals, while KYC does not always involve this.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#article","isPartOf":{"@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Betting Bots: How to Detect and Stop Them","datePublished":"2022-06-02T10:32:13+00:00","dateModified":"2025-05-16T15:32:38+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/"},"wordCount":1379,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","inLanguage":"en-US","description":"Betting bots are problematic for operators – here is how to tackle them."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/","url":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/","name":"Betting Bots: How to Detect and Stop Them | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","datePublished":"2022-06-02T10:32:13+00:00","dateModified":"2025-05-16T15:32:38+00:00","description":"Anyone working in iGaming will tell you that betting bots can be a huge problem for sportsbooks, poker sites and casino operators. So how do you stop them?","mainEntity":[{"@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#faq-question-1653391925192"},{"@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#faq-question-1653391958112"},{"@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#faq-question-1653391976229"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#faq-question-1653391925192","position":1,"url":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#faq-question-1653391925192","name":"Which are the best betting bot detection tools?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Betting bots tend to follow similar patterns and configurations, so you can identify them by looking at IP data, device data, and analyzing behavior via velocity rules.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#faq-question-1653391958112","position":2,"url":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#faq-question-1653391958112","name":"What is automated betting software?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Automated betting software is designed to gather odds data and automatically bet on the best offers from numerous betting providers. They gather the data via APIs.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#faq-question-1653391976229","position":3,"url":"https://seon.io/resources/betting-bots-how-to-detect-and-stop-them/#faq-question-1653391976229","name":"Is automated betting software profitable?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It depends. As a player, you may have to test different tools and keep them running for lengthy periods of time before you see any profits – if this is allowed by the operator in the first place. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#article","isPartOf":{"@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"What is Customer Segmentation &amp; 5 Working Examples","datePublished":"2022-06-10T10:56:19+00:00","dateModified":"2025-05-19T12:12:11+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/"},"wordCount":1730,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","inLanguage":"en-US","description":"Beyond fighting fraud, SEON's data enrichment can improve your data segmentation – read how."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/","url":"https://seon.io/resources/customer-segmentation-with-data-enrichment/","name":"What is Customer Segmentation - 5 Working Examples | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","datePublished":"2022-06-10T10:56:19+00:00","dateModified":"2025-05-19T12:12:11+00:00","description":"Data enrichment helps make information useful and actionable in more ways than one – and can certainly level up your customer segmentation game. Read how.","mainEntity":[{"@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#faq-question-1654695052335"},{"@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#faq-question-1654695069133"},{"@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#faq-question-1654695078512"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#faq-question-1654695052335","position":1,"url":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#faq-question-1654695052335","name":"What are the 4 key areas of customer segmentation?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The four key areas of customer segmentation focus on demographics, geography, technography, and behavior. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#faq-question-1654695069133","position":2,"url":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#faq-question-1654695069133","name":"What is an example of customer segmentation?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A simple example of customer segmentation would see a company display a form on their website. It could let people select their age range and gender. A marketer can then use that data to segment customers based on demographics. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#faq-question-1654695078512","position":3,"url":"https://seon.io/resources/customer-segmentation-with-data-enrichment/#faq-question-1654695078512","name":"Why is customer segmentation important?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"In the digital world, it can be hard to have an idea of who your customers are. This is why leveraging customer segmentation can give you better insights into who you are dealing with. The goal can be to offer better products, support, or targeted marketing. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/customer-due-diligence-player-affordability-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/customer-due-diligence-player-affordability-igaming/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Understanding CDD &amp; Player Affordability in iGaming","datePublished":"2022-06-14T09:08:00+00:00","dateModified":"2026-04-13T16:39:32+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/customer-due-diligence-player-affordability-igaming/"},"wordCount":2366,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/customer-due-diligence-player-affordability-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","inLanguage":"en-US","description":"An overview of CDD and affordability, with actionable insights from three industry experts."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/customer-due-diligence-player-affordability-igaming/","url":"https://seon.io/resources/customer-due-diligence-player-affordability-igaming/","name":"Understanding CDD &amp; Player Affordability in iGaming - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/customer-due-diligence-player-affordability-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","datePublished":"2022-06-14T09:08:00+00:00","dateModified":"2026-04-13T16:39:32+00:00","description":"Read our breakdown of how customer due diligence and affordability blend within iGaming operations, featuring insights from industry experts.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/customer-due-diligence-player-affordability-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-detect-multi-accounting-for-digital-banks/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-detect-multi-accounting-for-digital-banks/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How to Detect Multi-Accounting for Digital Banks","datePublished":"2022-06-15T11:15:00+00:00","dateModified":"2025-10-27T16:28:59+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-detect-multi-accounting-for-digital-banks/"},"wordCount":1036,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-detect-multi-accounting-for-digital-banks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","keywords":["Multi Accounting"],"inLanguage":"en-US","description":"See how to stop the multi-accounting attempts that plague neobanks and fintechs."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-to-detect-multi-accounting-for-digital-banks/","url":"https://seon.io/resources/how-to-detect-multi-accounting-for-digital-banks/","name":"How to Detect Multi-Accounting for Digital Banks - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-detect-multi-accounting-for-digital-banks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","datePublished":"2022-06-15T11:15:00+00:00","dateModified":"2025-10-27T16:28:59+00:00","description":"With neobanks offering a range of sign-up bonuses, multi accounting can be a serious revenue leak. See how to detect it with next to no friction in this article.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-detect-multi-accounting-for-digital-banks/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/countries-with-the-biggest-cybercrime-budgets/#article","isPartOf":{"@id":"https://seon.io/resources/countries-with-the-biggest-cybercrime-budgets/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"The Countries with the Biggest Cybercrime Budgets","datePublished":"2022-06-16T14:08:00+00:00","dateModified":"2025-04-03T09:14:44+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/countries-with-the-biggest-cybercrime-budgets/"},"wordCount":1682,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/countries-with-the-biggest-cybercrime-budgets/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/06/Blog-Header.png","inLanguage":"en-US","description":"Read our research on cybercrime and fraud budgets around the world."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/countries-with-the-biggest-cybercrime-budgets/","url":"https://seon.io/resources/countries-with-the-biggest-cybercrime-budgets/","name":"Global Cybercrime Budgets Report 2022 | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/countries-with-the-biggest-cybercrime-budgets/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/06/Blog-Header.png","datePublished":"2022-06-16T14:08:00+00:00","dateModified":"2025-04-03T09:14:44+00:00","description":"Which countries spend the most to battle cybercrime and fraud? Which countries lose the most to them? And what types of fraud are most common in each?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/countries-with-the-biggest-cybercrime-budgets/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/06/Blog-Header.png","contentUrl":"https://seon.io/wp-content/uploads/2022/06/Blog-Header.png","width":2688,"height":926,"caption":"The Countries With The Biggest Fraud Budgets"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/high-risk-customers/#article","isPartOf":{"@id":"https://seon.io/resources/high-risk-customers/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"High Risk Customers: Types &amp; How to Identify Them","datePublished":"2022-06-20T07:00:36+00:00","dateModified":"2025-05-19T11:56:08+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/high-risk-customers/"},"wordCount":1629,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/high-risk-customers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","inLanguage":"en-US","description":"Here’s our guide on spotting high-risk users before they can damage your business in the long run.","keywords":["Forex"]}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/high-risk-customers/","url":"https://seon.io/resources/high-risk-customers/","name":"High-Risk Customer Types & How To Identify Them in 2025 | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/high-risk-customers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","datePublished":"2022-06-20T07:00:36+00:00","dateModified":"2025-05-19T11:56:08+00:00","description":"Here’s how to spot high-risk users using data enrichment and digital footprint analysis – before they can damage your business in the long run.","mainEntity":[{"@id":"https://seon.io/resources/high-risk-customers/#faq-question-1655287561212"},{"@id":"https://seon.io/resources/high-risk-customers/#faq-question-1655287575314"},{"@id":"https://seon.io/resources/high-risk-customers/#faq-question-1689607486769"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/high-risk-customers/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/high-risk-customers/#faq-question-1655287561212","position":1,"url":"https://seon.io/resources/high-risk-customers/#faq-question-1655287561212","name":"How do you identify risky customers?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Who is considered a risky user varies from one business to the next. But identifying them always starts by gathering data. Adding a wealth of data points that are suited for your business model via real-time data enrichment helps you get a full picture, which can inform the next steps.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/high-risk-customers/#faq-question-1655287575314","position":2,"url":"https://seon.io/resources/high-risk-customers/#faq-question-1655287575314","name":"What is user risk?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"User risk is a metric you can rely on to gauge the likelihood that a user will be beneficial or dangerous to your business. In fraud prevention, for instance, this is expressed via a risk score, also known as a <a href=\"https://seon.io/resources/fraud-scores-how-to-calculate-them/\" target=\"_blank\" rel=\"noreferrer noopener\">fraud score</a>.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/high-risk-customers/#faq-question-1689607486769","position":3,"url":"https://seon.io/resources/high-risk-customers/#faq-question-1689607486769","name":"What to do before onboarding a high-risk customer?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Before onboarding high-risk customers, you should have a risk strategy that states every way of dealing with them. You should have already assessed what kind of high-risk customers your business may encounter, as well as the necessary steps to take, such as flagging them to authorities, actively monitoring their behavior, or simply blocking them.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/payment-fraud-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/payment-fraud-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Understanding Payment Fraud in iGaming","datePublished":"2022-06-28T11:57:06+00:00","dateModified":"2025-01-03T17:23:30+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/payment-fraud-igaming/"},"wordCount":1163,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/payment-fraud-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-light.png","keywords":["Payment Fraud"],"inLanguage":"en-US","description":"How can we solve the problem of payment fraud in iGaming?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/payment-fraud-igaming/","url":"https://seon.io/resources/payment-fraud-igaming/","name":"Understanding Payment Fraud in iGaming - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/payment-fraud-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-light.png","datePublished":"2022-06-28T11:57:06+00:00","dateModified":"2025-01-03T17:23:30+00:00","description":"iGaming companies are no strangers to payment fraud conducted with stolen credit and other cards. Let’s see how to solve that problem.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/payment-fraud-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/application-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/application-fraud/"},"author":{"name":"Agnes Csoka","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6"},"headline":"Application Fraud Detection &amp; Prevention: Examples and Best Practices ","datePublished":"2022-06-29T13:03:00+00:00","dateModified":"2026-01-06T14:04:52+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/application-fraud/"},"wordCount":1750,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/application-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn what application fraud is, its business impact, and how to detect and prevent it during onboarding with real-time risk signals."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/application-fraud/","url":"https://seon.io/resources/application-fraud/","name":"What Is Application Fraud & How to Detect & Prevent It","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/application-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","datePublished":"2022-06-29T13:03:00+00:00","dateModified":"2026-01-06T14:04:52+00:00","description":"Learn what application fraud is, its business impact, and how to detect and prevent it during onboarding with real-time risk signals.","mainEntity":[{"@id":"https://seon.io/resources/application-fraud/#faq-question-1656338439465"},{"@id":"https://seon.io/resources/application-fraud/#faq-question-1656338447423"},{"@id":"https://seon.io/resources/application-fraud/#faq-question-1690451586392"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/application-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/application-fraud/#faq-question-1656338439465","position":1,"url":"https://seon.io/resources/application-fraud/#faq-question-1656338439465","name":"What type of fraud is application fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Application fraud covers any kind of lies or deceitful practices made by people when applying for a financial product. This can be a car loan, mortgage, neobank account, or BNPL account, among others.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/application-fraud/#faq-question-1656338447423","position":2,"url":"https://seon.io/resources/application-fraud/#faq-question-1656338447423","name":"How do you protect against application fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Most companies can detect application fraud by focusing on strong identity-proofing tools. That may include KYC software, identity verification tools, or real-time data enrichment solutions. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/application-fraud/#faq-question-1690451586392","position":3,"url":"https://seon.io/resources/application-fraud/#faq-question-1690451586392","name":"What are the risks of application fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The risks of application fraud to businesses include financial loss, trouble with regulators (potentially including fines), distraction from core activities, and reputational damage. This is why detecting and blocking attempted application fraud is so important. <br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/money-laundering-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/money-laundering-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How to Improve AML in iGaming","datePublished":"2022-06-30T09:50:00+00:00","dateModified":"2026-04-13T16:40:28+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/money-laundering-igaming/"},"wordCount":1259,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/money-laundering-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","inLanguage":"en-US","description":"iGaming companies provide perfect conditions for money laundering – how can you stop it?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/money-laundering-igaming/","url":"https://seon.io/resources/money-laundering-igaming/","name":"How to Improve AML in iGaming | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/money-laundering-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","datePublished":"2022-06-30T09:50:00+00:00","dateModified":"2026-04-13T16:40:28+00:00","description":"iGaming vendors are prone to money laundering, attracting the attention of legislators, who impose AML measures. How do you balance UX and compliance?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/money-laundering-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/kyc-banking/","url":"https://seon.io/resources/kyc-verification-process/","name":"KYC in Banking: Stop Fraud with Smarter Checks | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-verification-process/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","datePublished":"2022-07-06T07:39:53+00:00","dateModified":"2026-02-04T12:30:06+00:00","description":"Bank fraud is rising fast. Learn how digital KYC tools like SEON help verify identities, reduce costs, and boost compliance.","mainEntity":[{"@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029377279"},{"@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029393208"},{"@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029402890"},{"@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029424949"},{"@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1690368892425"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029377279","position":1,"url":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029377279","name":"What is meant by KYC in banking?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"KYC in banking refers to the Know Your Customer or Know Your Client process. It’s a legal requirement to ensure you only offer financial products or services to legitimate customers who pose no risk threat to your establishment and to society at large (for instance, money launderers).","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029393208","position":2,"url":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029393208","name":"What is banking KYC verification?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A KYC verification includes some form of name, address, and ID verification. Different regulating bodies have different standards, including proof of income, age, or PPI (personally identifiable information) such as a social security number in the US.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029402890","position":3,"url":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029402890","name":"Is KYC mandatory for opening a bank account?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. Whether it is with a global financial institution with retail locations or a digital-only neobank, a KYC check is mandatory to open a bank account. However, banks can save on expensive KYC checks by using a pre-KYC filter to weed out bad applications.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029424949","position":4,"url":"https://seon.io/resources/kyc-verification-process/#faq-question-1657029424949","name":"How is KYC done in banking?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The KYC process can be broken down into different steps, but the idea is always to filter out bad users and verify the identity of potential customers. A form of identity verification is part of the process. The bare minimum KYC standards for each locale are defined by the authorities.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-verification-process/#faq-question-1690368892425","position":5,"url":"https://seon.io/resources/kyc-verification-process/#faq-question-1690368892425","name":"What Is eKYC?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"eKYC stands for Electronic Know Your Customer/Client and it’s simply the digital version of the KYC process. It’s highly popular with banks that operate digitally only (neobanks, challenger banks), but also increasingly for financial institutions that are moving away from the traditional brick-and-mortar model, where customers used to bring in hard copies of documentation to a branch of the bank.<br />eKYC is the prevalent KYC model for certain markets – for instance in India, where 99% of the adult population has a digital identity called Aadhar.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/online-payment-method-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/online-payment-method-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"The Rise of Online Payment Method Fraud","datePublished":"2022-07-07T09:16:00+00:00","dateModified":"2025-12-08T15:20:15+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/online-payment-method-fraud/"},"wordCount":1138,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/online-payment-method-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/07/payment-fraud_3_Featured.png","inLanguage":"en-US","description":"Exactly how prevalent is payment method fraud and who is most affected?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/online-payment-method-fraud/","url":"https://seon.io/resources/online-payment-method-fraud/","name":"The Rise of Online Payment Method Fraud | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/online-payment-method-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/07/payment-fraud_3_Featured.png","datePublished":"2022-07-07T09:16:00+00:00","dateModified":"2025-12-08T15:20:15+00:00","description":"As online fraud becomes more complex, we examine where consumers are most vulnerable and how it can be prevented – complete with stats and graphics.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/online-payment-method-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/07/payment-fraud_3_Featured.png","contentUrl":"https://seon.io/wp-content/uploads/2022/07/payment-fraud_3_Featured.png","width":2917,"height":1668}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/money-laundering-cryptocurrency/#article","isPartOf":{"@id":"https://seon.io/resources/money-laundering-cryptocurrency/"},"author":{"name":"Agnes Csoka","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6"},"headline":"How to Detect Money Laundering for Crypto Firms","datePublished":"2022-07-13T13:14:01+00:00","dateModified":"2025-10-31T16:18:15+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/money-laundering-cryptocurrency/"},"wordCount":830,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/money-laundering-cryptocurrency/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","inLanguage":"en-US","description":"The challenges and solutions of money laundering for crypto exchanges."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/money-laundering-cryptocurrency/","url":"https://seon.io/resources/money-laundering-cryptocurrency/","name":"How Can Crypto Firms Detect Money Laundering?","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/money-laundering-cryptocurrency/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2022-07-13T13:14:01+00:00","dateModified":"2025-10-31T16:18:15+00:00","description":"Cryptocurrencies can be used to launder money. Let’s see why that’s an issue for your crypto firm and how to do AML without friction.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/money-laundering-cryptocurrency/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/identity-theft-in-banking/#article","isPartOf":{"@id":"https://seon.io/resources/identity-theft-in-banking/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Identity Theft in Digital Banks: What You Need to Know","datePublished":"2022-07-18T07:24:03+00:00","dateModified":"2025-10-27T16:30:21+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/identity-theft-in-banking/"},"wordCount":1701,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/identity-theft-in-banking/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","inLanguage":"en-US","description":"Why is identity theft a problem in banking and how can it be prevented?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/identity-theft-in-banking/","url":"https://seon.io/resources/identity-theft-in-banking/","name":"Identity Theft in Neobanking: Risks & Detection | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/identity-theft-in-banking/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","datePublished":"2022-07-18T07:24:03+00:00","dateModified":"2025-10-27T16:30:21+00:00","description":"Identity theft is a huge pain point both for banks and consumers. Find out how to catch and block it more easily as a neobank or digital bank.","mainEntity":[{"@id":"https://seon.io/resources/identity-theft-in-banking/#faq-question-1657623844230"},{"@id":"https://seon.io/resources/identity-theft-in-banking/#faq-question-1657623855498"},{"@id":"https://seon.io/resources/identity-theft-in-banking/#faq-question-1657623862095"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/identity-theft-in-banking/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/identity-theft-in-banking/#faq-question-1657623844230","position":1,"url":"https://seon.io/resources/identity-theft-in-banking/#faq-question-1657623844230","name":"What is identity theft in banking?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Identity theft happens when criminals or fraudsters acquire important pieces of a legal identity, such as a full name, address, and copy of an ID document, and try to use it to open a bank account or access a financial product offered by a bank.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/identity-theft-in-banking/#faq-question-1657623855498","position":2,"url":"https://seon.io/resources/identity-theft-in-banking/#faq-question-1657623855498","name":"What are the common types of identity theft used to defraud banks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Criminals have developed different techniques for financial identity theft, medical identity theft, synthetic identity theft, and even child identity theft. They then use these to try to defraud banks.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/identity-theft-in-banking/#faq-question-1657623862095","position":3,"url":"https://seon.io/resources/identity-theft-in-banking/#faq-question-1657623862095","name":"What are the first signs of identity theft?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"You may be a victim of identity theft if you notice unexplained bank charges or withdrawals, receive letters from credit card providers you did not apply with, or notice errors on your credit report.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/global-banking-fraud-index/#article","isPartOf":{"@id":"https://seon.io/resources/global-banking-fraud-index/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Global Banking Fraud Index 2023","datePublished":"2022-07-18T08:02:00+00:00","dateModified":"2025-05-20T16:05:32+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/global-banking-fraud-index/"},"wordCount":3227,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/global-banking-fraud-index/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2023/05/Global_banking_fraud_2023_featured.png","inLanguage":"en-US","description":"Read about the real cost of fraud to banks and fintechs."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/global-banking-fraud-index/","url":"https://seon.io/resources/global-banking-fraud-index/","name":"Global Banking Fraud Index 2023 | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/global-banking-fraud-index/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2023/05/Global_banking_fraud_2023_featured.png","datePublished":"2022-07-18T08:02:00+00:00","dateModified":"2025-05-20T16:05:32+00:00","description":"Discover recent statistics and figures on banking fraud and the cost of fraud to US and UK organizations – as well as common consumer scams.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/global-banking-fraud-index/#primaryimage","url":"https://seon.io/wp-content/uploads/2023/05/Global_banking_fraud_2023_featured.png","contentUrl":"https://seon.io/wp-content/uploads/2023/05/Global_banking_fraud_2023_featured.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/multi-accounting-matched-betting/#article","isPartOf":{"@id":"https://seon.io/resources/multi-accounting-matched-betting/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How to Detect Gnoming &amp; Multi Accounting for Matched Betting","datePublished":"2022-07-21T09:18:23+00:00","dateModified":"2026-04-13T16:41:19+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/multi-accounting-matched-betting/"},"wordCount":1224,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/multi-accounting-matched-betting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","keywords":["Multi Accounting"],"inLanguage":"en-US","description":"Matched betting abuse costs you. Spot gnoming and multi-accounting early with smart tools and boost platform integrity."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/multi-accounting-matched-betting/","url":"https://seon.io/resources/multi-accounting-matched-betting/","name":"How to Detect Gnoming & Multi-Accounting in Matched Betting","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/multi-accounting-matched-betting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","datePublished":"2022-07-21T09:18:23+00:00","dateModified":"2026-04-13T16:41:19+00:00","description":"Matched betting abuse costs you. Spot gnoming and multi-accounting early with smart tools and boost platform integrity.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/multi-accounting-matched-betting/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/transaction-monitoring-in-banking/","url":"https://seon.io/resources/aml-transaction-monitoring/","name":"How Transaction Monitoring Fights Fraud in Digital Banking | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-transaction-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","datePublished":"2022-07-25T08:27:10+00:00","dateModified":"2024-12-02T16:25:55+00:00","description":"Transaction monitoring is a key part of the AML and CFT processes for banks and neobanks. Learn about its importance to your organization.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/risk-monitoring/#article","isPartOf":{"@id":"https://seon.io/resources/risk-monitoring/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Risk Monitoring: What is It, Its Importance and How to Do It","datePublished":"2022-07-26T10:52:00+00:00","dateModified":"2025-10-17T10:48:18+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/risk-monitoring/"},"wordCount":2018,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/risk-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","keywords":["Risk Monitoring"],"inLanguage":"en-US","description":"We take a look at why risk management is crucial for a business."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/risk-monitoring/","url":"https://seon.io/resources/risk-monitoring/","name":"Risk Monitoring: What Is It & How to Do It? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/risk-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","datePublished":"2022-07-26T10:52:00+00:00","dateModified":"2025-10-17T10:48:18+00:00","description":"Risk monitoring is a crucial step where companies measure and review the efficiency of their risk strategies. Find out more in this article.","mainEntity":[{"@id":"https://seon.io/resources/risk-monitoring/#faq-question-1658306484302"},{"@id":"https://seon.io/resources/risk-monitoring/#faq-question-1658830778919"},{"@id":"https://seon.io/resources/risk-monitoring/#faq-question-1737479080554"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/risk-monitoring/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/risk-monitoring/#faq-question-1658306484302","position":1,"url":"https://seon.io/resources/risk-monitoring/#faq-question-1658306484302","name":"How do you monitor risk?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Monitoring risk involves having access to the right business data and a clear risk strategy in place. Most companies will rely on KRIs or Key Risk Indicators to monitor risk and measure the success of their risk strategies. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/risk-monitoring/#faq-question-1658830778919","position":2,"url":"https://seon.io/resources/risk-monitoring/#faq-question-1658830778919","name":"Is risk monitoring the same as transaction monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Not exactly. Risk monitoring refers to having a clear overview of the risk landscape in your sector and for your organization, while transaction monitoring is a more set-in-stone practice, where financial transactions are monitored in certain sectors, for AML reasons. However, you may have also heard of risk-based transaction monitoring, which is transaction monitoring informed by risk factors.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/risk-monitoring/#faq-question-1737479080554","position":3,"url":"https://seon.io/resources/risk-monitoring/#faq-question-1737479080554","name":"What skills are needed for risk monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Risk management is a key element of a company's global strategy, requiring skills to gain a holistic view across departments, such as collecting data and connecting it to business practices, understanding interdepartmental interactions when risks overlap, and having a clear grasp of the business model to ensure relevant risks are addressed. Essential tools and features vary by risk factors, but the ability to record and log data is indispensable.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#article","isPartOf":{"@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"What Is FedNow &amp; How Can Businesses Prepare for It?","datePublished":"2022-07-27T09:14:00+00:00","dateModified":"2025-12-30T16:13:00+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/"},"wordCount":2741,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","inLanguage":"en-US","description":"Launched in July 2023, FedNow is a real-time, instant payment system from the Federal Reserve."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/","url":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/","name":"FedNow: What Is It & How Can Businesses Prepare for It? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","datePublished":"2022-07-27T09:14:00+00:00","dateModified":"2025-12-30T16:13:00+00:00","description":"FedNow, the US instant payment service launched in July 2023, could bring significant changes to your organization. Read about it now.","mainEntity":[{"@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#faq-question-1690362619397"},{"@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#faq-question-1690362625827"},{"@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#faq-question-1690362633569"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","width":832,"height":469}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#faq-question-1690362619397","position":1,"url":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#faq-question-1690362619397","name":"Is FedNow mandatory?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No: It is optional and will only be available to the organizations and individuals who register to use it.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#faq-question-1690362625827","position":2,"url":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#faq-question-1690362625827","name":"How much does it cost to do a FedNow transaction?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It costs $25 a month for the FedNow Service participation fee, $0.045 per credit transfer (paid by the FedNow payment sender), and $0.01 for the request for payment (RFP) (which the entity requesting it has to pay).","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#faq-question-1690362633569","position":3,"url":"https://seon.io/resources/what-is-fednow-and-how-does-it-work/#faq-question-1690362633569","name":"When does FedNow go live?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The Federal Reserve launched FedNow on July 20, 2023.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/kyc-forex-trading/#article","isPartOf":{"@id":"https://seon.io/resources/kyc-forex-trading/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"KYC Compliance for Forex Trading","datePublished":"2022-07-28T09:07:25+00:00","dateModified":"2026-04-02T12:59:33+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/kyc-forex-trading/"},"wordCount":1637,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/kyc-forex-trading/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","keywords":["Forex","KYC"],"inLanguage":"en-US","description":"Learn why KYC compliance is essential in forex trading."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/kyc-forex-trading/","url":"https://seon.io/resources/kyc-forex-trading/","name":"KYC Compliance for Forex Trading | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-forex-trading/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","datePublished":"2022-07-28T09:07:25+00:00","dateModified":"2026-04-02T12:59:33+00:00","description":"Know Your Customer/Client is a legal requirement. Failure to meet its goals can spell legal trouble for your brokerage or foreign exchange. Read more here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/kyc-forex-trading/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/identity-theft-ecommerce/#article","isPartOf":{"@id":"https://seon.io/resources/identity-theft-ecommerce/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"How to Detect Identity Theft in Ecommerce","datePublished":"2022-08-01T09:49:11+00:00","dateModified":"2025-12-09T12:32:41+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/identity-theft-ecommerce/"},"wordCount":1363,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/identity-theft-ecommerce/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","keywords":["Identity Theft"],"inLanguage":"en-US","description":"Learn more about how you can detect identity theft."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/identity-theft-ecommerce/","url":"https://seon.io/resources/identity-theft-ecommerce/","name":"How to Detect Identity Theft in Ecommerce | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/identity-theft-ecommerce/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","datePublished":"2022-08-01T09:49:11+00:00","dateModified":"2025-12-09T12:32:41+00:00","description":"Knowing who your ecommerce customers are is the first step to reducing chargebacks &return fraud. How can you trust they’re real? Answers + custom rules.","mainEntity":[{"@id":"https://seon.io/resources/identity-theft-ecommerce/#faq-question-1658910207127"},{"@id":"https://seon.io/resources/identity-theft-ecommerce/#faq-question-1658910208568"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/identity-theft-ecommerce/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/identity-theft-ecommerce/#faq-question-1658910207127","position":1,"url":"https://seon.io/resources/identity-theft-ecommerce/#faq-question-1658910207127","name":"How do fraudsters access ecommerce customer data?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraudsters can access ecommerce customer data from data breaches, using stolen IDs, or simply by stealing an ecommerce account. The latter is called an account takeover, or ATO attack, which your customers might also refer to as \"account hacking\". ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/identity-theft-ecommerce/#faq-question-1658910208568","position":2,"url":"https://seon.io/resources/identity-theft-ecommerce/#faq-question-1658910208568","name":"How big is ecommerce identity fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It is big business for criminals and can enable further fraudulent schemes. According to Statista, ecommerce fraud losses amounted to $20 billion in 2020–2021, partly fueled by identity fraud (25% of all fraud cases in the US and Canada). ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#article","isPartOf":{"@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/"},"author":{"name":"Ádám Vass","@id":"https://seon.io/#/schema/person/1dc48ec21a336313ac6a5ef7ede65297"},"headline":"What Is Crypto Transaction Monitoring? Tracing Risk Across Blockchains","datePublished":"2022-08-02T09:02:18+00:00","dateModified":"2026-04-15T08:40:13+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/"},"wordCount":2047,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","keywords":["Transaction Monitoring"],"articleSection":["Article"],"inLanguage":"en-US","description":"How crypto transaction monitoring works, which regulations apply, how it differs from traditional AML - all in one guide"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/","url":"https://seon.io/resources/cryptocurrency-transaction-monitoring/","name":"What is Crypto Transaction Monitoring? Full Guide | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","datePublished":"2022-08-02T09:02:18+00:00","dateModified":"2026-04-15T08:40:13+00:00","description":"How crypto transaction monitoring works, which regulations apply and how it differs from traditional AML — in one guide.","mainEntity":[{"@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240284628"},{"@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1680260779779"},{"@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240141226"},{"@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240172067"},{"@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240195228"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240284628","position":1,"url":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240284628","name":"What should you look for in a crypto transaction monitoring tool?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Effective crypto transaction monitoring tool must ingest on-chain data natively, screen wallet addresses against sanctions lists in real time, and support cross-chain investigation. Key differentiators are Travel Rule integration, configurable rule logic for crypto-specific typologies, and automated SAR drafting. Platforms that consolidate fraud and AML monitoring into a single workflow reduce both false positive rates and analyst workload.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1680260779779","position":2,"url":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1680260779779","name":"What is the difference between crypto transaction monitoring and blockchain analytics?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Crypto transaction monitoring tracks activity in real time against predefined AML rules, flagging structuring, velocity anomalies or exposure to high-risk addresses as they happen. Blockchain analytics is a retrospective investigation tool, tracing funds across the ledger to map wallet clusters, identify illicit actors, and reconstruct transaction chains after the fact. Effective compliance programs use both: monitoring to catch suspicious activity early and analytics to support SARs and law enforcement requests.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240141226","position":3,"url":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240141226","name":"Which regulations require crypto transaction monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The FATF Recommendations require virtual asset service providers (VASPs) to apply AML/CFT controls equivalent to those for traditional financial institutions,  including ongoing transaction monitoring. In the EU, MiCA and the Transfer of Funds Regulation extend these obligations directly to crypto-asset service providers. In the US, FinCEN's BSA rules require money services businesses operating in crypto to implement transaction monitoring programs. Most national regulators have now adopted or are actively transposing FATF's VASP guidance.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240172067","position":4,"url":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240172067","name":"What suspicious activity patterns should trigger a SAR in crypto?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"FinCEN and equivalent regulators identify several high-priority typologies: structuring just below reporting thresholds, rapid layering through multiple wallets or chains, chain-hopping, and use of mixers or privacy coins on platforms that prohibit them. Any transaction involving OFAC-flagged addresses warrants immediate review. Context determines the threshold — a single pattern may not be sufficient; the combination of behavioural and on-chain signals drives the SAR decision.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240195228","position":5,"url":"https://seon.io/resources/cryptocurrency-transaction-monitoring/#faq-question-1776240195228","name":"How do crypto platforms scale transaction monitoring without expanding compliance headcount?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The limiting factor is not alert volume but the analyst time required to review and close each case. Platforms scale by reducing false positives through risk-based rule finetuning and by automating low-complexity case handling. AI-generated SAR narratives and automated rule suggestions significantly reduce per-case workload: analysts review AI-generated outputs rather than writing from scratch. Consolidating fraud and AML monitoring into a single platform also eliminates duplicate review queues, thereby reducing effective headcount requirements.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/digital-onboarding-in-banking/#article","isPartOf":{"@id":"https://seon.io/resources/digital-onboarding-in-banking/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Digital Onboarding in Digital Banks: How to Reduce Risk","datePublished":"2022-08-03T06:30:00+00:00","dateModified":"2025-10-27T16:26:57+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/digital-onboarding-in-banking/"},"wordCount":1528,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/digital-onboarding-in-banking/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","inLanguage":"en-US","description":"Digital onboarding is an experience bank customers enjoy – but it can also be risky."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/digital-onboarding-in-banking/","url":"https://seon.io/resources/digital-onboarding-in-banking/","name":"Digital Onboarding in Digital Banks: How to Reduce Risk | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/digital-onboarding-in-banking/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2022-08-03T06:30:00+00:00","dateModified":"2025-10-27T16:26:57+00:00","description":"Digital onboarding is one of the most important touchpoints for banks. Let’s see how fraudsters attempt to complete this process - and how to stop them.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/digital-onboarding-in-banking/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/global-recession-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/global-recession-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Global Recession Fraud 2023: How Economic Downturns Impact Crime &amp; What to Do About It","datePublished":"2022-08-09T16:24:00+00:00","dateModified":"2025-04-03T09:12:54+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/global-recession-fraud/"},"wordCount":1640,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/global-recession-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","inLanguage":"en-US","description":"We take a stats-forward look at fraud during a recession."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/global-recession-fraud/","url":"https://seon.io/resources/global-recession-fraud/","name":"Global Recession Fraud Report 2023: What Can You Do? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/global-recession-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","datePublished":"2022-08-09T16:24:00+00:00","dateModified":"2025-04-03T09:12:54+00:00","description":"How does a global recession affect fraud and crime in general? We take a look at the statistics and how you can protect your business.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/global-recession-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/loyalty-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/loyalty-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Loyalty Fraud – How to Reward Good Customers by Flagging Fraudsters","datePublished":"2022-08-11T13:54:40+00:00","dateModified":"2025-04-29T17:41:09+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/loyalty-fraud/"},"wordCount":1895,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/loyalty-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","inLanguage":"en-US","description":"Loyalty fraud can be surprisingly impactful – find out more here."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/loyalty-fraud/","url":"https://seon.io/resources/loyalty-fraud/","name":"Loyalty Fraud: What It Is & How to Stop It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/loyalty-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","datePublished":"2022-08-11T13:54:40+00:00","dateModified":"2025-04-29T17:41:09+00:00","description":"Loyalty fraud, also known as rewards fraud or points fraud, refers to exploiting loyalty programs for personal gain. See here how it can be stopped.","mainEntity":[{"@id":"https://seon.io/resources/loyalty-fraud/#faq-question-1659457188922"},{"@id":"https://seon.io/resources/loyalty-fraud/#faq-question-1659457195793"},{"@id":"https://seon.io/resources/loyalty-fraud/#faq-question-1659457210284"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/loyalty-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/loyalty-fraud/#faq-question-1659457188922","position":1,"url":"https://seon.io/resources/loyalty-fraud/#faq-question-1659457188922","name":"What is reward fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Reward fraud happens when a customer finds a loophole to exploit your reward program. It also happens when a fraudster steals a customer’s account to spend their reward points.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/loyalty-fraud/#faq-question-1659457195793","position":2,"url":"https://seon.io/resources/loyalty-fraud/#faq-question-1659457195793","name":"What are the types of customer loyalty programs? ","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Common types of customer loyalty programs include:<br />- point-based loyalty programs<br />- tiered loyalty programs<br />- paid-loyalty programs<br />- game-based loyalty programs<br />- longevity-based loyalty programs","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/loyalty-fraud/#faq-question-1659457210284","position":3,"url":"https://seon.io/resources/loyalty-fraud/#faq-question-1659457210284","name":"What is an example of loyalty marketing?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An example of loyalty marketing would include a coupon code sent to customers who spent over a certain amount at an online store. You could also give customers points for each purchase, and have the points be exchangeable for goods or services.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/psd3-payment-services-directive-update/#article","isPartOf":{"@id":"https://seon.io/resources/psd3-payment-services-directive-update/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"PSD3: What Businesses Need to Know About the Payment Services Directive Update","datePublished":"2022-08-18T07:59:00+00:00","dateModified":"2025-09-30T11:06:22+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/psd3-payment-services-directive-update/"},"wordCount":1178,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/psd3-payment-services-directive-update/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","inLanguage":"en-US","description":"Read about PSD3, which is set to replace PSD2 open banking and SCA standards in Europe."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/psd3-payment-services-directive-update/","url":"https://seon.io/resources/psd3-payment-services-directive-update/","name":"What Is PSD3? – The EU’s 3rd Payment Services Directive | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/psd3-payment-services-directive-update/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","datePublished":"2022-08-18T07:59:00+00:00","dateModified":"2025-09-30T11:06:22+00:00","description":"Here is the latest reliable information on the EU’s new Payment Services Directive, affecting banking & SCA standards in Europe and beyond.","mainEntity":[{"@id":"https://seon.io/resources/psd3-payment-services-directive-update/#faq-question-1660637554508"},{"@id":"https://seon.io/resources/psd3-payment-services-directive-update/#faq-question-1660637580246"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/psd3-payment-services-directive-update/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/psd3-payment-services-directive-update/#faq-question-1660637554508","position":1,"url":"https://seon.io/resources/psd3-payment-services-directive-update/#faq-question-1660637554508","name":"When will PSD3 come into effect?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It is still early days. Legislation is expected to be drafted by the European Commission in Q1 or Q2 of 2023, then passed, and then each EU/EEA country will be given a deadline to transpose it into national law. Ultimately, PSD3 is unlikely to be in effect before 2026 or even later.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/psd3-payment-services-directive-update/#faq-question-1660637580246","position":2,"url":"https://seon.io/resources/psd3-payment-services-directive-update/#faq-question-1660637580246","name":"Why are Payment Service Directives important?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"They is a way to encourage and empower healthy competition, including between banks and other financial institutions, as well as protect consumers and companies – all according to the European Commission. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/bank-account-takeover-attacks/#article","isPartOf":{"@id":"https://seon.io/resources/bank-account-takeover-attacks/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"How Digital Banks Detect and Stop Account Takeover","datePublished":"2022-08-22T09:15:18+00:00","dateModified":"2026-03-17T17:02:23+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/bank-account-takeover-attacks/"},"wordCount":1478,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/bank-account-takeover-attacks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","keywords":["Account Takeover"],"articleSection":["Article"],"inLanguage":"en-US","description":"With ATO losses hitting $15.6B, see how digital banks use AI and layered signals to stop account takeover fraud in real time."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/bank-account-takeover-attacks/","url":"https://seon.io/resources/bank-account-takeover-attacks/","name":"How Digital Banks Can Stop Account Takeover (ATO) Fraud","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/bank-account-takeover-attacks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2022-08-22T09:15:18+00:00","dateModified":"2026-03-17T17:02:23+00:00","description":"Account takeover (ATO) losses reached $15.6B in 2024. Learn how digital banks are moving beyond MFA to stop ATO fraud in real time with AI and layered signals.","mainEntity":[{"@id":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766843947"},{"@id":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766874368"},{"@id":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766896690"},{"@id":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766916703"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/bank-account-takeover-attacks/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766843947","position":1,"url":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766843947","name":"What is Account Takeover (ATO) fraud in digital banking?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Account takeover (ATO) occurs when a fraudster gains unauthorized access to a bank account. In digital banking, attackers exploit high-velocity onboarding and low-friction login flows to drain funds, launder money or apply for fraudulent credit lines. According to the FBI, impersonation-related ATO cases have already caused over $262 million in losses since early 2025.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766874368","position":2,"url":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766874368","name":"Why is MFA no longer enough to stop account takeover?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Traditional defenses like multi-factor authentication (MFA) and mobile biometrics are often bypassed by modern social engineering, generative AI and deepfake technology. Attackers now use automation to test stolen credentials (credential stuffing) or intercept one-time passwords (OTPs) to gain access without the account owner's knowledge.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766896690","position":3,"url":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766896690","name":"How can digital banks detect ATO in real time?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Effective detection requires a layered defense that combines multiple signals. This includes digital footprint analysis to verify user identity, device intelligence to flag emulators, behavioral biometrics to detect unfamiliar interaction patterns and velocity rules to monitor the frequency of suspicious actions.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766916703","position":4,"url":"https://seon.io/resources/bank-account-takeover-attacks/#faq-question-1773766916703","name":"What is the business impact of ATO on digital banks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The impact goes beyond the average loss of $12,000 per victim. ATO fraud is a major driver of customer churn, as 30% of fraud victims will leave their financial institution after an incident. For digital banks, this creates a significant risk to customer retention and long-term brand reputation.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/bsa-aml-compliance/#article","isPartOf":{"@id":"https://seon.io/resources/bsa-aml-compliance/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"BSA AML Compliance Explained: What It Is &amp; Its Importance","datePublished":"2022-08-23T08:59:06+00:00","dateModified":"2025-06-16T17:28:27+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/bsa-aml-compliance/"},"wordCount":1490,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/bsa-aml-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","keywords":["AML"],"inLanguage":"en-US","description":"Read about the Bank Secrecy Act, an essential part of AML legislation."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/bsa-aml-compliance/","url":"https://seon.io/resources/bsa-aml-compliance/","name":"Learn About BSA AML Compliance & Why It's Important | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/bsa-aml-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","datePublished":"2022-08-23T08:59:06+00:00","dateModified":"2025-06-16T17:28:27+00:00","description":"The Bank Secrecy Act (BSA) was set up in 1970. Here’s everything you need to know about this evolving piece of AML legislation and staying compliant.","mainEntity":[{"@id":"https://seon.io/resources/bsa-aml-compliance/#faq-question-1660572538614"},{"@id":"https://seon.io/resources/bsa-aml-compliance/#faq-question-1660572547782"},{"@id":"https://seon.io/resources/bsa-aml-compliance/#faq-question-1666782756030"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/bsa-aml-compliance/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bsa-aml-compliance/#faq-question-1660572538614","position":1,"url":"https://seon.io/resources/bsa-aml-compliance/#faq-question-1660572538614","name":"What is BSA AML certification?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A number of companies offer BSA and AML certification programs, which aim to train, test, and prepare individuals for BSA compliance. The price and duration of each program will vary depending on the provider and scope. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bsa-aml-compliance/#faq-question-1660572547782","position":2,"url":"https://seon.io/resources/bsa-aml-compliance/#faq-question-1660572547782","name":"What is BSA AML compliance software?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"BSA AML compliance software is designed to monitor transactions, create real-time alerts, and automatically fill the appropriate reports pertaining to BSA law. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/bsa-aml-compliance/#faq-question-1666782756030","position":3,"url":"https://seon.io/resources/bsa-aml-compliance/#faq-question-1666782756030","name":"What are the consequences of non-compliance with BSA AML legislation?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Companies who fail to comply with BSA AML mandates risk severe fines as well as potential imprisonment for staff deemed responsible for this. <strong>In the USA, where the BSA applies, civil penalties imposed by banking regulators can be as high as $1 million <em>for every single day the violation occurs</em>.</strong> Similar AML legislation in the UK can result in up to 14 years of imprisonment, and you can expect similar consequences in most countries.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/financial-crimes/#article","isPartOf":{"@id":"https://seon.io/resources/financial-crimes/"},"author":{"name":"Agnes Csoka","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6"},"headline":"Financial Crimes: Types, Examples &amp; Prevention Tips","datePublished":"2022-08-30T08:38:16+00:00","dateModified":"2025-09-08T07:58:50+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/financial-crimes/"},"wordCount":2243,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/financial-crimes/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","inLanguage":"en-US","description":"We explain what financial crime is and how you can better combat it."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/financial-crimes/","url":"https://seon.io/resources/financial-crimes/","name":"Types of Financial Crime: Definition, Examples & Trends | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/financial-crimes/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","datePublished":"2022-08-30T08:38:16+00:00","dateModified":"2025-09-08T07:58:50+00:00","description":"Financial crimes are a pain point for organizations around the world, with both their results and fines hindering growth. Read our breakdown.","mainEntity":[{"@id":"https://seon.io/resources/financial-crimes/#faq-question-1661350689107"},{"@id":"https://seon.io/resources/financial-crimes/#faq-question-1661350747516"},{"@id":"https://seon.io/resources/financial-crimes/#faq-question-1661350905153"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/financial-crimes/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/financial-crimes/#faq-question-1661350689107","position":1,"url":"https://seon.io/resources/financial-crimes/#faq-question-1661350689107","name":"What are the top 3 financial crimes?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"There's no definitive answer, as there are different ways to estimate what one would call \"top\". But money laundering, embezzlement and identity theft are three of the most prominent types.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/financial-crimes/#faq-question-1661350747516","position":2,"url":"https://seon.io/resources/financial-crimes/#faq-question-1661350747516","name":"What is a financial crime investigation?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Anyone looking into the specifics of an instance of financial crime is investigating it. However, we often see organizations such as local police, federal authorities, Interpol and Europol investigate financial crimes, when they are of magnitude. A company can launch a financial crime investigation internally, as well.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/financial-crimes/#faq-question-1661350905153","position":3,"url":"https://seon.io/resources/financial-crimes/#faq-question-1661350905153","name":"How is financial crime linked to terrorism?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Terrorism financing as well as money laundering from and for terrorism are all types of financial crimes. Sometimes, someone will commit financial crime to get money to finance terrorists and terrorism. However, giving money to these causes is a financial crime in itself.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/omnichannel-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/omnichannel-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"How to Build an Omnichannel Fraud Prevention Strategy","datePublished":"2022-09-05T07:58:56+00:00","dateModified":"2025-05-15T10:27:15+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/omnichannel-fraud/"},"wordCount":2514,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/omnichannel-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/08/Omnichannel_Strategy_featured-1.png","inLanguage":"en-US","description":"Better understand how omnichannel fraud is committed and how to stop it."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/omnichannel-fraud/","url":"https://seon.io/resources/omnichannel-fraud/","name":"How to Build an Omnichannel Fraud Prevention Strategy | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/omnichannel-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/08/Omnichannel_Strategy_featured-1.png","datePublished":"2022-09-05T07:58:56+00:00","dateModified":"2025-05-15T10:27:15+00:00","description":"Fraud fighting in the omnichannel space has a lot to benefit from proactiveness. Read what's unique about it and how to fight omnichannel fraud.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/omnichannel-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/08/Omnichannel_Strategy_featured-1.png","contentUrl":"https://seon.io/wp-content/uploads/2022/08/Omnichannel_Strategy_featured-1.png","width":1400,"height":800,"caption":"Omnichannel Fraud Strategy"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/real-estate-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/real-estate-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Real Estate Fraud &amp; How We Stopped a Property Listings Scammer","datePublished":"2022-09-06T08:35:20+00:00","dateModified":"2025-08-11T15:02:30+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/real-estate-fraud/"},"wordCount":2319,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/real-estate-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/08/real_Estate_fraud_featured-1.png","inLanguage":"en-US","description":"SEON is industry-agnostic, and property fraud is yet another type of fraud we tackle."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/real-estate-fraud/","url":"https://seon.io/resources/real-estate-fraud/","name":"Real Estate Fraud: How It Works & How to Prevent It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/real-estate-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/08/real_Estate_fraud_featured-1.png","datePublished":"2022-09-06T08:35:20+00:00","dateModified":"2025-08-11T15:02:30+00:00","description":"Property fraud is a topic of real concern for both homebuyers and renters. Read how it works, its various types","mainEntity":[{"@id":"https://seon.io/resources/real-estate-fraud/#faq-question-1661524983538"},{"@id":"https://seon.io/resources/real-estate-fraud/#faq-question-1661524993248"},{"@id":"https://seon.io/resources/real-estate-fraud/#faq-question-1661525003172"},{"@id":"https://seon.io/resources/real-estate-fraud/#faq-question-1661525019478"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/real-estate-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/08/real_Estate_fraud_featured-1.png","contentUrl":"https://seon.io/wp-content/uploads/2022/08/real_Estate_fraud_featured-1.png","width":3360,"height":1920,"caption":"Real Estate Fraud"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-estate-fraud/#faq-question-1661524983538","position":1,"url":"https://seon.io/resources/real-estate-fraud/#faq-question-1661524983538","name":"What is negative fraud in real estate?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The term “negative fraud” describes instances of dishonest behavior when a real estate agent is obliged to share specific information with a buyer or renter but chooses not to do so for their own benefit. It is a case of lying through omission, and it’s punishable by law.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-estate-fraud/#faq-question-1661524993248","position":2,"url":"https://seon.io/resources/real-estate-fraud/#faq-question-1661524993248","name":"What is listings fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Listings fraud is all fraudulent behavior connected to publishing classified or other ads, such as property ads. For example, it could be fake listings designed to swindle homebuyers, as we saw above. Or, it can be about illegally subletting when a contract does not allow you to do so.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-estate-fraud/#faq-question-1661525003172","position":3,"url":"https://seon.io/resources/real-estate-fraud/#faq-question-1661525003172","name":"How do I spot Airbnb scams?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"In general terms, if it sounds too good to be true, it is. Airbnb scams are almost always perpetrated after the scammer convinces you to transact off the official platform, such as to send a payment. They can target either property owners or guests, depending on the method. The company has several defenses in place, including official guidelines and star ratings for its users, which can go a long way. Beyond this, there is support from Airbnb and official means of resolution of issues. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-estate-fraud/#faq-question-1661525019478","position":4,"url":"https://seon.io/resources/real-estate-fraud/#faq-question-1661525019478","name":"What is accommodation fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"This is a type of scam that more often refers to vacation rentals, including rooms to let and hotels. The simplest version is when a fake website is set up for people to book their vacation at non-existent accommodation, or simply set up by someone who isn’t affiliated with an existing hotel or company. In this case, they’ll ask for money upfront and never return it.  ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/address-lookup/#article","isPartOf":{"@id":"https://seon.io/resources/address-lookup/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Address Lookup Explained: How Can It Benefit Your Company?","datePublished":"2022-09-08T09:21:00+00:00","dateModified":"2026-04-02T13:00:48+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/address-lookup/"},"wordCount":1360,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/address-lookup/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","inLanguage":"en-US","description":"How (and why) to use address lookup to verify your customers."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/address-lookup/","url":"https://seon.io/resources/address-lookup/","name":"Address Lookup Explained: How Can It Benefit Your Company? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/address-lookup/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2022-09-08T09:21:00+00:00","dateModified":"2026-04-02T13:00:48+00:00","description":"An address lookup gets you more information about a location to confirm the address is valid. Learn all about how to benefit from it in our in-depth guide.","mainEntity":[{"@id":"https://seon.io/resources/address-lookup/#faq-question-1662466551234"},{"@id":"https://seon.io/resources/address-lookup/#faq-question-1662466556293"},{"@id":"https://seon.io/resources/address-lookup/#faq-question-1662466557053"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/address-lookup/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/address-lookup/#faq-question-1662466551234","position":1,"url":"https://seon.io/resources/address-lookup/#faq-question-1662466551234","name":"How do I check if an address is valid?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Address verification, address lookup, and address validation solutions all let you check if an address is valid. It works by consulting official databases and referencing the address you enter into the program. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/address-lookup/#faq-question-1662466556293","position":2,"url":"https://seon.io/resources/address-lookup/#faq-question-1662466556293","name":"How accurate is reverse address lookup?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Address lookups work well for single residential houses. If you are looking at apartment buildings, the information may be harder to get. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/address-lookup/#faq-question-1662466557053","position":3,"url":"https://seon.io/resources/address-lookup/#faq-question-1662466557053","name":"Can an IP address tell the location?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, a reverse IP lookup can help you pinpoint the associated geographic location with amazing precision. This is helpful when dealing with ecommerce shipping, for instance.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/customer-lifetime-value/#article","isPartOf":{"@id":"https://seon.io/resources/customer-lifetime-value/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Customer Lifetime Value Intelligence: Who Are Your Most Valuable Customers?","datePublished":"2022-09-12T09:29:46+00:00","dateModified":"2025-04-03T08:57:00+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/customer-lifetime-value/"},"wordCount":1134,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/customer-lifetime-value/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","inLanguage":"en-US","description":"What is customer lifetime value and how do you leverage it?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/customer-lifetime-value/","url":"https://seon.io/resources/customer-lifetime-value/","name":"What Is Customer Lifetime Value (CLV) - How It Works? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/customer-lifetime-value/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","datePublished":"2022-09-12T09:29:46+00:00","dateModified":"2025-04-03T08:57:00+00:00","description":"Customer lifetime value (CLV) lets you calculate how valuable a customer is over time. Learn how to leverage it to help you grow and how SEON can help.","mainEntity":[{"@id":"https://seon.io/resources/customer-lifetime-value/#faq-question-1662731451022"},{"@id":"https://seon.io/resources/customer-lifetime-value/#faq-question-1662731470161"},{"@id":"https://seon.io/resources/customer-lifetime-value/#faq-question-1662731483114"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/customer-lifetime-value/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-lifetime-value/#faq-question-1662731451022","position":1,"url":"https://seon.io/resources/customer-lifetime-value/#faq-question-1662731451022","name":"What is a good customer lifetime value formula?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The simplest CLV formula is <em><strong>Purchase Value x Purchase Frequency x Customer Lifetime</strong></em>. You can also calculate CLV using averages for multiple customers or your entire customer base. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-lifetime-value/#faq-question-1662731470161","position":2,"url":"https://seon.io/resources/customer-lifetime-value/#faq-question-1662731470161","name":"What is a good customer lifetime value?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Customer lifetime value varies greatly depending on your vertical, business type and customer base. There’s no precise number that is universally accepted as good or bad. The only thing to worry about is if your CLV is lower than your acquisition cost – which means you're spending more on acquiring customers than these customers spend with you.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/customer-lifetime-value/#faq-question-1662731483114","position":3,"url":"https://seon.io/resources/customer-lifetime-value/#faq-question-1662731483114","name":"What can impact CLV?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Customer lifetime value is affected by the duration of the customer lifespan, the average order value, and purchase frequency. Other parameters such as the cost of your products and customer acquisition can also impact CLV. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/digital-wallet-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/digital-wallet-fraud/"},"author":{"name":"Dora Pinter","@id":"https://seon.io/#/schema/person/83524103262f8afb1f0587a7c27b7334"},"headline":"Digital Wallet Fraud: What It Is &amp; How to Prevent It","datePublished":"2022-09-19T09:19:31+00:00","dateModified":"2025-12-11T11:21:24+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/digital-wallet-fraud/"},"wordCount":1488,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/digital-wallet-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Digital wallet fraud includes ATOs, stolen cards, and friendly fraud. Learn how it works and how to prevent it without friction."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/digital-wallet-fraud/","url":"https://seon.io/resources/digital-wallet-fraud/","name":"Digital Wallet Fraud: What It Is & How to Prevent It","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/digital-wallet-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","datePublished":"2022-09-19T09:19:31+00:00","dateModified":"2025-12-11T11:21:24+00:00","description":"Digital wallet fraud includes ATOs, stolen cards added to wallets, and friendly fraud. Learn how it works and how to prevent it without friction.","mainEntity":[{"@id":"https://seon.io/resources/digital-wallet-fraud/#faq-question-1663059500969"},{"@id":"https://seon.io/resources/digital-wallet-fraud/#faq-question-1663059510243"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/digital-wallet-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/digital-wallet-fraud/#faq-question-1663059500969","position":1,"url":"https://seon.io/resources/digital-wallet-fraud/#faq-question-1663059500969","name":"What is mobile wallet fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Mobile wallet fraud happens when fraudsters take over your digital wallet account. Another scenario is that fraudsters use mobile wallets to pay with stolen credit card numbers, which is hard to detect for online merchants. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/digital-wallet-fraud/#faq-question-1663059510243","position":2,"url":"https://seon.io/resources/digital-wallet-fraud/#faq-question-1663059510243","name":"What is the most secure digital wallet?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"All digital wallets tend to be secure thanks to their encryption and tokenization technology. The weakest link would be the login stage, which should be protected by 2FA, MFA or biometrics. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/anti-fraud-measures/#article","isPartOf":{"@id":"https://seon.io/resources/anti-fraud-measures/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"10 Anti-Fraud Measures to Protect Your Business and Customers","datePublished":"2022-09-20T08:24:09+00:00","dateModified":"2025-12-24T12:20:38+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/anti-fraud-measures/"},"wordCount":1765,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/anti-fraud-measures/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","inLanguage":"en-US","description":"Don't let fraudsters get the better of your business."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/anti-fraud-measures/","url":"https://seon.io/resources/anti-fraud-measures/","name":"10 Anti-Fraud Measures to Protect Your Business & Staff | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/anti-fraud-measures/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2022-09-20T08:24:09+00:00","dateModified":"2025-12-24T12:20:38+00:00","description":"Online criminals target everyone and everything, from giant global corporations to the smallest mom-and-pop shops. Here’s how to fight back.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/anti-fraud-measures/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/statistics-account-takeover-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/statistics-account-takeover-fraud/"},"author":{"name":"Oliver Bognar","@id":"https://seon.io/#/schema/person/b5461bcf75829644bd246becc5637c20"},"headline":"Global Statistics in Account Takeover Fraud for 2026","datePublished":"2022-09-22T07:28:19+00:00","dateModified":"2026-04-14T14:06:47+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/statistics-account-takeover-fraud/"},"wordCount":1587,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/statistics-account-takeover-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","keywords":["Account Takeover"],"articleSection":["Article"],"inLanguage":"en-US","description":"ATO is 18% of all fraud. With $40bn in AI losses, see the 2026 stats behind the 33% surge in cybercrime."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/statistics-account-takeover-fraud/","url":"https://seon.io/resources/statistics-account-takeover-fraud/","name":"Global Statistics in Account Takeover Fraud for 2026","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/statistics-account-takeover-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","datePublished":"2022-09-22T07:28:19+00:00","dateModified":"2026-04-14T14:06:47+00:00","description":"With global identity fraud topping $50bn in 2025, account takeover is a critical 2026 risk. Explore how AI-driven attacks fuel $40bn in annual business losses.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/statistics-account-takeover-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/transaction-monitoring-in-ecommerce/#article","isPartOf":{"@id":"https://seon.io/resources/transaction-monitoring-in-ecommerce/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Transaction Monitoring in Online Retail","datePublished":"2022-09-26T10:21:24+00:00","dateModified":"2025-12-24T12:17:22+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/transaction-monitoring-in-ecommerce/"},"wordCount":879,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/transaction-monitoring-in-ecommerce/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","inLanguage":"en-US","description":"Read our breakdown of transaction monitoring for ecommerce."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/transaction-monitoring-in-ecommerce/","url":"https://seon.io/resources/transaction-monitoring-in-ecommerce/","name":"Transaction Monitoring in Ecommerce | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/transaction-monitoring-in-ecommerce/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","datePublished":"2022-09-26T10:21:24+00:00","dateModified":"2025-12-24T12:17:22+00:00","description":"Transaction monitoring plays a part in battling money laundering and identity theft. Read how it relates to ecommerce and how to do it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/transaction-monitoring-in-ecommerce/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/neobanking-index/#article","isPartOf":{"@id":"https://seon.io/resources/neobanking-index/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Digital Banks in 2025: Navigating Growth &amp; Innovation","datePublished":"2022-09-28T09:23:15+00:00","dateModified":"2025-12-24T12:18:05+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/neobanking-index/"},"wordCount":992,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/neobanking-index/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","inLanguage":"en-US","description":"Discover digital banking trends, growing markets, and how SEON boosts growth with secure AML and fraud prevention tools."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/neobanking-index/","url":"https://seon.io/resources/neobanking-index/","name":"Digital Banks in 2025: Navigating Growth &amp; Innovation | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/neobanking-index/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","datePublished":"2022-09-28T09:23:15+00:00","dateModified":"2025-12-24T12:18:05+00:00","description":"Digital banking grows from $10.9T to $15.4T by 2032. Explore key trends, top countries, and how SEON ensures safe, scalable growth.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/neobanking-index/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/social-media-credit-scoring/#article","isPartOf":{"@id":"https://seon.io/resources/social-media-credit-scoring/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Social Media Credit Scoring: Pros, Cons, and How to Do It","datePublished":"2022-09-29T14:15:28+00:00","dateModified":"2025-12-24T12:17:09+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/social-media-credit-scoring/"},"wordCount":1568,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/social-media-credit-scoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","inLanguage":"en-US","description":"Social media credit scoring is a great solution where financial data is limited."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/social-media-credit-scoring/","url":"https://seon.io/resources/social-media-credit-scoring/","name":"Social Media Credit Scoring: How It Works, Pros & Cons | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/social-media-credit-scoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2022-09-29T14:15:28+00:00","dateModified":"2025-12-24T12:17:09+00:00","description":"Social media credit scoring can be very useful – when done right and in combination with legacy methods. Read pros, cons and strategies for lenders here.","mainEntity":[{"@id":"https://seon.io/resources/social-media-credit-scoring/#faq-question-1664275567786"},{"@id":"https://seon.io/resources/social-media-credit-scoring/#faq-question-1664275569634"},{"@id":"https://seon.io/resources/social-media-credit-scoring/#faq-question-1664379680114"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/social-media-credit-scoring/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/social-media-credit-scoring/#faq-question-1664275567786","position":1,"url":"https://seon.io/resources/social-media-credit-scoring/#faq-question-1664275567786","name":"Does social media affect your credit score?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"As creditors increasingly look for alternative credit scoring methods, social media may eventually start affecting your credit score. Your social presence can be used as a sign to calculate such a score, but not your credit rating in the traditional sense. Also note that they can only glean information that is public. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/social-media-credit-scoring/#faq-question-1664275569634","position":2,"url":"https://seon.io/resources/social-media-credit-scoring/#faq-question-1664275569634","name":"How does social media credit scoring work?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Traditional credit scoring works by looking at a person’s financial information. However, lenders may also consult alternative data, such as social information. The kind of networks where you have an account, your public information, or even the kind of lifestyle you appear to live online (in any public posts) may affect how lenders calculate your credit score.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/social-media-credit-scoring/#faq-question-1664379680114","position":3,"url":"https://seon.io/resources/social-media-credit-scoring/#faq-question-1664379680114","name":"Is social media credit scoring trustworthy?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"In practice, this complementary method of credit scoring allows underwriters and other professionals to make better-informed decisions about applicants. It is reliable and trustworthy because it's based on real-time data and combines hundreds of data points into one profile. Fraudsters cannot replicate the online activity of legitimate customers – and where they can approximate it, it is impossible for them to scale up. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/identity-theft-cryptocurrency/#article","isPartOf":{"@id":"https://seon.io/resources/identity-theft-cryptocurrency/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"How to Detect Identity Theft in the Cryptocurrency Sector","datePublished":"2022-10-04T13:39:00+00:00","dateModified":"2025-12-24T12:16:24+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/identity-theft-cryptocurrency/"},"wordCount":1444,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/identity-theft-cryptocurrency/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","inLanguage":"en-US","description":"Fraudsters like to hide behind the anonymity of cryptocurrencies."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/identity-theft-cryptocurrency/","url":"https://seon.io/resources/identity-theft-cryptocurrency/","name":"How to Detect Identity Theft in the Cryptocurrency Sector | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/identity-theft-cryptocurrency/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","datePublished":"2022-10-04T13:39:00+00:00","dateModified":"2025-12-24T12:16:24+00:00","description":"Crypto companies are under increasing pressure to verify their users’ identities. This is at odds with crypto users’ data-privacy ethos.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/identity-theft-cryptocurrency/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/declined-payments/#article","isPartOf":{"@id":"https://seon.io/resources/declined-payments/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Declines Are Part of Your User Stories – Make the Best of Them","datePublished":"2022-10-05T09:29:56+00:00","dateModified":"2025-12-30T16:10:24+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/declined-payments/"},"wordCount":1108,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/declined-payments/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/11/Gergo_Declines_are_part_of_your_user_stories.png","inLanguage":"en-US","description":"Learn how to use payment declines to your advantage."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/declined-payments/","url":"https://seon.io/resources/declined-payments/","name":"Declines Are Part of Your User Stories – Make the Best of Them | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/declined-payments/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/11/Gergo_Declines_are_part_of_your_user_stories.png","datePublished":"2022-10-05T09:29:56+00:00","dateModified":"2025-12-30T16:10:24+00:00","description":"Declined payments are annoying, but there are lessons to be learned. We take a look at what the problems might be and how you can solve them.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/declined-payments/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/11/Gergo_Declines_are_part_of_your_user_stories.png","contentUrl":"https://seon.io/wp-content/uploads/2022/11/Gergo_Declines_are_part_of_your_user_stories.png","width":1400,"height":800}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/forex-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/forex-fraud/"},"author":{"name":"Dora Pinter","@id":"https://seon.io/#/schema/person/83524103262f8afb1f0587a7c27b7334"},"headline":"Forex Fraud: How to Detect It &amp; Avoid Different Scam Methods","datePublished":"2022-10-06T12:15:05+00:00","dateModified":"2025-12-24T12:14:22+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/forex-fraud/"},"wordCount":2301,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/forex-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","inLanguage":"en-US","description":"Read about the different types of forex scams and fraud."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/forex-fraud/","url":"https://seon.io/resources/forex-fraud/","name":"Forex Fraud: How to Detect It | Avoid Top 10 Scam Types | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/forex-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","datePublished":"2022-10-06T12:15:05+00:00","dateModified":"2025-12-24T12:14:22+00:00","description":"Forex fraud encompasses any fraudulent activity related to foreign exchange trading. Read the basics and how to stop it as a trader or a company.","mainEntity":[{"@id":"https://seon.io/resources/forex-fraud/#faq-question-1664961474906"},{"@id":"https://seon.io/resources/forex-fraud/#faq-question-1664961486858"},{"@id":"https://seon.io/resources/forex-fraud/#faq-question-1664961503051"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/forex-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/forex-fraud/#faq-question-1664961474906","position":1,"url":"https://seon.io/resources/forex-fraud/#faq-question-1664961474906","name":"Can you trust forex?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Generally speaking, forex trading is no more or less trustworthy than any kind of investment, with plenty of legitimate marketplaces as well as bad actors. What you should not trust blindly are unsolicited offers to join an investment scheme.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/forex-fraud/#faq-question-1664961486858","position":2,"url":"https://seon.io/resources/forex-fraud/#faq-question-1664961486858","name":"Can the forex market be manipulated?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"As forex refers to a massive body of $2.4 quadrillion dollars, it is not as susceptible to manipulation as a market with a smaller pool. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/forex-fraud/#faq-question-1664961503051","position":3,"url":"https://seon.io/resources/forex-fraud/#faq-question-1664961503051","name":"How do I recover lost money in forex?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If forex trades were made fraudulently from an existing account you own, traditional methods can be applied:<br />• Speak to the trading platform first. Many have in place failsafes. <br />• Attempt to reverse the charge with your credit provider, or ask for a chargeback.<br />• Report any malicious entities to the authorities.<br />• If the broker is regulated (they should be), then they will provide coverage for your losses in certain circumstances.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/online-marketplace-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/online-marketplace-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Online Marketplace Fraud with 6 Examples &amp; How to Prevent It","datePublished":"2022-10-11T09:27:04+00:00","dateModified":"2026-03-30T10:58:08+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/online-marketplace-fraud/"},"wordCount":1805,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/online-marketplace-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","inLanguage":"en-US","description":"Online marketplaces can be a hotbed of undesirable activity."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/online-marketplace-fraud/","url":"https://seon.io/resources/online-marketplace-fraud/","name":"Marketplace Fraud with 6 Examples & How to Prevent It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/online-marketplace-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","datePublished":"2022-10-11T09:27:04+00:00","dateModified":"2026-03-30T10:58:08+00:00","description":"Fraudsters use online marketplaces to sell non-existent items, buy with stolen cards, and scam good customers. Read about marketplace fraud prevention here.","mainEntity":[{"@id":"https://seon.io/resources/online-marketplace-fraud/#faq-question-1664378305007"},{"@id":"https://seon.io/resources/online-marketplace-fraud/#faq-question-1664378307592"},{"@id":"https://seon.io/resources/online-marketplace-fraud/#faq-question-1664378308507"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/online-marketplace-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/online-marketplace-fraud/#faq-question-1664378305007","position":1,"url":"https://seon.io/resources/online-marketplace-fraud/#faq-question-1664378305007","name":"How do you know if someone is scamming you on Marketplace on Facebook?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Telltale signs of marketplace fraud include accounts with no history, generic names, and stock profile pictures. Behavior-wise, watch out for people who try to get you out of the marketplace to continue the exchange elsewhere, ask to pay extra for your item, or ask for a phone number. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/online-marketplace-fraud/#faq-question-1664378307592","position":2,"url":"https://seon.io/resources/online-marketplace-fraud/#faq-question-1664378307592","name":"What are some examples of marketplace fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Marketplace fraudsters will list items for sale that do not exist. Fraudulent buyers use stolen credit card numbers and ask to pay online rather than meet in person. Others harvest personal data – for instance, by sending you a shipping form. Google Voice fraud happens when fraudsters ask for your phone number, with the goal of registering it for themselves on Google’s VoIP service, to then use it for marketplace fraud.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/online-marketplace-fraud/#faq-question-1664378308507","position":3,"url":"https://seon.io/resources/online-marketplace-fraud/#faq-question-1664378308507","name":"How do you protect yourself from marketplace fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To avoid marketplace fraud, you should follow common sense. If a listing sounds too good to be true, it probably is. Monitor the buyer or seller account for discrepancies or suspicious data. Immediately leave if someone asks you for information that is not relevant to the sale.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/chargeback-vs-refund/#article","isPartOf":{"@id":"https://seon.io/resources/chargeback-vs-refund/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Chargeback vs Refund: Their Differences &amp; How They Work","datePublished":"2022-10-13T11:59:59+00:00","dateModified":"2026-02-24T14:44:31+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/chargeback-vs-refund/"},"wordCount":2323,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/chargeback-vs-refund/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","inLanguage":"en-US","description":"What are the differences and similarities between chargebacks and refunds?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/chargeback-vs-refund/","url":"https://seon.io/resources/chargeback-vs-refund/","name":"Chargebacks vs Refunds: Differences & Why it Matters | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/chargeback-vs-refund/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2022-10-13T11:59:59+00:00","dateModified":"2026-02-24T14:44:31+00:00","description":"We take a deep dive at the key, important differences between chargebacks and refunds, and how your ecommerce company could reduce both.","mainEntity":[{"@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665059347906"},{"@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665059350374"},{"@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660431241"},{"@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660799812"},{"@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660819566"},{"@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660841614"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/chargeback-vs-refund/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665059347906","position":1,"url":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665059347906","name":"Are chargebacks and refunds the same?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No. Though both processes, when completed as normal, result in the customer getting their money back for a purchase that was somehow unsatisfactory, one is issued by the processing bank, and the other by the merchant. For the merchant, there is a significant difference in associated costs, as a refund only returns the customer's spent money, while a chargeback process involves fees, penalties, and potential reputation issues that impact the merchant's bottom line.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665059350374","position":2,"url":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665059350374","name":"Is a refund better than a chargeback?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"For customers, there isn't really any difference. For merchants, certainly. Where a refund only involves returning any money spent by the customer, a chargeback also involves the payment of processing and admin fees and can potentially harm the merchant's reputation with their banking partners. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660431241","position":3,"url":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660431241","name":"What is a void transaction?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A void transaction is whenever a merchant cancels a payment before it has time to reach the customer’s bank. This simply means that the merchant doesn’t intend to collect this payment, for any reason at all, including because it’s been found to be fraudulent.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660799812","position":4,"url":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660799812","name":"Do banks monitor refunds?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Banks and card issuers also monitor refund ratios just like chargeback ratios. However, because an ecommerce or other retail business has much more control over refunds, it is easier to keep those down, compared to chargebacks.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660819566","position":5,"url":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660819566","name":"What is a refund ratio?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"For merchants, a refund ratio is the percentage of your total sales that end up being refunded. Interestingly, card issuers such as Visa and Mastercard allow for much higher refund ratios than chargeback ratios – which is one more reason for merchants to try to encourage refunds.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660841614","position":6,"url":"https://seon.io/resources/chargeback-vs-refund/#faq-question-1665660841614","name":"Is a void like a refund?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A void transaction is even better for a merchant than a refund, because the payment was never processed to begin with. As a result, even fewer fees are attached. A merchant may void a transaction if they realize that the purchase was a result of fraud, for example, or if they have overcharged the customer by mistake. Voiding can help avoid both refunds and chargebacks, when done for good reason and with confidence.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/transaction-monitoring-for-buy-now-pay-later/","url":"https://seon.io/resources/aml-transaction-monitoring/","name":"Transaction Monitoring for Buy Now Pay Later | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-transaction-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2022-10-18T08:57:03+00:00","dateModified":"2025-12-24T12:12:52+00:00","description":"The Buy Now Pay Later industry is fraught with fraud. We show you how transaction monitoring can be a useful tool in your fight against it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/liability-shift/#article","isPartOf":{"@id":"https://seon.io/resources/liability-shift/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Payment Liability Shifts: Understanding and Preparing for Them","datePublished":"2022-10-19T08:34:10+00:00","dateModified":"2025-04-03T08:55:49+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/liability-shift/"},"wordCount":1586,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/liability-shift/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","keywords":["Payment Fraud"],"inLanguage":"en-US","description":"We take a look at why payment liability shifts."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/liability-shift/","url":"https://seon.io/resources/liability-shift/","name":"Payment Liability Shifts: Understanding and Preparing for Them | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/liability-shift/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2022-10-19T08:34:10+00:00","dateModified":"2025-04-03T08:55:49+00:00","description":"A payment liability shift happens when new rules update who is responsible for the payment and for issuing a chargeback. Read more here.","mainEntity":[{"@id":"https://seon.io/resources/liability-shift/#faq-question-1665405702880"},{"@id":"https://seon.io/resources/liability-shift/#faq-question-1665405706398"},{"@id":"https://seon.io/resources/liability-shift/#faq-question-1665405707317"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/liability-shift/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/liability-shift/#faq-question-1665405702880","position":1,"url":"https://seon.io/resources/liability-shift/#faq-question-1665405702880","name":"What does EMV mean?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"EMV is a technology standard created by Europay, Mastercard, and Visa – and is inspired by their names. Europay has since been acquired by Mastercard. The idea remains the same: to enhance payment security at point-of-sale terminals, in particular via the electronic chip you find on many payment cards today.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/liability-shift/#faq-question-1665405706398","position":2,"url":"https://seon.io/resources/liability-shift/#faq-question-1665405706398","name":"What is a chargeback liability shift?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"When a new rule, law or technology is deployed to reduce payment fraud, the responsibility of issuing chargebacks may shift. This liability may shift to the merchant, issuer, or acquirer, depending on the scenario. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/liability-shift/#faq-question-1665405707317","position":3,"url":"https://seon.io/resources/liability-shift/#faq-question-1665405707317","name":"Who is liable for a chargeback?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Who has to process a chargeback refund varies depending on which security measures were put in place at the payment stage. This is why the liability may shift from merchant to acquirer or issuer depending on the circumstances. Generally speaking, when all of the available authentication measures are in use, the liability tends to fall on the card issuer.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-verification/#article","isPartOf":{"@id":"https://seon.io/resources/aml-verification/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"AML Verification: Processes for AML Compliance","datePublished":"2022-10-24T07:54:00+00:00","dateModified":"2025-12-24T12:11:57+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-verification/"},"wordCount":1396,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-verification/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","keywords":["AML"],"inLanguage":"en-US","description":"All you need to know about AML verification and staying compliant with 6AMLD."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-verification/","url":"https://seon.io/resources/aml-verification/","name":"AML Verification: Process & Best Practices | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-verification/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","datePublished":"2022-10-24T07:54:00+00:00","dateModified":"2025-12-24T12:11:57+00:00","description":"Discover the AML verification process, key data checks, and best practices to help you minimize risk and stay compliant.","mainEntity":[{"@id":"https://seon.io/resources/aml-verification/#faq-question-1744195419648"},{"@id":"https://seon.io/resources/aml-verification/#faq-question-1744195619472"},{"@id":"https://seon.io/resources/aml-verification/#faq-question-1711382819118"},{"@id":"https://seon.io/resources/aml-verification/#faq-question-1711382844223"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-verification/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-verification/#faq-question-1744195419648","position":1,"url":"https://seon.io/resources/aml-verification/#faq-question-1744195419648","name":"Who is responsible for conducting AML verification?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Typically, financial institutions, fintech companies, and regulated businesses are responsible. Designated compliance officers or teams use AML software and ID verification tools to meet regulatory requirements and ensure ongoing due diligence.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-verification/#faq-question-1744195619472","position":2,"url":"https://seon.io/resources/aml-verification/#faq-question-1744195619472","name":"What is the purpose of AML verification?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML verification helps detect and prevent financial crimes like money laundering and terrorism financing by verifying customer identities and monitoring transactions. It ensures businesses remain compliant with local and international regulations.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-verification/#faq-question-1711382819118","position":3,"url":"https://seon.io/resources/aml-verification/#faq-question-1711382819118","name":"What is beneficial ownership?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A beneficial owner is defined as a single entity that owns or controls an interest in a legal or commercial entity, such as a company, property, or security. Most commonly, though, knowing the beneficial owner answers the question “Whose money is this, really?” This designation of ownership is in place for the sake of legal responsibility when it comes to that entity’s conduct in the larger economy.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-verification/#faq-question-1711382844223","position":4,"url":"https://seon.io/resources/aml-verification/#faq-question-1711382844223","name":"What is a SAR (Suspicious Activity Report)?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"When transaction monitoring software flags suspicious data, the information is compiled in a report called a SAR – or <a href=\"https://seon.io/resources/dictionary/suspicious-activity-report/\" target=\"_blank\" rel=\"noreferrer noopener\">Suspicious Activity Report</a>. It is formatted in a specific way so that financial analysts and regulators may review it.<br />The easiest way to submit a SAR is via a free online system – via the <a href=\"https://bsaefiling.fincen.treas.gov/main.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BSA E-Filing System</a> in the US or <a href=\"https://www.ukciu.gov.uk/saronline.aspx\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the NCA website</a> in the UK, for example. Some <a href=\"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/\" target=\"_blank\" rel=\"noreferrer noopener\">transaction monitoring software</a> will also include a feature to automatically file them for you. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/high-risk-customers-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/high-risk-customers-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How to Detect High-Risk Customers in iGaming","datePublished":"2022-10-25T07:53:00+00:00","dateModified":"2025-01-28T10:21:12+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/high-risk-customers-igaming/"},"wordCount":1271,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/high-risk-customers-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","inLanguage":"en-US","description":"Who are high-risk customers in iGaming and how do you stop them?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/high-risk-customers-igaming/","url":"https://seon.io/resources/high-risk-customers-igaming/","name":"How to Detect High-Risk Customers in iGaming | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/high-risk-customers-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2022-10-25T07:53:00+00:00","dateModified":"2025-01-28T10:21:12+00:00","description":"iGaming fraud has risen up to 50% year on year recently. Learn how you can easily figure out who's high risk and who's not, without interrupting CX.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/high-risk-customers-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/user-activity-monitoring/#article","isPartOf":{"@id":"https://seon.io/resources/user-activity-monitoring/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"What Is User Activity Monitoring (UAM)? Examples and Best Practices","datePublished":"2022-10-27T14:05:41+00:00","dateModified":"2025-12-24T12:11:15+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/user-activity-monitoring/"},"wordCount":2175,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/user-activity-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","inLanguage":"en-US","description":"What is user activity monitoring and how can your company do it right?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/user-activity-monitoring/","url":"https://seon.io/resources/user-activity-monitoring/","name":"User Activity Monitoring: Examples and Best Practices | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/user-activity-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","datePublished":"2022-10-27T14:05:41+00:00","dateModified":"2025-12-24T12:11:15+00:00","description":"User activity monitoring is helpful for compliance, marketing, IT security, cybersecurity and fraud detection. Learn how to do it right here.","mainEntity":[{"@id":"https://seon.io/resources/user-activity-monitoring/#faq-question-1666864739533"},{"@id":"https://seon.io/resources/user-activity-monitoring/#faq-question-1666864755488"},{"@id":"https://seon.io/resources/user-activity-monitoring/#faq-question-1666864776234"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/user-activity-monitoring/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/user-activity-monitoring/#faq-question-1666864739533","position":1,"url":"https://seon.io/resources/user-activity-monitoring/#faq-question-1666864739533","name":"How do I monitor user activity?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Most companies rely on user activity monitoring software, which logs and records user data. The features may include keylogging, video recordings, or data logs. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/user-activity-monitoring/#faq-question-1666864755488","position":2,"url":"https://seon.io/resources/user-activity-monitoring/#faq-question-1666864755488","name":"What does user activity mean?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"User activity includes any kind of interaction on your server, system, app, or website. This may be a transaction, a signup, a login, or even browsing and filling out a form. <br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/user-activity-monitoring/#faq-question-1666864776234","position":3,"url":"https://seon.io/resources/user-activity-monitoring/#faq-question-1666864776234","name":"What is the difference between user activity and user access monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"User activity monitoring looks at all kinds of user actions, while user access monitoring tends to only focus on access permissions. However, both terms are increasingly used interchangeably, and both are often shortened to UAM.<br /><br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/regulatory-requirements/#article","isPartOf":{"@id":"https://seon.io/resources/regulatory-requirements/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Regulatory Requirements for Fraud Prevention – Your Questions Answered","datePublished":"2022-11-01T11:50:00+00:00","dateModified":"2025-12-24T12:10:31+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/regulatory-requirements/"},"wordCount":1495,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/regulatory-requirements/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","inLanguage":"en-US","description":"For some online businesses, fraud prevention is a legal requirement."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/regulatory-requirements/","url":"https://seon.io/resources/regulatory-requirements/","name":"Learn About Regulatory Requirements for Fraud Prevention | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/regulatory-requirements/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","datePublished":"2022-11-01T11:50:00+00:00","dateModified":"2025-12-24T12:10:31+00:00","description":"How do regulations and laws work in terms of your fraud prevention measures, and what should you check before deploying an anti-fraud solution?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/regulatory-requirements/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/biometrics-hacking/#article","isPartOf":{"@id":"https://seon.io/resources/biometrics-hacking/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Biometrics Hacking: Key Risks, Tactics &amp; Protection","datePublished":"2022-11-02T14:31:09+00:00","dateModified":"2025-12-24T12:09:37+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/biometrics-hacking/"},"wordCount":2230,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/biometrics-hacking/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Biometric spoofing and hacking are rising fast—using deepfakes, fake prints, and stolen data. See how attacks work and secure your business or app."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/biometrics-hacking/","url":"https://seon.io/resources/biometrics-hacking/","name":"Biometrics Hacking: Top Risks & How to Prevent | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/biometrics-hacking/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","datePublished":"2022-11-02T14:31:09+00:00","dateModified":"2025-12-24T12:09:37+00:00","description":"Biometric spoofing and hacking are rising fast, using deepfakes, fake prints, and stolen data. See how attacks work and secure your business or app.","mainEntity":[{"@id":"https://seon.io/resources/biometrics-hacking/#faq-question-1747930281146"},{"@id":"https://seon.io/resources/biometrics-hacking/#faq-question-1747930289746"},{"@id":"https://seon.io/resources/biometrics-hacking/#faq-question-1747930306890"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/biometrics-hacking/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/biometrics-hacking/#faq-question-1747930281146","position":1,"url":"https://seon.io/resources/biometrics-hacking/#faq-question-1747930281146","name":"Can biometrics be hacked or spoofed?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, biometric data can be both hacked and spoofed. Attackers use methods like 3D-printed fingerprints, AI-generated deepfakes, and synthetic identities to trick authentication systems. Without strong defenses like liveness detection, behavioral analysis, and encrypted storage, biometric systems are vulnerable to these advanced tactics.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/biometrics-hacking/#faq-question-1747930289746","position":2,"url":"https://seon.io/resources/biometrics-hacking/#faq-question-1747930289746","name":"How can businesses prevent biometric hacking?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To prevent biometric hacking, businesses should combine biometric checks with real-time fraud detection, device intelligence, and behavioral biometrics. Tools like SEON analyze digital footprints, flag high-risk sessions, and apply custom rules for layered, adaptive protection—making spoofing much harder to execute.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/biometrics-hacking/#faq-question-1747930306890","position":3,"url":"https://seon.io/resources/biometrics-hacking/#faq-question-1747930306890","name":"What are real examples of biometrics hacking?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Real-world biometric hacks include deepfake attacks on banking apps, digital injection of synthetic imagery into facial recognition systems, and major breaches exposing fingerprint and facial data. These incidents show how fraudsters use AI and spoofing tools to bypass even advanced biometric systems.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/tra-exemptions/#article","isPartOf":{"@id":"https://seon.io/resources/tra-exemptions/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"TRA Exemptions in PSD2 to Reduce Friction and Boost Your ROI","datePublished":"2022-11-08T16:34:16+00:00","dateModified":"2025-04-29T16:47:27+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/tra-exemptions/"},"wordCount":1916,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/tra-exemptions/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","inLanguage":"en-US","description":"What is required for a TRA exemption?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/tra-exemptions/","url":"https://seon.io/resources/tra-exemptions/","name":"TRA Exemptions in PSD2: What You Need to Know | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/tra-exemptions/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2022-11-08T16:34:16+00:00","dateModified":"2025-04-29T16:47:27+00:00","description":"Everything you need to know about TRA exemptions for acquirers and issuers – including how to streamline the process without incurring more risk.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/tra-exemptions/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-detection-automation/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-detection-automation/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Fraud Detection Automation: Fight Fraud More Efficiently","datePublished":"2022-11-09T09:43:20+00:00","dateModified":"2025-12-24T12:08:46+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-detection-automation/"},"wordCount":1638,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-detection-automation/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","inLanguage":"en-US","description":"We take a look at how you can automate your fraud prevention."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/fraud-detection-automation/","url":"https://seon.io/resources/fraud-detection-automation/","name":"Fraud Detection Automation: Fight Fraud More Efficiently | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-detection-automation/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2022-11-09T09:43:20+00:00","dateModified":"2025-12-24T12:08:46+00:00","description":"In fraud prevention, automation can ensure you're safe 24/7 while machine learning and AI suggest bespoke risk rules, provide additional scoring, etc.","mainEntity":[{"@id":"https://seon.io/resources/fraud-detection-automation/#faq-question-1667486483121"},{"@id":"https://seon.io/resources/fraud-detection-automation/#faq-question-1667486485933"},{"@id":"https://seon.io/resources/fraud-detection-automation/#faq-question-1667486486852"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-detection-automation/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-automation/#faq-question-1667486483121","position":1,"url":"https://seon.io/resources/fraud-detection-automation/#faq-question-1667486483121","name":"How is technology used in fraud prevention?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud prevention leverages technology such as data analysis, data modeling and machine learning. The data is fed through risk rules which help you calculate how risky user behavior is. Machine learning can also suggest rules based on your business data, as well as give you a <a href=\"https://seon.io/resources/dictionary/blackbox-machine-learning/\" target=\"_blank\" rel=\"noreferrer noopener\">blackbox fraud score</a>.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-automation/#faq-question-1667486485933","position":2,"url":"https://seon.io/resources/fraud-detection-automation/#faq-question-1667486485933","name":"How do you automate fraud detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud detection can be automated by deploying fraud detection software. For instance, SEON can automatically accept user actions deemed low-risk and block those labeled as high-risk. Some automations are based on static rules, while more sophisticated tools can score risk and deploy dynamic automation. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-automation/#faq-question-1667486486852","position":3,"url":"https://seon.io/resources/fraud-detection-automation/#faq-question-1667486486852","name":"How is AI used in fraud detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AI and machine learning is used in fraud detection to suggest risk rules that are relevant to your business after analyzing your business data and fraud cases. Further, machine learning can provide risk scores, though these are not always explainable.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/high-risk-customers-in-banking/","url":"https://seon.io/resources/high-risk-customers/","name":"How to Identify High-Risk Customers in Banking | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/high-risk-customers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2022-11-14T07:17:00+00:00","dateModified":"2025-08-01T13:39:13+00:00","description":"What is considered a high-risk customer in banking and how do you detect them? We take a look at what flags you should be looking for and how to do this.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/seon-for-free/#article","isPartOf":{"@id":"https://seon.io/resources/seon-for-free/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Why We Decided to Give Away SEON for Free","datePublished":"2022-11-16T09:54:24+00:00","dateModified":"2024-12-02T16:28:20+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/seon-for-free/"},"wordCount":613,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/seon-for-free/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-light-1.png","inLanguage":"en-US","description":"Our CEO's thoughts on the new SEON Free plan."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/seon-for-free/","url":"https://seon.io/resources/seon-for-free/","name":"Why We Decided to Give Away SEON for Free | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/seon-for-free/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-light-1.png","datePublished":"2022-11-16T09:54:24+00:00","dateModified":"2024-12-02T16:28:20+00:00","description":"SEON Free was the next logical step in SEON’s upwards trajectory. The idea of democratizing fraud prevention was key to our vision. Read our CEO's thoughts.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/seon-for-free/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-light-1.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-light-1.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/50-percent-rule/#article","isPartOf":{"@id":"https://seon.io/resources/50-percent-rule/"},"author":{"name":"Christina Brichetto","@id":"https://seon.io/#/schema/person/78a49f752b06e61f2f524036856e0ab7"},"headline":"OFAC&#8217;s 50 Percent Rule, Explained 100 Percent","datePublished":"2022-11-22T07:44:00+00:00","dateModified":"2025-12-24T12:07:48+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/50-percent-rule/"},"wordCount":2184,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/50-percent-rule/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"What is the 50 percent rule, and to whom does it apply?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/50-percent-rule/","url":"https://seon.io/resources/50-percent-rule/","name":"OFAC's 50 Percent Rule, Explained 100 Percent | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/50-percent-rule/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2022-11-22T07:44:00+00:00","dateModified":"2025-12-24T12:07:48+00:00","description":"According to the OFAC rule, if a sanctioned entity or entities constitute 50% of a company's ownership, that company is also sanctioned.","mainEntity":[{"@id":"https://seon.io/resources/50-percent-rule/#faq-question-1668601727707"},{"@id":"https://seon.io/resources/50-percent-rule/#faq-question-1668601729230"},{"@id":"https://seon.io/resources/50-percent-rule/#faq-question-1668601730274"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/50-percent-rule/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/50-percent-rule/#faq-question-1668601727707","position":1,"url":"https://seon.io/resources/50-percent-rule/#faq-question-1668601727707","name":"What kinds of transactions are subject to OFAC’s 50 percent rule?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Any financial transaction involving a US entity of any type is subject to OFAC sanction regulation. This can extend to include a non-US entity that acts as a middleman between a US entity and a potentially SDN-listed individual. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/50-percent-rule/#faq-question-1668601729230","position":2,"url":"https://seon.io/resources/50-percent-rule/#faq-question-1668601729230","name":"What kinds of OFAC sanctions exist?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"OFAC sanctions exist across three lists: <br />1.  Specially Designated Nationals (SDN)<br />2. Consolidated Sanctions List<br />3. Additional OFAC Sanctions List","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/50-percent-rule/#faq-question-1668601730274","position":3,"url":"https://seon.io/resources/50-percent-rule/#faq-question-1668601730274","name":"What is the purpose of OFAC sanctions?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"OFAC sanctions are used to diminish the economic power of malignant groups like terrorists and drug traffickers. OFAC itself was created to replace the FFC, a government body whose purpose was to protect foreign currencies and exchanges from falling into Nazi hands during World War II. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/identity-theft-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/identity-theft-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How to Detect &amp; Tackle Identity Theft in iGaming","datePublished":"2022-11-23T14:57:13+00:00","dateModified":"2025-12-30T16:12:01+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/identity-theft-igaming/"},"wordCount":1180,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/identity-theft-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","inLanguage":"en-US","description":"Detecting stolen identities in iGaming requires data, insights and strategies."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/identity-theft-igaming/","url":"https://seon.io/resources/identity-theft-igaming/","name":"How to Detect &amp; Tackle Identity Theft in iGaming | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/identity-theft-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","datePublished":"2022-11-23T14:57:13+00:00","dateModified":"2025-12-30T16:12:01+00:00","description":"There are plenty of good reasons why iGaming operators must identify who their customers are. But how do you do it effectively?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/identity-theft-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/kyc-integration/#article","isPartOf":{"@id":"https://seon.io/resources/kyc-integration/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"KYC Integration: How Does It Work and What Are the Advantages?","datePublished":"2022-11-24T09:49:36+00:00","dateModified":"2026-02-04T12:31:27+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/kyc-integration/"},"wordCount":1307,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/kyc-integration/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","keywords":["KYC"],"inLanguage":"en-US","description":"KYC API integrations could save you time and money."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/kyc-integration/","url":"https://seon.io/resources/kyc-integration/","name":"KYC Integration: How It Works & the Advantages | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-integration/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2022-11-24T09:49:36+00:00","dateModified":"2026-02-04T12:31:27+00:00","description":"As KYC checks become increasingly common for many online businesses, many owners question how to reduce costs and make them more efficient. Find out here.","mainEntity":[{"@id":"https://seon.io/resources/kyc-integration/#faq-question-1668678298807"},{"@id":"https://seon.io/resources/kyc-integration/#faq-question-1668678301593"},{"@id":"https://seon.io/resources/kyc-integration/#faq-question-1668678302507"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/kyc-integration/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-integration/#faq-question-1668678298807","position":1,"url":"https://seon.io/resources/kyc-integration/#faq-question-1668678298807","name":"What is a KYC API?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A KYC API allows your company to send and receive identity verification data from a KYC software application. In simpler terms, it’s the connection between your company and a service that allows you to accept or reject user actions and requests based on identity verification.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-integration/#faq-question-1668678301593","position":2,"url":"https://seon.io/resources/kyc-integration/#faq-question-1668678301593","name":"How long does it take to integrate KYC tools?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It depends on the software you use. Most third-party KYC tools work via APIs, which can take between a few hours to months to integrate, depending on their complexity. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-integration/#faq-question-1668678302507","position":3,"url":"https://seon.io/resources/kyc-integration/#faq-question-1668678302507","name":"How do I understand KYC APIs?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Many third-party KYC software vendors should make their API documentation public so that your developers can easily learn how to integrate, send and receive data as seamlessly as possible.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/high-tech-low-lives-for-criminals-only-results-matter/#article","isPartOf":{"@id":"https://seon.io/resources/high-tech-low-lives-for-criminals-only-results-matter/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"High Tech, Low Lives: For Criminals, Only Results Matter","datePublished":"2022-11-28T10:30:58+00:00","dateModified":"2025-04-03T08:55:39+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/high-tech-low-lives-for-criminals-only-results-matter/"},"wordCount":1091,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/high-tech-low-lives-for-criminals-only-results-matter/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","inLanguage":"en-US","description":"Who said fraudsters need high tech?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/high-tech-low-lives-for-criminals-only-results-matter/","url":"https://seon.io/resources/high-tech-low-lives-for-criminals-only-results-matter/","name":"High Tech, Low Lives: For Criminals, Only Results Matter | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/high-tech-low-lives-for-criminals-only-results-matter/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","datePublished":"2022-11-28T10:30:58+00:00","dateModified":"2025-04-03T08:55:39+00:00","description":"When it comes to fraud and technology, there is a tendency to bat for the cool, and yet criminals still tend to surprise us in less attention-grabbing ways.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/high-tech-low-lives-for-criminals-only-results-matter/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-detect-bonus-abuse-in-forex-trading/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-detect-bonus-abuse-in-forex-trading/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"How to Detect Bonus Abuse in Forex Trading","datePublished":"2022-11-29T10:42:47+00:00","dateModified":"2025-01-09T16:01:58+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-detect-bonus-abuse-in-forex-trading/"},"wordCount":1199,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-detect-bonus-abuse-in-forex-trading/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","keywords":["Forex"],"inLanguage":"en-US","description":"With welcome bonuses comes bonus abuse."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-to-detect-bonus-abuse-in-forex-trading/","url":"https://seon.io/resources/how-to-detect-bonus-abuse-in-forex-trading/","name":"How to Detect Bonus Abuse in Forex Trading - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-detect-bonus-abuse-in-forex-trading/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","datePublished":"2022-11-29T10:42:47+00:00","dateModified":"2025-01-09T16:01:58+00:00","description":"Bonuses are meant to help attract new customers and retain old ones. When fraudsters exploit them, your FX platform stands to lose a lot.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-detect-bonus-abuse-in-forex-trading/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-automation/#article","isPartOf":{"@id":"https://seon.io/resources/aml-automation/"},"author":{"name":"Christina Brichetto","@id":"https://seon.io/#/schema/person/78a49f752b06e61f2f524036856e0ab7"},"headline":"AML Automation: What Is It? Do You Need It?","datePublished":"2022-12-01T07:28:00+00:00","dateModified":"2025-12-24T12:06:11+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-automation/"},"wordCount":958,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-automation/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","keywords":["AML"],"articleSection":["Article"],"inLanguage":"en-US","description":"SEON’s AML checks help bring your firm into compliance."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/aml-automation/","url":"https://seon.io/resources/aml-automation/","name":"AML Automation: What Is It? Do You Need It? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-automation/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","datePublished":"2022-12-01T07:28:00+00:00","dateModified":"2025-12-24T12:06:11+00:00","description":"AML automation streamlines monitoring, screening, and risk scoring. See how an automation AML solution reduces manual work and supports compliance.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-automation/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/identity-theft-in-payment-gateways/#article","isPartOf":{"@id":"https://seon.io/resources/identity-theft-in-payment-gateways/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"How Payment Gateways Can Detect Identity Theft","datePublished":"2022-12-06T08:15:00+00:00","dateModified":"2025-12-30T16:11:26+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/identity-theft-in-payment-gateways/"},"wordCount":1338,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/identity-theft-in-payment-gateways/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/11/How_payment_gateways_detect_identity_theft_featured.png","inLanguage":"en-US","description":"Why is ID theft a problem for payment gateways and how do you stop it?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/identity-theft-in-payment-gateways/","url":"https://seon.io/resources/identity-theft-in-payment-gateways/","name":"How Payment Gateways Can Detect Identity Theft | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/identity-theft-in-payment-gateways/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/11/How_payment_gateways_detect_identity_theft_featured.png","datePublished":"2022-12-06T08:15:00+00:00","dateModified":"2025-12-30T16:11:26+00:00","description":"Fraudsters have no shortage of ways to get stolen credit card numbers. Read how you can detect identity theft and prevent fraud as a payment gateway.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/identity-theft-in-payment-gateways/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/11/How_payment_gateways_detect_identity_theft_featured.png","contentUrl":"https://seon.io/wp-content/uploads/2022/11/How_payment_gateways_detect_identity_theft_featured.png","width":1400,"height":800,"caption":"How Payment Gateways Detect Identity Theft"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/sectoral-sanctions/#article","isPartOf":{"@id":"https://seon.io/resources/sectoral-sanctions/"},"author":{"name":"Christina Brichetto","@id":"https://seon.io/#/schema/person/78a49f752b06e61f2f524036856e0ab7"},"headline":"Sectoral Sanctions: The No-Buy List &amp; Why It&#8217;s Important","datePublished":"2022-12-07T16:56:09+00:00","dateModified":"2025-12-24T12:05:22+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/sectoral-sanctions/"},"wordCount":1633,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/sectoral-sanctions/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","inLanguage":"en-US","description":"Does Your Company Need to be OFAC Compliant?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/sectoral-sanctions/","url":"https://seon.io/resources/sectoral-sanctions/","name":"Sectoral Sanctions - What You Need to Know | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/sectoral-sanctions/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2022-12-07T16:56:09+00:00","dateModified":"2025-12-24T12:05:22+00:00","description":"Sectoral sanctions mean restrictions focused on specific industries within a particular country or region to prevent destabilization of the global economy.","mainEntity":[{"@id":"https://seon.io/resources/sectoral-sanctions/#faq-question-1669911689690"},{"@id":"https://seon.io/resources/sectoral-sanctions/#faq-question-1669911691522"},{"@id":"https://seon.io/resources/sectoral-sanctions/#faq-question-1669911692357"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/sectoral-sanctions/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/sectoral-sanctions/#faq-question-1669911689690","position":1,"url":"https://seon.io/resources/sectoral-sanctions/#faq-question-1669911689690","name":"What sectors are impacted by sectoral sanctions?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Currently, sectoral sanctions in Russia are focused on the energy, defense, finance, and technology sectors, with some of the same financial restrictions imposed on Venezuela and Iran.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/sectoral-sanctions/#faq-question-1669911691522","position":2,"url":"https://seon.io/resources/sectoral-sanctions/#faq-question-1669911691522","name":"What are the three types of OFAC sanctions?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"OFAC currently has lists for 1. Specially Designated Nationals (SDN), 2. non-SDN Consolidated Sanctions, and 3. Other Sanctions.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/sectoral-sanctions/#faq-question-1669911692357","position":3,"url":"https://seon.io/resources/sectoral-sanctions/#faq-question-1669911692357","name":"What countries are sanctioned by the US?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"At the time of writing, the US has sanctioned Cuba, North Korea, Russia, Venezuela, Syria, and Iran.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/background-checks/#article","isPartOf":{"@id":"https://seon.io/resources/background-checks/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"How Background Checks Help Fight Fraud","datePublished":"2022-12-15T09:08:00+00:00","dateModified":"2025-12-24T12:04:43+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/background-checks/"},"wordCount":1190,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/background-checks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","inLanguage":"en-US","description":"We explain how you can use our tools before the background check is done."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/background-checks/","url":"https://seon.io/resources/background-checks/","name":"How Background Checks Help Fight Fraud | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/background-checks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","datePublished":"2022-12-15T09:08:00+00:00","dateModified":"2025-12-24T12:04:43+00:00","description":"Background checks could help alleviate losses by allowing companies to flag untrustworthy individuals before it is too late. Read the how and the why.","mainEntity":[{"@id":"https://seon.io/resources/background-checks/#faq-question-1669807908995"},{"@id":"https://seon.io/resources/background-checks/#faq-question-1669807915982"},{"@id":"https://seon.io/resources/background-checks/#faq-question-1669807916870"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/background-checks/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/background-checks/#faq-question-1669807908995","position":1,"url":"https://seon.io/resources/background-checks/#faq-question-1669807908995","name":"How much does a background check cost?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Background checks tend to cost between $20 to $30. You may find more affordable prices depending on volume and thoroughness.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/background-checks/#faq-question-1669807915982","position":2,"url":"https://seon.io/resources/background-checks/#faq-question-1669807915982","name":"What appears on a background check?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A background check tends to return results relating to criminal records and past employment. More thorough checks will also look at financial history and even social activity.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/background-checks/#faq-question-1669807916870","position":3,"url":"https://seon.io/resources/background-checks/#faq-question-1669807916870","name":"What causes a red flag on a background check?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Felony or even misdemeanor criminal convictions on your criminal record could be a red flag for employers or real estate agents. For online applicants, a suspicious connection via VPN or <a href=\"https://seon.io/resources/dictionary/tor/\" target=\"_blank\" rel=\"noreferrer noopener\">Tor</a> could also signal that you are a fraudster.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ultimate-beneficial-owner/#article","isPartOf":{"@id":"https://seon.io/resources/ultimate-beneficial-owner/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Ultimate Beneficial Owner: What You Need to Know About Companies&#8217; UBO","datePublished":"2022-12-19T14:19:10+00:00","dateModified":"2025-12-30T16:04:10+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ultimate-beneficial-owner/"},"wordCount":1807,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ultimate-beneficial-owner/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","inLanguage":"en-US","description":"Establishing the ultimate beneficial owner (UBO) is essential for AML compliance."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/ultimate-beneficial-owner/","url":"https://seon.io/resources/ultimate-beneficial-owner/","name":"Ultimate Beneficial Owners & Ownership: What to Know | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ultimate-beneficial-owner/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","datePublished":"2022-12-19T14:19:10+00:00","dateModified":"2025-12-30T16:04:10+00:00","description":"Establishing the UBO (ultimate beneficial owner) of a company is essential for a compliant AML program. Read about penalties and things to keep in mind.","mainEntity":[{"@id":"https://seon.io/resources/ultimate-beneficial-owner/#faq-question-1671143962385"},{"@id":"https://seon.io/resources/ultimate-beneficial-owner/#faq-question-1671143967671"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ultimate-beneficial-owner/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ultimate-beneficial-owner/#faq-question-1671143962385","position":1,"url":"https://seon.io/resources/ultimate-beneficial-owner/#faq-question-1671143962385","name":"Is a UBO always a natural person?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"UBOs are always a nameable person, on whom enhanced due diligence (EDD) ought to be carried out. If the beneficial owner of a company appears to be another non-person entity, more research must be carried out to identify the UBO of <em>that</em> entity.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ultimate-beneficial-owner/#faq-question-1671143967671","position":2,"url":"https://seon.io/resources/ultimate-beneficial-owner/#faq-question-1671143967671","name":"Who is exempt from UBO monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Only entities that have no individual beneficial owner do not have to be scrutinized for a UBO. These are almost always government-owned bodies.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/referral-fraud-in-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/referral-fraud-in-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How to Combat Referral Fraud in the iGaming Industry","datePublished":"2022-12-20T08:19:00+00:00","dateModified":"2025-11-20T16:48:33+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/referral-fraud-in-igaming/"},"wordCount":1750,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/referral-fraud-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","inLanguage":"en-US","description":"Referral fraud is hard to detect – but not impossible."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/referral-fraud-in-igaming/","url":"https://seon.io/resources/referral-fraud-in-igaming/","name":"How to Combat Referral Fraud in the iGaming Industry | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/referral-fraud-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","datePublished":"2022-12-20T08:19:00+00:00","dateModified":"2025-11-20T16:48:33+00:00","description":"Referral fraudsters often fall into specific patterns to do their dirty work. Here are some rules to deploy within your fraud-fighting infrastructure.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/referral-fraud-in-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/reduce-cost-of-aml/#article","isPartOf":{"@id":"https://seon.io/resources/reduce-cost-of-aml/"},"author":{"name":"Christina Brichetto","@id":"https://seon.io/#/schema/person/78a49f752b06e61f2f524036856e0ab7"},"headline":"How to Reduce the Cost of AML Compliance","datePublished":"2022-12-22T09:15:00+00:00","dateModified":"2025-11-20T16:48:25+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/reduce-cost-of-aml/"},"wordCount":1663,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/reduce-cost-of-aml/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","keywords":["AML"],"inLanguage":"en-US","description":"You can reduce your AML costs by optimizing your strategy."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/reduce-cost-of-aml/","url":"https://seon.io/resources/reduce-cost-of-aml/","name":"How to Reduce Cost of AML","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/reduce-cost-of-aml/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2022-12-22T09:15:00+00:00","dateModified":"2025-11-20T16:48:25+00:00","description":"AML compliance is expensive, but necessary. The right strategy will help you reduce costs and protect your business. Let's look at the steps.","mainEntity":[{"@id":"https://seon.io/resources/reduce-cost-of-aml/#faq-question-1670407416385"},{"@id":"https://seon.io/resources/reduce-cost-of-aml/#faq-question-1670407431968"},{"@id":"https://seon.io/resources/reduce-cost-of-aml/#faq-question-1670407433277"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/reduce-cost-of-aml/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reduce-cost-of-aml/#faq-question-1670407416385","position":1,"url":"https://seon.io/resources/reduce-cost-of-aml/#faq-question-1670407416385","name":"How can anti-money laundering be improved?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Anti-money laundering can be improved with modern regulatory software, designed to let you analyze user behavior, monitor the onboarding stage, and check the right lists (sanctions, PEP), all from the same dashboard.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reduce-cost-of-aml/#faq-question-1670407431968","position":2,"url":"https://seon.io/resources/reduce-cost-of-aml/#faq-question-1670407431968","name":"What is an AML fee?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Some financial institutions pass on the cost of checking for money laundering to their customers. This is called an AML fee and is designed to meet regulatory requirements from governments to improve anti-money laundering.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reduce-cost-of-aml/#faq-question-1670407433277","position":3,"url":"https://seon.io/resources/reduce-cost-of-aml/#faq-question-1670407433277","name":"How long does an AML registration take?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If you are registering your business to meet AML requirements, it can take up to 45 days for the process to go through, depending on the government agency.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/high-risk-individuals/#article","isPartOf":{"@id":"https://seon.io/resources/high-risk-individuals/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"High-Risk Individuals: How Should You Deal With Them?","datePublished":"2022-12-28T08:25:57+00:00","dateModified":"2025-12-30T15:59:14+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/high-risk-individuals/"},"wordCount":1454,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/high-risk-individuals/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","inLanguage":"en-US","description":"What is a high-risk individual and what should you do about them?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/high-risk-individuals/","url":"https://seon.io/resources/high-risk-individuals/","name":"High-Risk Individuals: How Should You Deal With Them? - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/high-risk-individuals/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","datePublished":"2022-12-28T08:25:57+00:00","dateModified":"2025-12-30T15:59:14+00:00","description":"High-risk individuals are more likely to launder money through your business. This is bad for you and AML compliance. Let's find out why.","mainEntity":[{"@id":"https://seon.io/resources/high-risk-individuals/#faq-question-1671454993708"},{"@id":"https://seon.io/resources/high-risk-individuals/#faq-question-1671455005933"},{"@id":"https://seon.io/resources/high-risk-individuals/#faq-question-1671455005132"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/high-risk-individuals/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/high-risk-individuals/#faq-question-1671454993708","position":1,"url":"https://seon.io/resources/high-risk-individuals/#faq-question-1671454993708","name":"Who are high-risk individuals for money laundering?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"In AML, people may be labeled as high-risk if they are more likely to launder money, be offered bribes, or to be corrupt. This tends to include people in prominent government roles or state institutions. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/high-risk-individuals/#faq-question-1671455005933","position":2,"url":"https://seon.io/resources/high-risk-individuals/#faq-question-1671455005933","name":"What are high-risk businesses in AML?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Financial institutions such as banks and neobanks were the original high-risk businesses where criminals could launder money. However, in recent years, criminals have also exploited real estate companies, luxury retailers, iGaming and online casinos, and more. So legislation has been updated to reflect that, and more types of companies are now mandated to comply with AML requirements.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/high-risk-individuals/#faq-question-1671455005132","position":3,"url":"https://seon.io/resources/high-risk-individuals/#faq-question-1671455005132","name":"What is a high-risk country for money laundering?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The list of high-risk countries for money laundering is defined by government bodies. For instance, in the US, examples of high-risk countries (found on sanctions lists), include Pakistan, Russia and Burkina Faso.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-online-lending/#article","isPartOf":{"@id":"https://seon.io/resources/aml-online-lending/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"How to Detect Money Laundering in Online Lending","datePublished":"2022-12-29T08:28:22+00:00","dateModified":"2026-01-28T20:41:16+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-online-lending/"},"wordCount":1700,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-online-lending/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","inLanguage":"en-US","description":"Online lending is fraught with risks – and AML compliance fines are a major one."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/aml-online-lending/","url":"https://seon.io/resources/aml-online-lending/","name":"How to Detect Money Laundering in Online Lending","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-online-lending/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","datePublished":"2022-12-29T08:28:22+00:00","dateModified":"2026-01-28T20:41:16+00:00","description":"Learn how digital lenders can stop money laundering fast, stay compliant, and protect their platform. Don’t let fraud slow you down!","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-online-lending/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/account-takeover-alert/#article","isPartOf":{"@id":"https://seon.io/resources/account-takeover-alert/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Account Takeover Alerts: When to Flag Suspicious Logins","datePublished":"2023-01-03T08:46:16+00:00","dateModified":"2026-02-24T16:44:23+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/account-takeover-alert/"},"wordCount":1111,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/account-takeover-alert/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","keywords":["Account Takeover"],"inLanguage":"en-US","description":"Here's why you need a robust alert system for account takeovers."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/account-takeover-alert/","url":"https://seon.io/resources/account-takeover-alert/","name":"Account Takeover Alerts: When to Flag Suspicious Logins | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/account-takeover-alert/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2023-01-03T08:46:16+00:00","dateModified":"2026-02-24T16:44:23+00:00","description":"Account takeover alerts can look at user behavior to identify suspicious actions. Read what is high risk and how to optimize your ATO alert strategy.","mainEntity":[{"@id":"https://seon.io/resources/account-takeover-alert/#faq-question-1670588909184"},{"@id":"https://seon.io/resources/account-takeover-alert/#faq-question-1670588906061"},{"@id":"https://seon.io/resources/account-takeover-alert/#faq-question-1670588909929"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/account-takeover-alert/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/account-takeover-alert/#faq-question-1670588909184","position":1,"url":"https://seon.io/resources/account-takeover-alert/#faq-question-1670588909184","name":"What are account login fraud alerts?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An account login may be deemed fraudulent if data or user behavior appears suspicious or even inconsistent with the user's previously observed behavior. Companies will set up alerts designed to instantly flag or review these suspicious logins in order to protect their customers’ accounts. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/account-takeover-alert/#faq-question-1670588906061","position":2,"url":"https://seon.io/resources/account-takeover-alert/#faq-question-1670588906061","name":"What are the signs of an account takeover?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An account takeover will usually result in changed account details, such as an email address, phone number or bank account information. This is what a fraudster will attempt to do as soon as they manage to gain access to a consumer's account. Other signs to watch out for may include an unusual, inconsistent IP address or device configuration.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/account-takeover-alert/#faq-question-1670588909929","position":3,"url":"https://seon.io/resources/account-takeover-alert/#faq-question-1670588909929","name":"What is the difference between identity theft and account takeover?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An account takeover happens when someone illegally logs into your account. It does not necessarily involve stealing your identity. However, if your account contains personal information (PII), the fraudster may use the account as a starting point to steal your ID – which is also known as identity theft.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/chargeback-fees/#article","isPartOf":{"@id":"https://seon.io/resources/chargeback-fees/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Chargeback Fees: Everything Businesses Need to Know","datePublished":"2023-01-04T07:42:44+00:00","dateModified":"2025-11-20T16:45:21+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/chargeback-fees/"},"wordCount":2124,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/chargeback-fees/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","inLanguage":"en-US","description":"Let's take a look at chargeback fees and how you can be prepared for them."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/chargeback-fees/","url":"https://seon.io/resources/chargeback-fees/","name":"Chargeback Fees: Everything Businesses Need to Know - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/chargeback-fees/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","datePublished":"2023-01-04T07:42:44+00:00","dateModified":"2025-11-20T16:45:21+00:00","description":"Chargebacks are a huge pain point for merchants. Let's take a look at chargeback fees and how you can both prevent and be prepared for them.","mainEntity":[{"@id":"https://seon.io/resources/chargeback-fees/#faq-question-1672237344139"},{"@id":"https://seon.io/resources/chargeback-fees/#faq-question-1672237432579"},{"@id":"https://seon.io/resources/chargeback-fees/#faq-question-1672237524799"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/chargeback-fees/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-fees/#faq-question-1672237344139","position":1,"url":"https://seon.io/resources/chargeback-fees/#faq-question-1672237344139","name":"Why do banks charge chargeback fees?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Issuer banks spend resources resolving chargeback requests and disputes, so they are looking to recover some of these in the form of chargeback fees.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-fees/#faq-question-1672237432579","position":2,"url":"https://seon.io/resources/chargeback-fees/#faq-question-1672237432579","name":"Who defines chargeback fees?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"They are calculated and charged by the bank to the merchant who incurred the chargeback.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-fees/#faq-question-1672237524799","position":3,"url":"https://seon.io/resources/chargeback-fees/#faq-question-1672237524799","name":"What are the benefits of chargeback fees?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"According to their advocates, chargeback fees are in place to act as a deterrent to merchants, giving them ample reason to be meticulous with their fraud prevention, quality control, customer service and overall fulfillment, when handling card not present payments. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/transaction-monitoring-in-forex-trading/","url":"https://seon.io/resources/aml-transaction-monitoring/","name":"Learn About Transaction Monitoring in Forex Trading | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-transaction-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2023-01-09T07:33:00+00:00","dateModified":"2025-11-20T16:44:55+00:00","description":"Transaction monitoring for your Forex platform can help you meet AML regulations, cover compliance requirements, and spot suspicious activity.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/b2b-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/b2b-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"B2B Fraud: Will 2023 Be the Year Fraud Goes B2B?","datePublished":"2023-01-10T08:17:00+00:00","dateModified":"2025-12-30T15:58:50+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/b2b-fraud/"},"wordCount":1385,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/b2b-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","inLanguage":"en-US","description":"What is business to business fraud and why is it a rising threat?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/b2b-fraud/","url":"https://seon.io/resources/b2b-fraud/","name":"B2B Fraud: Will 2023 Be the Year Fraud Goes B2B? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/b2b-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","datePublished":"2023-01-10T08:17:00+00:00","dateModified":"2025-12-30T15:58:50+00:00","description":"Business-to-business fraud can take different guises – but it is set to become a trend in 2023. Read about its types, methods and prevention advice.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/b2b-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/watchlist-screening/#article","isPartOf":{"@id":"https://seon.io/resources/watchlist-screening/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"AML Watchlist Screening Guide: Detect High-Risk Individuals Early","datePublished":"2023-01-12T07:55:00+00:00","dateModified":"2025-12-01T10:11:36+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/watchlist-screening/"},"wordCount":1721,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/watchlist-screening/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","inLanguage":"en-US","description":"Find out about crime and crime watchlist checks, and how SEON can help."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/watchlist-screening/","url":"https://seon.io/resources/watchlist-screening/","name":"AML Watchlist Screening Guide: Detect High-Risk Individuals Early","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/watchlist-screening/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","datePublished":"2023-01-12T07:55:00+00:00","dateModified":"2025-12-01T10:11:36+00:00","description":"Learn how AML watchlist screening works, explore key watchlist types, and discover best practices to detect high-risk individuals and protect your business","mainEntity":[{"@id":"https://seon.io/resources/watchlist-screening/#faq-question-1673433986206"},{"@id":"https://seon.io/resources/watchlist-screening/#faq-question-1673433988129"},{"@id":"https://seon.io/resources/watchlist-screening/#faq-question-1673433988829"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/watchlist-screening/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/watchlist-screening/#faq-question-1673433986206","position":1,"url":"https://seon.io/resources/watchlist-screening/#faq-question-1673433986206","name":"What are examples of AML crime lists?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Known AML crime lists include Europol fugitives, Interpol’s Most Wanted List, and the FBI’s Most Wanted &amp; Fugitives.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/watchlist-screening/#faq-question-1673433988129","position":2,"url":"https://seon.io/resources/watchlist-screening/#faq-question-1673433988129","name":"What is the difference between crime and sanctions watchlists?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Crime watchlists focus on individuals who have been convicted of crimes, while sanctions watchlists contain the names of individuals who are prevented from doing business in certain countries. Note that these watchlists are often checked at the same time – especially when you're doing so with automated AML tools.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/watchlist-screening/#faq-question-1673433988829","position":3,"url":"https://seon.io/resources/watchlist-screening/#faq-question-1673433988829","name":"What is AML fuzzy matching?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML tools must check for names on databases. Unfortunately, names are a difficult type of data to handle, because of spelling variations, namesakes, and various alphabets. This is why an AML screening tool will usually let you perform a <a href=\"https://docs.seon.io/integration/customer-screening-and-monitoring\">fuzzy search</a> for names that include phonetic similarity, transliteration differences, or hyphenation. In essence, this helps provide more accurate results.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-compliance-officer/#article","isPartOf":{"@id":"https://seon.io/resources/aml-compliance-officer/"},"author":{"name":"Christina Brichetto","@id":"https://seon.io/#/schema/person/78a49f752b06e61f2f524036856e0ab7"},"headline":"AML Compliance Officers: What They Do and Why They’re Crucial","datePublished":"2023-01-16T09:51:57+00:00","dateModified":"2025-12-24T12:03:58+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-compliance-officer/"},"wordCount":1662,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-compliance-officer/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","keywords":["AML"],"inLanguage":"en-US","description":"Where AML compliance is a legal requirement having a compliance officer is essential."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-compliance-officer/","url":"https://seon.io/resources/aml-compliance-officer/","name":"Role of AML Compliance Officer: Duties & Tips | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-compliance-officer/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","datePublished":"2023-01-16T09:51:57+00:00","dateModified":"2025-12-24T12:03:58+00:00","description":"Learn the key responsibilities of an AML compliance officer and best practices from SEON experts.","mainEntity":[{"@id":"https://seon.io/resources/aml-compliance-officer/#faq-question-1673444627742"},{"@id":"https://seon.io/resources/aml-compliance-officer/#faq-question-1673444629324"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-compliance-officer/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-compliance-officer/#faq-question-1673444627742","position":1,"url":"https://seon.io/resources/aml-compliance-officer/#faq-question-1673444627742","name":"What is an AML compliance officer and what do they do?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An AML compliance officer is a professional who ensures that their organization(s) have the right resources in place to prevent and combat organizational money laundering. They do this by implementing anti-money laundering resources and measures in the workplace and reporting any suspicious activity to senior management.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-compliance-officer/#faq-question-1673444629324","position":2,"url":"https://seon.io/resources/aml-compliance-officer/#faq-question-1673444629324","name":"What kind of experts are AML compliance officers and why are they necessary?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML compliance officers are experts in the field of anti-money laundering. Because many people do not know how best to interpret AML legislation, as well as detect adjacent internal and external risks, organizations hire AML compliance officers for their vigilance and expertise.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/chargeback-in-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/chargeback-in-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How to Detect Fraudulent Chargebacks in the iGaming Industry","datePublished":"2025-07-11T11:21:00+00:00","dateModified":"2026-02-24T14:48:14+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/chargeback-in-igaming/"},"wordCount":1219,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/chargeback-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"iGaming companies are no strangers to card fraud – and chargebacks."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/chargeback-in-igaming/","url":"https://seon.io/resources/chargeback-in-igaming/","name":"How to Detect Chargebacks in the iGaming Industry | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/chargeback-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","datePublished":"2025-07-11T11:21:00+00:00","dateModified":"2026-02-24T14:48:14+00:00","description":"Learn how to prevent iGaming chargebacks by identifying fraud early, from signup to payment protect revenue.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/chargeback-in-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/credential-stuffing/#article","isPartOf":{"@id":"https://seon.io/resources/credential-stuffing/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Credential Stuffing: Prevention &amp; Best Practices for Defense","datePublished":"2023-01-19T13:22:00+00:00","dateModified":"2025-11-20T16:41:04+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/credential-stuffing/"},"wordCount":1358,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/credential-stuffing/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"How can you defend your business from credential stuffing attacks?"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/credential-stuffing/","url":"https://seon.io/resources/credential-stuffing/","name":"Credential Stuffing: Prevention & Best Practices Against It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/credential-stuffing/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2023-01-19T13:22:00+00:00","dateModified":"2025-11-20T16:41:04+00:00","description":"Credential stuffing is when attempts are made to force their way into a website with leaked or stolen databases of login credentials. How do you stop it?","mainEntity":[{"@id":"https://seon.io/resources/credential-stuffing/#faq-question-1748009723474"},{"@id":"https://seon.io/resources/credential-stuffing/#faq-question-1748009799159"},{"@id":"https://seon.io/resources/credential-stuffing/#faq-question-1748009805404"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/credential-stuffing/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/credential-stuffing/#faq-question-1748009723474","position":1,"url":"https://seon.io/resources/credential-stuffing/#faq-question-1748009723474","name":"What’s the difference between credential stuffing and brute force attacks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Credential stuffing is a type of brute force attack, but the two differ in method. In a brute force attack, hackers use automation to guess passwords for known usernames or emails. Credential stuffing, on the other hand, involves attackers using already leaked or stolen username-password pairs to try logging into multiple accounts, banking on users reusing credentials across platforms. Both tactics involve a high volume of login attempts with the goal of gaining unauthorized access.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/credential-stuffing/#faq-question-1748009799159","position":2,"url":"https://seon.io/resources/credential-stuffing/#faq-question-1748009799159","name":"How common are credential stuffing attacks today?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Credential stuffing has become one of the fastest-growing cyber threats, with attackers increasingly exploiting reused passwords from past data breaches. Recent cases, such as the 2025 superannuation breach in Australia, show just how widespread and damaging these attacks have become—impacting thousands of accounts and leading to major financial losses.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/credential-stuffing/#faq-question-1748009805404","position":3,"url":"https://seon.io/resources/credential-stuffing/#faq-question-1748009805404","name":"Why is credential stuffing so hard to stop?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Credential stuffing is hard to detect because it mimics real user behavior and uses valid credentials. Attackers rely on bots, IP spoofing, and automation to scale login attempts, often bypassing basic security. Without advanced detection tools like device fingerprinting or velocity checks, businesses struggle to differentiate between fraudsters and legitimate users.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/payment-fraud-in-cryptocurrency/#article","isPartOf":{"@id":"https://seon.io/resources/payment-fraud-in-cryptocurrency/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"How to Detect Payment Fraud in Cryptocurrency Exchanges","datePublished":"2023-01-20T09:43:12+00:00","dateModified":"2026-04-15T08:49:54+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/payment-fraud-in-cryptocurrency/"},"wordCount":1400,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/payment-fraud-in-cryptocurrency/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Crypto exchanges offer a lucrative, anonymous playground for payment fraudsters."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/payment-fraud-in-cryptocurrency/","url":"https://seon.io/resources/payment-fraud-in-cryptocurrency/","name":"How to Detect Payment Fraud in Crypto Exchanges | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/payment-fraud-in-cryptocurrency/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","datePublished":"2023-01-20T09:43:12+00:00","dateModified":"2026-04-15T08:49:54+00:00","description":"Crypto exchanges offer a lucrative, anonymous playground for payment fraudsters, but how can their malicious games be prevented? SEON explores the possibilities.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/payment-fraud-in-cryptocurrency/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/account-takeover-risk-assessment/#article","isPartOf":{"@id":"https://seon.io/resources/account-takeover-risk-assessment/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"Account Takeover Risk Assessment: How It Works and Best Practices","datePublished":"2023-01-23T09:44:16+00:00","dateModified":"2026-03-31T11:50:29+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/account-takeover-risk-assessment/"},"wordCount":1101,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/account-takeover-risk-assessment/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Account takeover risk assessments are key to ensuring you are not vulnerable to ATO attacks."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/account-takeover-risk-assessment/","url":"https://seon.io/resources/account-takeover-risk-assessment/","name":"Account Takeover Risk Assessment: How It Works & Best Practices","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/account-takeover-risk-assessment/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","datePublished":"2023-01-23T09:44:16+00:00","dateModified":"2026-03-31T11:50:29+00:00","description":"Account takeover risk assessments are essential to ensuring your organization is not vulnerable to ATO attacks. Learn how to be prepared and protect yourself.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/account-takeover-risk-assessment/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/digital-onboarding-in-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/digital-onboarding-in-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How to Secure Digital Onboarding in iGaming","datePublished":"2023-01-24T13:25:02+00:00","dateModified":"2025-07-14T10:21:13+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/digital-onboarding-in-igaming/"},"wordCount":1111,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/digital-onboarding-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","inLanguage":"en-US","description":"Digital onboarding in iGaming made secure. Prevent bonus abuse & fake signups while keeping player signup smooth and instant."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/digital-onboarding-in-igaming/","url":"https://seon.io/resources/digital-onboarding-in-igaming/","name":"How to Secure Digital Onboarding in iGaming | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/digital-onboarding-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2023-01-24T13:25:02+00:00","dateModified":"2025-07-14T10:21:13+00:00","description":"Digital onboarding in iGaming made secure. Prevent bonus abuse & fake signups while keeping player signup smooth and instant.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/digital-onboarding-in-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/vendor-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/vendor-fraud/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Vendor Fraud: How to Identify and Prevent It","datePublished":"2023-01-25T11:50:04+00:00","dateModified":"2025-12-30T15:58:17+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/vendor-fraud/"},"wordCount":2129,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/vendor-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","inLanguage":"en-US","description":"Vendor fraud is on the rise, and especially so in the online world."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/vendor-fraud/","url":"https://seon.io/resources/vendor-fraud/","name":"Vendor Fraud: How to Identify and Prevent It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/vendor-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2023-01-25T11:50:04+00:00","dateModified":"2025-12-30T15:58:17+00:00","description":"Vendor fraud is on the rise, and especially so in the online world. Find out more about its indicators, types, and prevention here.","mainEntity":[{"@id":"https://seon.io/resources/vendor-fraud/#faq-question-1674489317544"},{"@id":"https://seon.io/resources/vendor-fraud/#faq-question-1674489475801"},{"@id":"https://seon.io/resources/vendor-fraud/#faq-question-1674492050346"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/vendor-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/vendor-fraud/#faq-question-1674489317544","position":1,"url":"https://seon.io/resources/vendor-fraud/#faq-question-1674489317544","name":"How can online vendors protect against fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Online merchants are affected by fraud on many fronts, coming from consumers as well as other vendors. One of the key protections is to put in place a fraud prevention tool or solution stack that corresponds to your particular needs and attack surface.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/vendor-fraud/#faq-question-1674489475801","position":2,"url":"https://seon.io/resources/vendor-fraud/#faq-question-1674489475801","name":"How do you deal with fictitious vendor fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To protect against fraud originating with fake vendors, do your due diligence in the form of know-your-business (KYB) checks and ensure all your employees are aware of this risk. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/vendor-fraud/#faq-question-1674492050346","position":3,"url":"https://seon.io/resources/vendor-fraud/#faq-question-1674492050346","name":"What should a company do if it falls victim to a vendor scam?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If you realize have fallen victim to a vendor scam, speak to the bank that processed your payment as soon as possible. They might be able to help resolve the issue, depending on the timing.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/high-risk-customers-in-forex-trading/","url":"https://seon.io/resources/high-risk-customers/","name":"How Forex Trading Companies Can Spot High-Risk Customers | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/high-risk-customers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","datePublished":"2023-02-03T10:51:39+00:00","dateModified":"2025-11-20T16:39:14+00:00","description":"Failing to identify high-risk customers can have a number of negative consequences for forex trading companies including fines, and reputational damage.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/transaction-monitoring-in-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/transaction-monitoring-in-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Transaction Monitoring in iGaming: How It’s Used to Fight Fraud","datePublished":"2025-07-07T12:49:55+00:00","dateModified":"2026-01-21T14:30:07+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/transaction-monitoring-in-igaming/"},"wordCount":837,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/transaction-monitoring-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Transaction monitoring is vital to reducing suspicious activity in iGaming. Learn about how best to protect your iGaming site."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/transaction-monitoring-in-igaming/","url":"https://seon.io/resources/transaction-monitoring-in-igaming/","name":"Transaction Monitoring in iGaming: How to Fight Fraud | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/transaction-monitoring-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","datePublished":"2025-07-07T12:49:55+00:00","dateModified":"2026-01-21T14:30:07+00:00","description":"Transaction monitoring is vital to reducing suspicious activity in iGaming. Learn about how best to protect your iGaming site.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/transaction-monitoring-in-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-forex-trading/#article","isPartOf":{"@id":"https://seon.io/resources/aml-forex-trading/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"How to Detect Money Laundering in Forex Trading","datePublished":"2023-02-09T09:00:00+00:00","dateModified":"2025-08-12T13:35:51+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-forex-trading/"},"wordCount":2528,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-forex-trading/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","keywords":["AML"],"inLanguage":"en-US","description":"Read up on how best to prepare yourself to combat money laundering in forex trading."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/aml-forex-trading/","url":"https://seon.io/resources/aml-forex-trading/","name":"How to Detect Money Laundering in Forex Trading | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-forex-trading/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","datePublished":"2023-02-09T09:00:00+00:00","dateModified":"2025-08-12T13:35:51+00:00","description":"Forex trading is a major platform for money launderers to exploit. Learn how to detect money laundering in forex trading.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-forex-trading/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/kyc-automation/#article","isPartOf":{"@id":"https://seon.io/resources/kyc-automation/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"KYC Automation: Everything You Need to Know","datePublished":"2023-02-16T15:10:49+00:00","dateModified":"2026-02-04T12:31:05+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/kyc-automation/"},"wordCount":1309,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/kyc-automation/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","keywords":["KYC"],"inLanguage":"en-US","description":"We look at KYC automation and how it compares to manual KYC."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/kyc-automation/","url":"https://seon.io/resources/kyc-automation/","name":"KYC Automation: Everything You Need to Know | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-automation/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","datePublished":"2023-02-16T15:10:49+00:00","dateModified":"2026-02-04T12:31:05+00:00","description":"We've put together everything you need to know about KYC automation, from benefits and use cases, to how it compares to manual KYC!","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/kyc-automation/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-screening/#article","isPartOf":{"@id":"https://seon.io/resources/aml-screening/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"What Is AML Screening &amp; Why Is It Important?","datePublished":"2023-02-20T15:20:52+00:00","dateModified":"2026-02-24T14:30:57+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-screening/"},"wordCount":1513,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-screening/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","inLanguage":"en-US","description":"Learn what AML screening is, how it works, key types and sanction lists, and why it matters for compliance."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-screening/","url":"https://seon.io/resources/aml-screening/","name":"AML Screening Guide: What It Is & Why It Matters | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-screening/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","datePublished":"2023-02-20T15:20:52+00:00","dateModified":"2026-02-24T14:30:57+00:00","description":"Learn what AML screening is, how it works, the types of screening, key sanction lists, and why it’s essential for compliance.","mainEntity":[{"@id":"https://seon.io/resources/aml-screening/#faq-question-1758642238332"},{"@id":"https://seon.io/resources/aml-screening/#faq-question-1758642252767"},{"@id":"https://seon.io/resources/aml-screening/#faq-question-1758642265996"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-screening/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-screening/#faq-question-1758642238332","position":1,"url":"https://seon.io/resources/aml-screening/#faq-question-1758642238332","name":"Who should do AML screening?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML screening is required for businesses handling financial transactions or operating in high-value sectors targeted by money launderers. This includes banks, investment firms, insurers, casinos, forex and real estate companies, and even high-value retailers like art dealers. In many jurisdictions, including the US, AML screening is a legal requirement and a core safeguard against financial crime.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-screening/#faq-question-1758642252767","position":2,"url":"https://seon.io/resources/aml-screening/#faq-question-1758642252767","name":"​​What is AML screening and why is it important?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML screening is the process of checking individuals or entities against sanctions, PEP, crime, and watchlists to detect potential involvement in financial crimes like money laundering or terrorism financing. It's crucial for meeting regulatory requirements, protecting businesses from legal and reputational risk, and helping prevent criminal activity before it enters the system.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-screening/#faq-question-1758642265996","position":3,"url":"https://seon.io/resources/aml-screening/#faq-question-1758642265996","name":"What happens if a business doesn’t perform AML screening?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Failing to conduct AML screening can lead to severe consequences — including regulatory fines, reputational damage, and increased exposure to fraud or criminal networks. In some cases, noncompliance can even result in the business itself being blacklisted or penalized by authorities.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/vpn-detection-tests/#article","isPartOf":{"@id":"https://seon.io/resources/vpn-detection-tests/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"VPN Detection: How to Spot Anonymized Traffic and Stop Fraud","datePublished":"2023-02-23T09:00:00+00:00","dateModified":"2026-02-24T11:40:28+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/vpn-detection-tests/"},"wordCount":1498,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/vpn-detection-tests/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"How VPNs are detected, and what VPN use might mean."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/vpn-detection-tests/","url":"https://seon.io/resources/vpn-detection-tests/","name":"VPN Detection Tests: How to Spot Masked IPs & Stop Fraud (2026)","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/vpn-detection-tests/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2023-02-23T09:00:00+00:00","dateModified":"2026-02-24T11:40:28+00:00","description":"Detect VPN usage to prevent fraud and assess risk in real-time. Learn how to improve security with VPN detection tests.","mainEntity":[{"@id":"https://seon.io/resources/vpn-detection-tests/#faq-question-1688398127796"},{"@id":"https://seon.io/resources/vpn-detection-tests/#faq-question-1688398137535"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/vpn-detection-tests/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/vpn-detection-tests/#faq-question-1688398127796","position":1,"url":"https://seon.io/resources/vpn-detection-tests/#faq-question-1688398127796","name":"How can I test the effectiveness of my VPN?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"In terms of speed, compare your connectivity speed normally versus when you are connected to your VPN on an online tool like speedtest.net. To test how well your VPN is masking your location, other tools like IPleak can IP, DNS, and WebRTC exist that gather your data from behind your VPN, which you can then compare to when you are connecting normally.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/vpn-detection-tests/#faq-question-1688398137535","position":2,"url":"https://seon.io/resources/vpn-detection-tests/#faq-question-1688398137535","name":"How can I check the encryption quality of my VPN?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Start by researching your VPN provider, either by looking at reviews posted online. Also research what VPN protocols your provider is using, as different protocols offer different capabilities and vulnerabilities and your use case may require a certain level of strength. You can then test how well the encryptions are working using tools like IPleak, mentioned above.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/layering-money-laundering/#article","isPartOf":{"@id":"https://seon.io/resources/layering-money-laundering/"},"author":{"name":"Agnes Csoka","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6"},"headline":"What Is Layering In Money Laundering &amp; How Does It Work?","datePublished":"2023-03-07T14:17:12+00:00","dateModified":"2025-11-20T16:14:31+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/layering-money-laundering/"},"wordCount":1130,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/layering-money-laundering/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","keywords":["AML"],"articleSection":["Article"],"inLanguage":"en-US","description":"Layering is the process of making transactions as difficult to trace as possible."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/layering-money-laundering/","url":"https://seon.io/resources/layering-money-laundering/","name":"What Is Layering in Money Laundering? Methods & Red Flags","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/layering-money-laundering/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2023-03-07T14:17:12+00:00","dateModified":"2025-11-20T16:14:31+00:00","description":"Understand layering in money laundering, how criminals hide funds through complex transactions, and how AML tools detect it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/layering-money-laundering/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/detect-money-laundering-in-ecommerce/#article","isPartOf":{"@id":"https://seon.io/resources/detect-money-laundering-in-ecommerce/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"How to Detect Money Laundering in eCommerce","datePublished":"2023-03-10T08:57:46+00:00","dateModified":"2026-01-19T15:21:25+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/detect-money-laundering-in-ecommerce/"},"wordCount":1029,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/detect-money-laundering-in-ecommerce/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how money laundering impacts eCommerce, how AML works in practice, and which signals and rules help spot suspicious activity early."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/detect-money-laundering-in-ecommerce/","url":"https://seon.io/resources/detect-money-laundering-in-ecommerce/","name":"How to Detect Money Laundering in eCommerce | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/detect-money-laundering-in-ecommerce/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","datePublished":"2023-03-10T08:57:46+00:00","dateModified":"2026-01-19T15:21:25+00:00","description":"Learn how money laundering impacts eCommerce, how AML works in practice, and which signals and rules help spot suspicious activity early.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/detect-money-laundering-in-ecommerce/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/kyc-online-lending/#article","isPartOf":{"@id":"https://seon.io/resources/kyc-online-lending/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"What You Need to Know About KYC for Online Lending","datePublished":"2023-03-15T11:45:35+00:00","dateModified":"2025-12-10T13:38:39+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/kyc-online-lending/"},"wordCount":830,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/kyc-online-lending/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Explore key KYC requirements for online lenders and how SEON helps reduce fraud and streamline onboarding."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/kyc-online-lending/","url":"https://seon.io/resources/kyc-online-lending/","name":"KYC for Online Lenders: Essentials & Risk Checks | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-online-lending/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","datePublished":"2023-03-15T11:45:35+00:00","dateModified":"2025-12-10T13:38:39+00:00","description":"Explore key KYC requirements for online lenders and how SEON helps reduce fraud and streamline onboarding.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/kyc-online-lending/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/cft-aml/#article","isPartOf":{"@id":"https://seon.io/resources/cft-aml/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"AML &amp; CFT: Combating Money Laundering &amp; Financial Terrorism Financing","datePublished":"2023-03-20T10:57:57+00:00","dateModified":"2025-11-20T16:32:59+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/cft-aml/"},"wordCount":1764,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/cft-aml/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","inLanguage":"en-US","description":"Everything businesses need to know about combatting money laundering and financial terrorism financing."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/cft-aml/","url":"https://seon.io/resources/cft-aml/","name":"Exploring AML & CFT (Combating Financial Terrorism) | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/cft-aml/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","datePublished":"2023-03-20T10:57:57+00:00","dateModified":"2025-11-20T16:32:59+00:00","description":"AML/CFT refers to the regulations put in place to actively prevent money laundering and the financing of terrorism. Learn why it is important to stay compliant.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/cft-aml/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/payment-fraud-buy-now-pay-later/","url":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/","name":"How to Detect Payment Fraud in BNPL | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/building-a-stronger-payment-fraud-prevention-framework-for-your-business/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","datePublished":"2023-03-29T11:49:33+00:00","dateModified":"2025-04-29T17:40:06+00:00","description":"The BNPL market is expected to grow over 20% year-on-year. BNPL providers have their hands full with BNPL payment fraud. See how you can tackle it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/new-account-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/new-account-fraud/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"New Account Fraud: What It Is and How to Prevent It","datePublished":"2023-03-30T11:00:03+00:00","dateModified":"2025-12-12T11:02:12+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/new-account-fraud/"},"wordCount":1803,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/new-account-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","inLanguage":"en-US","description":"New account fraud explained: how it happens, red flags, and ways to stop fake or stolen-identity signups during onboarding."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/new-account-fraud/","url":"https://seon.io/resources/new-account-fraud/","name":"New Account Fraud: What It Is And How To Prevent It","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/new-account-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2023-03-30T11:00:03+00:00","dateModified":"2025-12-12T11:02:12+00:00","description":"New account fraud explained, how it happens, common red flags, and practical ways to stop fake or stolen-identity signups during onboarding.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/new-account-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/multi-accounting-cryptocurrency/#article","isPartOf":{"@id":"https://seon.io/resources/multi-accounting-cryptocurrency/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"How to Detect Multi-Accounting Fraud in Cryptocurrency","datePublished":"2023-04-05T11:23:29+00:00","dateModified":"2025-11-20T16:31:56+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/multi-accounting-cryptocurrency/"},"wordCount":1882,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/multi-accounting-cryptocurrency/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","inLanguage":"en-US","description":"Everything you need to know about multi-accounting fraud in cryptocurrency and how to prevent it."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/multi-accounting-cryptocurrency/","url":"https://seon.io/resources/multi-accounting-cryptocurrency/","name":"How to Detect Multi-Accounting Fraud in Cryptocurrency | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/multi-accounting-cryptocurrency/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","datePublished":"2023-04-05T11:23:29+00:00","dateModified":"2025-11-20T16:31:56+00:00","description":"We look at multi-accounting fraud in cryptocurrency, how to detect it, and how SEON can help to combat it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/multi-accounting-cryptocurrency/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","width":832,"height":469}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-risk-assessment/#article","isPartOf":{"@id":"https://seon.io/resources/aml-risk-assessment/"},"author":{"name":"Christina Brichetto","@id":"https://seon.io/#/schema/person/78a49f752b06e61f2f524036856e0ab7"},"headline":"AML Risk Assessment – What Is It? How Does It Work?","datePublished":"2023-04-13T09:35:26+00:00","dateModified":"2025-12-30T16:12:20+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-risk-assessment/"},"wordCount":1807,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-risk-assessment/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","inLanguage":"en-US","description":"Money launderers can make unwitting accomplices of any business they interact with, and thus expose those entities to their own legal woes. These criminals frequently make victims of organizations in the money service and ecommerce space, and that’s why anti-money laundering risk assessments are so important to all kinds of businesses worldwide.\n\n\n\nSuch assessments are carried out in a variety of ways, and the best ones see the risk assessor considering the latest trends in money laundering, as well as what mistakes leave businesses open to suspicious customers and transactions.\n\n\n\nLet’s focus on what AML risk assessments are and how they’re conducted.\n\n\n\nWhat Is an AML Risk Assessment?\n\n\n\nAn AML (anti-money laundering) risk assessment is the process by which an organization assesses the extent to which it is both protected from and vulnerable to money laundering operations. This can – and should – be carried out regularly via internal controls,  AML software and third parties.\n\n\n\nThe assessment is carried out differently from organization to organization and the industry guidance they choose to follow, but it should be as holistic as possible – that means assessing the AML efficacy of all manner of organizational risk categories, such as business operations, customer bases, and human factors.\n\n\n\nAML risk assessments can and should be ongoing processes because the activities of money launderers and AML precautions develop over time. For reasons that will be made clearer in the next section, such risk assessments can be optional but may also be required by certain financial authorities.\n\n\n\nAre AML Risk Assessments Required?\n\n\n\nNot necessarily. Whether your organization will be required to carry out an AML risk assessment hinges on whether you are in an industry and a jurisdiction where you could face penalties for refusing to do such an assessment.&nbsp;\n\n\n\nWhile many organizations take it upon themselves to do optional AML risk assessments to meet their own business goals, other organizations may only do them when they are legally required to by one or more authorities. Nevertheless, regardless of the context, it is very rare that an organization can successfully claim exemption from carrying out and disclosing an AML risk assessment if the authorities legally demand it.\n\n\n\nIt is also useful to note that, although the AML risk assessment itself is often not required by law, many components that help to make up a complete AML risk assessment are in fact required. For instance, a staple part of such a risk assessment is an accurate list of company transactions – and this is essential both in the eyes of the law and in terms of your organization’s operations and overall success.\n\n\n\nMain Factors to Consider in Determining AML Risk\n\n\n\nThe below table shows two core examples in which an AML risk assessment is a requirement, and two other examples where it is simply optional.\n\n\n\n\n\n\n\nThere are many other factors that dictate whether an AML risk assessment is a requirement or just an option, and the best way to determine which extreme applies is to research the background of each organization on a case-by-case basis.\n\n\n\nOne important point to remember is that AML regulations and AML risk assessment requirements are different things: You may need organizational change to comply with AML regulations, but whether you’re required to do an AML risk assessment itself is determined by the nature of your organization and its specific circumstances.\n\n\n\nSteps to Conduct an AML Risk Assessment\n\n\n\nYou conduct an AML risk assessment by determining risk factors, gathering the relevant information accordingly, and then compiling the results and reaching conclusions about your organization’s money laundering risk level.&nbsp;\n\n\n\nThis process can be broken down into six key stages.\n\n\n\n1. Document the Process\n\n\n\nSince AML risk assessment is a legal requirement, it is paramount to ensure you can produce documentation that shows your process to regulators.\n\n\n\nThe documentation should outline the steps you will perform as well as your potential shortcomings and fixes, and it should be regularly updated in case of an audit.\n\n\n\n2. Identify the Risks\n\n\n\nThe risk assessor must determine how the organization carries out its business operations and what AML precautions are in place to avoid the sale of products/services that can be exploited by money launderers.\n\n\n\nOne of the crucial ways to do this is to base your observations and judgments on how and why, if applicable, the organization has witnessed previous instances of money laundering scams in the past.&nbsp;\n\n\n\nOn top of this, try to anticipate how the business could be subjected to – or even guilty of – money laundering by reading news reports of organizational approaches to money laundering.\n\n\n\n3. Train Staff to Identify Risky Customers and Geographies\n\n\n\nAnyone assessing AML risks must understand the profiles of the given organization’s customers and where those customers are operating from. In fact, they should know as much as possible about where the organization itself is operating from, as well, because certain locations are considered more high-risk than others.\n\n\n\n4. Deploy Continuous Risk Monitoring Solutions\n\n\n\nYou must monitor the operations of the organization and its transactions and determine the extent to which the services could be exploited, internally or externally.&nbsp;Also, the assessor must base their risk assessment on documents from authorities that determine what constitutes and is listed as a high-risk country for money laundering. The Treasury of the UK, for instance, provides such a list published online.\n\n\n\nAlternatively, AML software can automate the process to instantly check whether new customers, users, and business partners pose a risk or not.\n\n\n\n5. Keep Track of Insider Threats and Internal Controls\n\n\n\nAlong with monitoring the effectiveness of customer and business AML verification checks, the assessor must also monitor what organizational policies and other systems – collectively called internal controls – have been put in place to control money laundering activity, which includes insider threats.As for the human factors, whether the organization’s staff are unintentionally or intentionally opening the business up to money laundering risks, their actions and attitudes in terms of AML precautions must also be closely examined.\n\n\n\n6. Review Risks and Perform Regular Audits\n\n\n\nKeeping a checklist of the organization’s internal controls is a great step, but you should also put yourself in the shoes of an auditor. Determine how effectively processes are being implemented and followed and don’t hesitate to update your programs to meet the latest AML requirements if needed.&nbsp;\n\n\n\nThe below infographic shows some of the key questions that an AML risk assessor should consider in terms of these three core dynamics.&nbsp;\n\n\n\n\n\n\n\nRisk Assessment in Customer Onboarding Process\n\n\n\nThis concerns how the AML risk assessment fares when it focuses on the process of signing up new customers and setting up their accounts. The risk level that comes from customer onboarding can be mitigated by ensuring that the best-practice KYC checks are in place as a large part of a greater risk assessment program.\n\n\n\nThere is a significant money laundering risk that comes when organizations don’t have stringent Know Your Customer (KYC) precautions in operation. As such, anyone who conducts an AML risk assessment will be carefully inspecting the safeguards that are in place to protect the organization and its customers from suspicious new accounts.\n\n\n\nThere is a multitude of ways that risk assessments can hone in on potential money laundering risks throughout the customer onboarding process, but a focus on KYC helps build a strong foundation for combating suspicious applications.\n\n\n\nIn fact, if the organization is a high-risk vertical like a casino, the risk assessor may need to go to extra lengths to ensure that the business asks for the following examples of personally identifiable information (PII) before each customer can be signed up to the business:\n\n\n\n\ntheir name, location, and occupation\n\n\n\ntheir email address and phone number\n\n\n\ntheir photo ID and proof of address, such as a utility bill\n\n\n\n\nOn top of this, the risk assessor may wish to bolster the efficacy and stringency of their AML risk assessment by going further and looking for the most up-to-date approaches to PII, such as biometric verification and self-sovereign identity (SSI) checks.\n\n\n\nUltimately, acting on the need for KYC best practices and PII where applicable will help build a comprehensive profile of account applicants, and will support the risk assessor in determining another part of their AML risk assessment, known as the customer risk assessment. This is where further checks that are specific to the individual arise, such as customer due diligence – and, in the case of the more high-risk customers – enhanced due diligence.\n\n\n\nSteps for Completing an AML Risk Assessment\n\n\n\nLet’s have a closer look at the necessary actions to achieve the process, and at all stages, the assessor must always remember to document their methodology and the experience throughout the process.&nbsp;\n\n\n\nEach step-by-step process will vary depending on the organization, jurisdiction, and a multitude of other factors. However, the core stages can be summarized in the following three-part list: identify, evaluate, and utilize. Let’s take a closer look.\n\n\n\n\nIdentify the risk factors and the extent to which they can harm the given organization.\n\n\n\nEvaluate the AML controls already in place and determine how effective they are relative to the now-established risk factors. Decide whether new controls should be implemented accordingly.\n\n\n\nUtilize the information gleaned from points 1 and 2 to record and establish the risk ratings of each risk factor and state what the AML priorities should be, as well as your overall conclusions about the money laundering risks.\n\n\n\n\nAgain, you should keep a record of your AML risk assessment methodology and your processes and observations throughout these stages. By doing so, you will be able to show your workings if or when an AML audit/investigation is called for, and you will also help yourself to improve the process for the next time an AML risk assessment is in the best interests of the organization.\n\n\n\nHow SEON Helps with AML Risk Assessment\n\n\n\nAML risk assessments are helped by SEON thanks to its AML transaction monitoring solution, which determines the extent to which an exchange is suspicious or legitimate and assigns a fraud risk score accordingly.\n\n\n\nSEON also checks if the person’s digital profile matches up to the identity verification and KYC checks. Plus, the software also checks whether the user is on other online accounts, such as Netflix and LinkedIn, because – especially nowadays – it is suspicious that someone would not be on at least one of these kinds of major accounts.\n\n\n\nAll in all, SEON is well-equipped to tackle suspicious accounts and help you determine the AML risk levels of your customers accordingly.\n\n\n\nSources\n\n\n\n\nThe Wolfsberg Group: The Wolfsberg Frequently Asked Questions on Risk Assessments for Money Laundering, Sanctions and Bribery &amp; Corruption\n\n\n\nGov.uk: Money Laundering Advisory Notice: High Risk Third Countries\n\n\n\nCorporate Compliance Insights: Cognitive Robotics and the Annual AML Risk Assessment"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/aml-risk-assessment/","url":"https://seon.io/resources/aml-risk-assessment/","name":"AML Risk Assessment – What Is It? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-risk-assessment/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","datePublished":"2023-04-13T09:35:26+00:00","dateModified":"2025-12-30T16:12:20+00:00","description":"An AML risk assessment is where an organization assesses the extent to which it is protected from, and vulnerable to, money laundering.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-risk-assessment/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/visa-compelling-evidence-3-0/#article","isPartOf":{"@id":"https://seon.io/resources/visa-compelling-evidence-3-0/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Visa Compelling Evidence 3.0 – What’s Changing and How Does It Affect Your Business?","datePublished":"2023-04-20T11:12:52+00:00","dateModified":"2025-11-20T16:24:13+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/visa-compelling-evidence-3-0/"},"wordCount":1746,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/visa-compelling-evidence-3-0/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Visa Compelling Evidence 3.0 rules could impact your business workflows. We examine how and why."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/visa-compelling-evidence-3-0/","url":"https://seon.io/resources/visa-compelling-evidence-3-0/","name":"What Is Visa Compelling Evidence 3.0 | Rules for 2023 | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/visa-compelling-evidence-3-0/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2023-04-20T11:12:52+00:00","dateModified":"2025-11-20T16:24:13+00:00","description":"Visa's Compelling Evidence 3.0 initiative targets fraudsters exploiting chargeback loopholes. What does this mean for businesses? SEON investigates.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/visa-compelling-evidence-3-0/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/adverse-media-screening/#article","isPartOf":{"@id":"https://seon.io/resources/adverse-media-screening/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"What Is Adverse Media Screening? Challenges &amp; Best Practices","datePublished":"2023-04-26T08:01:00+00:00","dateModified":"2025-11-20T16:25:33+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/adverse-media-screening/"},"wordCount":818,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/adverse-media-screening/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Adverse media screening detects financial crime risks beyond sanctions lists. Learn its importance, challenges, and AML compliance role."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/adverse-media-screening/","url":"https://seon.io/resources/adverse-media-screening/","name":"What Is Adverse Media Screening? Challenges & Best Practices","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/adverse-media-screening/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","datePublished":"2023-04-26T08:01:00+00:00","dateModified":"2025-11-20T16:25:33+00:00","description":"Adverse media screening detects financial crime risks beyond sanctions lists. Learn its importance, challenges, and AML compliance role.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/adverse-media-screening/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ip-blacklist/#article","isPartOf":{"@id":"https://seon.io/resources/ip-blacklist/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"What Is an IP Blacklist and How Does it Work?","datePublished":"2023-04-27T08:00:00+00:00","dateModified":"2025-11-20T16:26:19+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ip-blacklist/"},"wordCount":2460,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ip-blacklist/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","inLanguage":"en-US","description":"SEON takes a deep dive into what IP blacklisting is and how it can help organizational security."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/ip-blacklist/","url":"https://seon.io/resources/ip-blacklist/","name":"What Is an IP Blacklist and How Does it Work? - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ip-blacklist/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","datePublished":"2023-04-27T08:00:00+00:00","dateModified":"2025-11-20T16:26:19+00:00","description":"IP Blacklist: A list of internet protocol addresses that have been flagged for suspicious or malicious activity, and are blocked by various systems.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ip-blacklist/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/high-risk-customers-online-lending/","url":"https://seon.io/resources/high-risk-customers/","name":"How to Identify High-Risk Customers in Online Lending | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/high-risk-customers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-light.png","datePublished":"2023-05-03T11:06:00+00:00","dateModified":"2025-11-20T16:22:57+00:00","description":"The online lending industry has to assess and identify high-risk borrowers. SEON explores the best approach for this and its implementation.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-rates/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-rates/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Fraud Rates: What Are They and Why Are They Growing?","datePublished":"2023-05-04T08:27:55+00:00","dateModified":"2025-11-20T16:23:14+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-rates/"},"wordCount":1310,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-rates/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","keywords":["Fraud Detection"],"inLanguage":"en-US","description":"Understand what fraud rates are and how your business can bring them down. SEON explains all."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fraud-rates/","url":"https://seon.io/resources/fraud-rates/","name":"What Are Fraud Rates and Why Are They Growing? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-rates/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","datePublished":"2023-05-04T08:27:55+00:00","dateModified":"2025-11-20T16:23:14+00:00","description":"Fraud rates are the percentage of fraudulent transactions or claims that happen within a specific time frame. Preventing fraud is essential for reducing them.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-rates/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/churn-rate/#article","isPartOf":{"@id":"https://seon.io/resources/churn-rate/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"What Is Churn Rate &amp; How Can You Reduce It?","datePublished":"2023-05-23T08:09:00+00:00","dateModified":"2025-11-20T16:22:12+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/churn-rate/"},"wordCount":1539,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/churn-rate/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Reducing your churn rate can mean growing your revenue. Here's everything you need to know."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/churn-rate/","url":"https://seon.io/resources/churn-rate/","name":"What Is Churn Rate – How Is It Calculated?","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/churn-rate/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2023-05-23T08:09:00+00:00","dateModified":"2025-11-20T16:22:12+00:00","description":"Learn how to calculate and reduce churn rate for your business. Improve customer retention and boost revenue. Get expert tips and strategies now.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/churn-rate/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/high-security-checks/#article","isPartOf":{"@id":"https://seon.io/resources/high-security-checks/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Are High-Security Checks Worth It?","datePublished":"2023-06-01T07:04:00+00:00","dateModified":"2026-02-24T11:43:25+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/high-security-checks/"},"wordCount":1595,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/high-security-checks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","inLanguage":"en-US","description":"High-security checks can help protect your business from check fraud. SEON explains how."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/high-security-checks/","url":"https://seon.io/resources/high-security-checks/","name":"What Are High-Security Checks? Are They Worth It? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/high-security-checks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","datePublished":"2023-06-01T07:04:00+00:00","dateModified":"2026-02-24T11:43:25+00:00","description":"High-security checks are checks that have special anti-counterfeiting and tamper-resistant measures in place to ensure safer transactions.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/high-security-checks/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/business-email-compromise-risks-and-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/business-email-compromise-risks-and-prevention/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"What Are the Risks of Business Email Compromise &amp; How Can You Prevent Them?","datePublished":"2023-06-15T07:04:32+00:00","dateModified":"2025-11-20T16:19:44+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/business-email-compromise-risks-and-prevention/"},"wordCount":2167,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/business-email-compromise-risks-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","inLanguage":"en-US","description":"Business email compromise can damage your business's finance and reputation. Learn how to prevent it."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/business-email-compromise-risks-and-prevention/","url":"https://seon.io/resources/business-email-compromise-risks-and-prevention/","name":"What Are the Risks of Business Email Compromise? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/business-email-compromise-risks-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","datePublished":"2023-06-15T07:04:32+00:00","dateModified":"2025-11-20T16:19:44+00:00","description":"A BEC attack is when a fraudster gains unauthorized access to a business’s account. Learn about BEC and how to prevent it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/business-email-compromise-risks-and-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/07/tn-article-01-green.png","width":832,"height":469}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/virtual-credit-card-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/virtual-credit-card-fraud/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Virtual Credit Card Fraud: Its Risks &amp; How to Prevent it","datePublished":"2023-06-21T09:27:15+00:00","dateModified":"2025-11-20T16:18:43+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/virtual-credit-card-fraud/"},"wordCount":2905,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/virtual-credit-card-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","inLanguage":"en-US","description":"Take a deep dive into the risks of virtual credit card fraud and learn how you can prevent it."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/virtual-credit-card-fraud/","url":"https://seon.io/resources/virtual-credit-card-fraud/","name":"Virtual Credit Card Fraud: Risks & Prevention | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/virtual-credit-card-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2023-06-21T09:27:15+00:00","dateModified":"2025-11-20T16:18:43+00:00","description":"Virtual credit card fraud is the misuse of a virtual credit card (VCC) for illicit gain. Learn about VCC fraud and how to combat it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/virtual-credit-card-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/know-your-transaction/#article","isPartOf":{"@id":"https://seon.io/resources/know-your-transaction/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Know Your Transaction: Why &amp; How It Can Help You","datePublished":"2023-06-29T08:03:00+00:00","dateModified":"2025-08-27T16:14:48+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/know-your-transaction/"},"wordCount":2053,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/know-your-transaction/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","inLanguage":"en-US","description":"Know Your Transaction is an anti-money laundering process that helps detect suspicious transactions"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/know-your-transaction/","url":"https://seon.io/resources/know-your-transaction/","name":"Know Your Transaction: Why & How It Can Help You | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/know-your-transaction/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2023-06-29T08:03:00+00:00","dateModified":"2025-08-27T16:14:48+00:00","description":"Discover the importance of Know Your Transaction (KYT) and its role in AML and CTF compliance. Learn how it helps prevent financial crimes. Read more now.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/know-your-transaction/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/reverse-email-lookup/#article","isPartOf":{"@id":"https://seon.io/resources/reverse-email-lookup/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"Reverse Email Lookup: How It Works &amp; How to Perform It","datePublished":"2023-07-19T12:12:16+00:00","dateModified":"2026-01-15T16:41:33+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/reverse-email-lookup/"},"wordCount":1737,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/reverse-email-lookup/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","inLanguage":"en-US","description":"SEON reveals how reverse email lookup can help you tell fraudsters apart from legitimate contacts."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/reverse-email-lookup/","url":"https://seon.io/resources/reverse-email-lookup/","name":"Reverse Email Lookup: How it Works & How to Perform It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/reverse-email-lookup/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","datePublished":"2023-07-19T12:12:16+00:00","dateModified":"2026-01-15T16:41:33+00:00","description":"Reverse email lookup is crucial for any business that needs to learn more about its users. Read how it works and conduct your free search.","mainEntity":[{"@id":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754904790"},{"@id":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754911746"},{"@id":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754956555"},{"@id":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754978712"},{"@id":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689755061939"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/reverse-email-lookup/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754904790","position":1,"url":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754904790","name":"Are reverse email lookups GDPR-compliant?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"While the act of legitimately carrying out a reverse email lookup is legal, whether the search itself will involve sifting through GDPR-compliant data depends on whether the target email address is connected to <a href=\"https://seon.io/resources/gdpr-compliance-in-fraud-detection/\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR-compliant</a> public records. Plus, some email lookup tools follow different jurisdictions and terms and conditions, so your best course would be to check the terms of use for each lookup tool you use.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754911746","position":2,"url":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754911746","name":"How to trace an email address to its owner","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Use search tools that are designed to reveal the email address owner’s IP address, such as SEON’s email lookup. Also, scrutinize the email address’s domain type because this could reflect where the person lives and where they work. Plus, by entering the email address in a search engine, you may find that it’s already attached to online databases, such as those hosted by LinkedIn and Meta.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754956555","position":3,"url":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754956555","name":"Is it free to do a reverse email lookup?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It is certainly free to do a single reverse email lookup given that you can easily find free ones online. That said, the more you look for software that offers a high quantity – and quality – of reverse email lookup checks, the more likely it is that you’ll start being charged for the convenience.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754978712","position":4,"url":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689754978712","name":"Where does the information come from? How is this data sourced?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Most email lookup tools enrich data from <a href=\"https://seon.io/resources/comparisons/osint-software-tools/\" target=\"_blank\" rel=\"noreferrer noopener\">open-source databases</a>, such as those related to social media accounts and phone number directories. SEON’s lookup, for example, aggregates device, IP, and social media information.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689755061939","position":5,"url":"https://seon.io/resources/reverse-email-lookup/#faq-question-1689755061939","name":"What does an email’s domain type actually tell me?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It can provide information about the nature of the email and the location that it came from, and possibly the level of legitimacy or suspicion that applies to it. For example, “@wh!tehouse.g0v” is far more likely to have been sent from a high-risk sender than one sent from “@whitehouse.gov”.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/reverse-phone-lookup/#article","isPartOf":{"@id":"https://seon.io/resources/reverse-phone-lookup/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"Reverse Phone Lookup: What It Is and How It Works","datePublished":"2023-07-20T07:36:00+00:00","dateModified":"2026-02-24T11:34:41+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/reverse-phone-lookup/"},"wordCount":1490,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/reverse-phone-lookup/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","inLanguage":"en-US","description":"A reverse phone lookup can provide you with data-enriched profiles. Discover how – and why."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/reverse-phone-lookup/","url":"https://seon.io/resources/reverse-phone-lookup/","name":"Reverse Phone Lookup: What It Is and How It Works","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/reverse-phone-lookup/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","datePublished":"2023-07-20T07:36:00+00:00","dateModified":"2026-02-24T11:34:41+00:00","description":"SEON’s reverse phone lookup service allows you to discover who a phone number is registered to. Discover how this can benefit your business.","mainEntity":[{"@id":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678783265"},{"@id":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678813985"},{"@id":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678835349"},{"@id":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678855654"},{"@id":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678990103"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/reverse-phone-lookup/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678783265","position":1,"url":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678783265","name":"How to detect spam callers","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Use reverse phone lookup to see if the linked address is based in a potentially suspicious area, such as a call center from another country. On top of this, there are spam call detection apps that you can install on your phone, but always be sure that they’re from legitimate sources before downloading them.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678813985","position":2,"url":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678813985","name":"What phone types does reverse phone lookup work for?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"All kinds of phones. In fact, reverse phone lookups can tell you the type of phone it is. For instance, SEON’s Phone API results include whether the number is Voice over Internet Protocol (VoIP) or disposable, the associated caller ID name (<a href=\"https://seon.io/resources/dictionary/cnam/\" target=\"_blank\" rel=\"noreferrer noopener\">CNAM</a>), the country of registration, and much more.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678835349","position":3,"url":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678835349","name":"Are there any hidden costs associated with reverse phone lookup?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A good phone lookup service will let you know its price ahead of time. Professional services tend to charge a monthly fee as part of a subscription. Beware of “free” phone lookup services where the query is free but the results are hidden behind a paywall.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678855654","position":4,"url":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678855654","name":"Can a reverse phone lookup show me text messages?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No. Reverse lookup is designed to present details about the phone number itself, not the messages or calls that the phone number has made, sent, or received. A reverse phone lookup, no matter how successful, will not provide any information about the specific activities of the phone and its number, just the contact information (such as social media profiles) that it’s associated with.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678990103","position":5,"url":"https://seon.io/resources/reverse-phone-lookup/#faq-question-1689678990103","name":"Will the person know I'm doing a reverse phone lookup?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No. A reverse phone search does not notify the phone number owner that someone has performed a lookup.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/top-fraud-threats-in-digital-banking/#article","isPartOf":{"@id":"https://seon.io/resources/top-fraud-threats-in-digital-banking/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Top 5 Fraud Threats in Digital Banking: What You Need to Know","datePublished":"2023-09-11T10:19:46+00:00","dateModified":"2025-12-24T11:59:48+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/top-fraud-threats-in-digital-banking/"},"wordCount":1425,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/top-fraud-threats-in-digital-banking/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","keywords":["Account Takeover"],"articleSection":["Article"],"inLanguage":"en-US","description":"Fraudsters target digital banks with ATOs, phishing, and synthetic identities. Learn how AI, ML, and compliance enhance security."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/top-fraud-threats-in-digital-banking/","url":"https://seon.io/resources/top-fraud-threats-in-digital-banking/","name":"Top 5 Fraud Threats in Digital Banking | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/top-fraud-threats-in-digital-banking/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","datePublished":"2023-09-11T10:19:46+00:00","dateModified":"2025-12-24T11:59:48+00:00","description":"We look at five major threats to neobanks and how SEON’s solutions, along with your own precautions, can help to prevent them.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/top-fraud-threats-in-digital-banking/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/high-risk-source-of-application/#article","isPartOf":{"@id":"https://seon.io/resources/high-risk-source-of-application/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"High-Risk Source of Application: How to Detect and Manage Them","datePublished":"2023-09-14T08:40:00+00:00","dateModified":"2025-12-24T11:58:15+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/high-risk-source-of-application/"},"wordCount":1211,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/high-risk-source-of-application/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","inLanguage":"en-US","description":"To lower your rate of fraudulent applications, you need to look at both who and where they’re being sent from. Digging deep into the source of an application, such as your applicant’s IP, physical address, and PEP status, can give a crucial indication of how trustworthy – or indeed high-risk – they are as an applicant.\n\n\n\nTaking a bird’s eye view across the many relevant data points gives you the means to stop things like money laundering and ID theft before they happen.\n\n\n\nWe discuss what to look out for and share some best practices to help businesses stay alert.\n\n\n\nWhat Does High-Risk Source of Application Mean?\n\n\n\n\n\n\n\nA “high-risk source of application” is a label assigned by risk management teams to flag potentially fraudulent applications for financial services, such as credit cards or loans. The term is mostly related to anti-money laundering regulations, such as 6AMLD (the 6th Anti-Money Laundering Directive), but it also applies to many other areas of fincrime prevention and cyber-security, such as insurance claims and account management.\n\n\n\nA high-risk source refers to any individual, location, and/or context that raises concerns from the organization faced with the given application.\n\n\n\nIn other words, it’s not necessarily the applicant who triggered the label of “high-risk source”. Even a perfectly legitimate person may find their application is rejected if the following scenarios apply:\n\n\n\n\nThey’re from a high-risk location, such as Russia\n\n\n\nTheir IP and the address they claim to be from are different\n\n\n\nTheir application had already been rejected before\n\n\n\n\nExamples of High-Risk Sources of Application\n\n\n\n\n\n\n\nCommon actions that could be flagged as a high-risk source of application include taking out a loan, ordering a new credit card, or sending funds over a certain threshold. Let’s look at some more examples to better understand what else can be classed under this label:\n\n\n\n\nThe user’s name appears on a PEP list: If a customer’s name is found on a politically exposed person (PEP) list, their actions are likely to be flagged as high-risk, especially in terms of money laundering.\n\n\n\nThe user’s source of funds cannot be verified: Source of funds checks are key in ensuring that financial services do not help criminals launder money. How the company performs these checks may vary, but if an automated system cannot confirm the source of funds, an application may be flagged as high-risk.\n\n\n\n\n\nThe user’s IP address points to a sanctioned country: This is a common scenario for financial services in Western countries that are banned from dealing with certain regions. For instance, an Iranian or Russian IP may be flagged by automated AML systems.\n\n\n\n\nWhich Countries Are Classified as High-Risk Sources?\n\n\n\nMost countries classified as high-risk sources will be sanctioned countries, such as:\n\n\n\n\nCuba\n\n\n\nIran\n\n\n\nNorth Korea\n\n\n\nSyria\n\n\n\nRussia\n\n\n\n\nThe list may vary depending on which country your company is based in. However, the rules set by the Office of Foreign Assets Control (based in the US) tend to be followed by most countries around the world. Other regions sanctioned by OFAC include:\n\n\n\n\nBalkans\n\n\n\nBelarus\n\n\n\nBurma\n\n\n\nCentral African Republic\n\n\n\nEthiopia\n\n\n\nIraq\n\n\n\nLebanon\n\n\n\nVenezuela\n\n\n\nYemen\n\n\n\nZimbabwe\n\n\n\n\nOrganizations may have their own list of high-risk countries. These aren’t mandated by government regulators, but chosen internally after the staff members have taken stock of their own risk challenges. For instance, a neobank that has a historically high number of fraudulent applications from Italy may label the country as high-risk.\n\n\n\nWhat to Do When You Detect a High-Risk Source\n\n\n\n\n\n\n\nYour data can only be truly accurate when it’s been sense-checked, so consult other risk analysts and your fraud prevention system before rejecting an application. Make sure those you proceed with are filed in a suspicious activity report (SAR), which notifies government agencies of potential money launderering.\n\n\n\nIt’s also important to give those who are rejected a chance to appeal. Most will be sent an automated message with very limited information about why they’ve been declined. Connecting them to your customer service team and offering a chance to appeal should help to reassure legitimate customers who have been incorrectly considered high-risk. This will protect your customer satisfaction rates from the otherwise significant reputational damages of a false positive fraud check.\n\n\n\nThat said, you should be careful how much you tell a customer about why they have been rejected;&nbsp; revealing too much information can help fraudsters learn how to cheat the system.\n\n\n\nHow to Detect More High-Risk Applications\n\n\n\n\n\n\n\nHere are some actions you should take if your risk management software is struggling to catch high-risk applications:\n\n\n\n\nDeploy an AML module: Many fraud prevention solution’s AML modules can automatically look for names on PEP databases, flag sanctioned countries, and send suspicious transactions for manual review.\n\n\n\nEnrich data for better results: Static rules are fine for simple user actions, but in some cases, you may need to layer multiple risk rules to improve the precision of your flags. For instance, instead of simply blocking all IPs from certain countries, you could also look at whether the IP points to a VPN, or whether it’s coming from a suspicious ISP (internet service provider).\n\n\n\nUpdate your risk rules: AML rules are regularly updated by authorities, so your system should also let you edit risk rules to stay on top of the latest mandates. Make sure your system is agile enough to quickly update your risk rules without too much resource.\n\n\n\nAct on the value of machine learning: If you manage to feed enough high-risk application data to an ML system, it may be able to find patterns and suggest better risk rules. This is particularly useful when processing huge amounts of data and getting insights that may slip by a human analyst.\n\n\n\n\nBy applying these points to your risk management strategy, you can ensure your organization is safeguarded against fraudsters and in accordance with regulatory compliance.\n\n\n\nSEON’s Tools To Manage High-Risk Sources of Application\n\n\n\n\n\n\n\nAs an end-to-end risk management solution, SEON comes with all the tools you need to detect high-risk sources of application, increase the precision of your current detection model, or even suggest new strategies thanks to machine learning.\n\n\n\nHere are the key highlights:\n\n\n\n\nFull AML module: This solution helps you flag PEPs, sanctioned countries, crime watchlists, and monitor transactions.\n\n\n\nLabel API: Reduce not only your false positives, but your false negatives too. With SEON’s label API, you tell the solution when it’s produced both successful and unsuccessful checks – so it becomes increasingly adept at spotting both low- and high-risk sources of all kinds.\n\n\n\nReal-time alerts and monitoring: Instantly know when a high-risk application is detected.\n\n\n\nFlexible rulesets: SEON lets you manually update rules from a user-friendly dashboard, so you can stay on top of the latest requirements without going through a developer.\n\n\n\nDevice fingerprinting and data enrichment modules: Get a 360 view of users, transactions, and applications thanks to device fingerprinting and data enrichment tools. For instance, a single email address could help you increase the precision of your risk scoring by looking at the user’s social media networks.\n\n\n\n\nAll of the above are available via short-term, cancel-anytime plans, flexible APIs – or even in the form of a separate app for Shopify."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/high-risk-source-of-application/","url":"https://seon.io/resources/high-risk-source-of-application/","name":"High-Risk Source of Application: Detection & Management | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/high-risk-source-of-application/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2023-09-14T08:40:00+00:00","dateModified":"2025-12-24T11:58:15+00:00","description":"“High-risk source of application” is a label that risk teams assign to certain user actions. Explore the term and how to detect such risk.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/high-risk-source-of-application/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/kyc-onboarding/#article","isPartOf":{"@id":"https://seon.io/resources/kyc-onboarding/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"KYC Onboarding: Process, Requirements, and Best Practices","datePublished":"2023-09-20T08:00:00+00:00","dateModified":"2026-01-12T16:32:28+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/kyc-onboarding/"},"wordCount":1443,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/kyc-onboarding/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"KYC onboarding collects and verifies customer data at signup to support AML compliance, reduce fraud, and minimize friction."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/kyc-onboarding/","url":"https://seon.io/resources/kyc-onboarding/","name":"KYC Onboarding: Process, Requirements, and Best Practices","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/kyc-onboarding/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","datePublished":"2023-09-20T08:00:00+00:00","dateModified":"2026-01-12T16:32:28+00:00","description":"KYC onboarding collects and verifies customer data at signup to support AML compliance, reduce fraud, and minimize friction.","mainEntity":[{"@id":"https://seon.io/resources/kyc-onboarding/#faq-question-1693405139087"},{"@id":"https://seon.io/resources/kyc-onboarding/#faq-question-1693405146594"},{"@id":"https://seon.io/resources/kyc-onboarding/#faq-question-1693405162225"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/kyc-onboarding/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-onboarding/#faq-question-1693405139087","position":1,"url":"https://seon.io/resources/kyc-onboarding/#faq-question-1693405139087","name":"Is KYC the same as KYC onboarding?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No. KYC can only occur after KYC onboarding is completed. Just as someone cannot become a gym member without being onboarded onto the gym’s system, a prospective customer cannot progress to the KYC process until they’ve passed the KYC onboarding phase.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-onboarding/#faq-question-1693405146594","position":2,"url":"https://seon.io/resources/kyc-onboarding/#faq-question-1693405146594","name":"What is required during customer onboarding KYC?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The prospective customer provides a valid and adequate amount of personally identifiable information (PII) so that the organization can approve the individual’s account creation process.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/kyc-onboarding/#faq-question-1693405162225","position":3,"url":"https://seon.io/resources/kyc-onboarding/#faq-question-1693405162225","name":"What are the regulations for KYC onboarding?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"KYC onboarding requires due diligence and AML compliance through the organization receiving, validating, and (when permitted) storing its prospective customers’ PII. Many KYC onboarding processes also require background checks, from social media assessments to PEP screening.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/security-awareness-training/#article","isPartOf":{"@id":"https://seon.io/resources/security-awareness-training/"},"author":{"name":"SEON Team","@id":"https://seon.io/#/schema/person/00ae7367412fefa616a224ea10d8aaab"},"headline":"Security Awareness Training: What It Is, Its Importance &amp; How to Implement It","datePublished":"2023-09-28T08:00:00+00:00","dateModified":"2025-12-24T11:51:34+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/security-awareness-training/"},"wordCount":1239,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/security-awareness-training/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","inLanguage":"en-US","description":"We dive into the importance of security awareness training, how to implement it, and why."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/security-awareness-training/","url":"https://seon.io/resources/security-awareness-training/","name":"What Is Security Awareness Training & How to Implement | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/security-awareness-training/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2023-09-28T08:00:00+00:00","dateModified":"2025-12-24T11:51:34+00:00","description":"No organization should go without security awareness training. We cover what such training is and how it can benefit businesses.","mainEntity":[{"@id":"https://seon.io/resources/security-awareness-training/#faq-question-1693491147130"},{"@id":"https://seon.io/resources/security-awareness-training/#faq-question-1693491152898"},{"@id":"https://seon.io/resources/security-awareness-training/#faq-question-1693491159579"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/security-awareness-training/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/security-awareness-training/#faq-question-1693491147130","position":1,"url":"https://seon.io/resources/security-awareness-training/#faq-question-1693491147130","name":"How long does it take to build a security awareness program?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Assuming you have the required materials and staff, a security awareness training program can be built in four to eight weeks. However, more complicated programs can take months.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/security-awareness-training/#faq-question-1693491152898","position":2,"url":"https://seon.io/resources/security-awareness-training/#faq-question-1693491152898","name":"How often should you conduct security awareness training?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"This depends on the business requirements, but at the least training should be provided in line with new or updated data protection laws and company policies as well as for new joiners.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/security-awareness-training/#faq-question-1693491159579","position":3,"url":"https://seon.io/resources/security-awareness-training/#faq-question-1693491159579","name":"How much do security awareness programs cost?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Basic, essential, and/or government-issued training is usually free. More advanced training will cost around $1,000 for every 50 employees while larger organizations looking for more upmarket training should expect to pay a lot more. <br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/refund-scam/#article","isPartOf":{"@id":"https://seon.io/resources/refund-scam/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Refund Scams: What They Are &amp; How to Prevent Them","datePublished":"2023-10-02T08:00:00+00:00","dateModified":"2025-11-18T17:02:44+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/refund-scam/"},"wordCount":1212,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/refund-scam/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","inLanguage":"en-US","description":"Refund scammers are hidden pests, peeling away profit from businesses behind a wall of distraction and deception. Without the right solutions, scammers go undetected because their transactions are processed and logged in the same way as legitimate ones.\n\n\n\nWe look at how refund scams work and how the right precautions can stop them from damaging your business.\n\n\n\nWhat Are Refund Scams?\n\n\n\nRefund scams involve a criminal tampering with a POS (point of sale) terminal so it sends them an unwarranted refund.\n\n\n\nMany scammers carry out refund scams in person, where they’re able to distract and manipulate their targets, namely whoever is operating the POS. However, some payment terminals can be accessed remotely, such as through hacking and phishing techniques, so many refund scams are carried out online.\n\n\n\nHow Do Refund Scams Work?\n\n\n\nBelow are two examples of how in-person and remote refund scams can be carried out:\n\n\n\n\nA scammer has an accomplice distract the shopkeeper so the scammer can go behind the till and change the POS terminal’s transaction settings, meaning the system goes from preparing to receive a purchase to offering a refund.\n\n\n\nA scammer uses a phishing email to convince their target that their payment system has encountered a software fault and needs remote assistance to be fixed. The attacker then uses their illegitimate entry into the POS payment terminal to grant a refund.\n\n\n\n\nTypes of Refund Scams\n\n\n\nThere are many ways that scammers can interfere with a business’s refund policies and equipment in order to carry out a refund scam. Some major examples include distraction, collusion, layered transactions, and phishing.\n\n\n\nHere’s a closer look at each one:\n\n\n\n\nDistraction: Refund scammers can use false pretenses (such as a staged “emergency” outside the shop) to convince their target to leave the POS terminal unattended.\n\n\n\nCollusion: Some scammers work in collusion with a staff member who knowingly puts through a fraudulent refund and then doctors the record of purchase to make it look like it complies with their employer’s refund policy.\n\n\n\nLayered transactions: Refund scammers can evade suspicion by complicating their exchanges with their target business. For instance, they may carry out multiple purchases and refund requests, using different cards in quick succession. This confuses the company they’re scamming, making it harder to trace who received the refund and which card it went to.\n\n\n\nPhishing: The scammer acts online rather than in person and uses deceptive communication, such as emails loaded with social engineering attacks, to trick an organization into providing the login details for their POS terminal.\n\n\n\n\nAll these examples involve the scammer (or their accomplice) tampering with the point of sale terminal. This sets a refund scam apart from another related term: return fraud, which instead sees the criminal abuse a business’s refund policy. For example, return fraudsters may trick staff into refunding a stolen item if they aren’t obligated to ask for proof of purchase.\n\n\n\nYou can learn more about what separates the two terms by checking out the table below:\n\n\n\n\n\n\n\nThe Impact of Refund Scams on Businesses\n\n\n\nBusinesses that fall victim to refund scams don’t just see their revenue erode, it can also affect the business’s reputation and even employee morale.\n\n\n\nLet’s take a closer look at how refund scams can impact a business:&nbsp;\n\n\n\n\nOperational damages: It is time-consuming and labor-intensive to investigate how a refund scam occurred and how to recur the damages. Integrating the best solutions, such as chargeback management software, is therefore crucial to reduce the workload involved in fighting back against suspicious transactions.\n\n\n\nROI losses: Refund scams can severely impact the business’s profit margins and stock.\n\n\n\nReputational damages: If a business becomes known as an easy target for refund scams it may undermine it’s wider security status and make it more liable to attack.&nbsp;\n\n\n\nStaff disputes: Given that refund scams can involve staff collusion some co-workers may lose trust in each other when a refund scam occurs.\n\n\n\n\n\n      Reduce Chargebacks with SEON\n      SEON is more than just a software solution – it is your business partner in chargeback management, with insightful digital footprint analysis and machine learning.\n     \n        Speak with an Expert\n      \n    \n\n\n\nMethods to Prevent Refund Scams\n\n\n\nThankfully, when businesses know what to look for they can put a block on most refund scammers and their activities. Key points to remember are the importance of training your staff, protecting your point of sales terminals, and integrating the best fraud prevention system for the job.\n\n\n\nStaff Training\n\n\n\nUnlike return fraud, refund scams tend to occur when your staff members’ backs are turned, it’s vital to educate them on preventative measures. Your security awareness training should therefore teach your employees to do the following:\n\n\n\n\nNever leave their point of sales terminal unattended and unlocked, and always keep a secondary device on them to ensure multi-factor authentication can be utilized.\n\n\n\nExercise caution when they encounter unusual situations, report them, and recognize they may be a distraction and manipulation technique.\n\n\n\nMake sure staff are aware that emotionally charged messages, such as calls and emails, can also be used as a distraction method, and to exercise caution.&nbsp;\n\n\n\n\nMaintain Comprehensive Camera Surveillance\n\n\n\nWhile this won’t be as useful if you encounter a refund scammer operating remotely, camera surveillance is invaluable if the criminal targets a physical store. Having high-definition cameras with facial recognition technology will be a strong deterrent for, or proof of, refund fraud as many cases involve sneaking behind a shop counter to tamper with the point of sales terminal.\n\n\n\nUse Fraud Prevention Solutions\n\n\n\nThe right fraud prevention solutions, such as SEON, offer transaction monitoring and other account monitoring solutions that detect suspicious shop exchanges that may signify refund scams.\n\n\n\nSEON detects unusually high transactions, which can be a calling card for refund scammers. They may make big purchases to feign credibility in their history with the target business, or a series of small but frequent purchases to make their spending habits less noticeable.\n\n\n\nSEON’s transaction monitoring keeps historical data, the scope of which grows with your business, so any suspicious patterns that arise through transactions can be flagged.\n\n\n\nFor example, if an individual is making suspiciously large and complicated transactions, this isn’t necessarily a cause for alarm in itself. However, if those transactions also occur at a time when the individual suddenly changes their payment method, this can be a reason to suspect a refund scam or other attack is in the works.\n\n\n\nIn the below interactive screenshot gallery, you can learn more about the many ways that illicit transaction patterns and user account details can be detected through SEON:\n\n\n\n\n\n\n\nYou can see below how easily you can learn more about a person just through their payment methods. Enter any card’s BIN (bank identification number) into the box below and see what information SEON can offer in return.\n\n\n\n\n\n\n\nSEON’s ability to knock down the wall refund scammers operate behind not only means you’ll know when you’ve fallen victim, but you can prevent it from happening in the future.&nbsp;\n\n\n\nSource\n\n\n\n\nTake Five: REFUND SCAM\n\n\n\n\nRelated Articles\n\n\n\n\nWhat is Return Fraud, Its Types &amp; How to Prevent It\n\n\n\nChargeback vs Refund: Their Differences &amp; How They Work"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/refund-scam/","url":"https://seon.io/resources/refund-scam/","name":"Refund Scams: What They Are & How to Prevent Them | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/refund-scam/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","datePublished":"2023-10-02T08:00:00+00:00","dateModified":"2025-11-18T17:02:44+00:00","description":"Overpayment or refund scams can seriously damage a person’s financial security. Here’s how to recognize and prevent them before it’s too late.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/refund-scam/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/account-takeover-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/account-takeover-fraud/"},"author":{"name":"Oliver Bognar","@id":"https://seon.io/#/schema/person/b5461bcf75829644bd246becc5637c20"},"headline":"Account Takeover Fraud (ATO): What Is It &amp; How to Detect It","datePublished":"2024-01-29T12:58:13+00:00","dateModified":"2026-04-14T12:53:59+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/account-takeover-fraud/"},"wordCount":1695,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/account-takeover-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how to detect and prevent account takeover fraud using advanced tools like device fingerprinting and behavior analysis."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/account-takeover-fraud/","url":"https://seon.io/resources/account-takeover-fraud/","name":"Account Takeover Fraud (ATO): Detection and Protection","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/account-takeover-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","datePublished":"2024-01-29T12:58:13+00:00","dateModified":"2026-04-14T12:53:59+00:00","description":"Discover the ins and outs of account takeover fraud (ATO) fraud – from common tactics to detection and protection methods and techniques.","mainEntity":[{"@id":"https://seon.io/resources/account-takeover-fraud/#faq-question-1706540713494"},{"@id":"https://seon.io/resources/account-takeover-fraud/#faq-question-1706540725764"},{"@id":"https://seon.io/resources/account-takeover-fraud/#faq-question-1709714745410"},{"@id":"https://seon.io/resources/account-takeover-fraud/#faq-question-1776171164161"},{"@id":"https://seon.io/resources/account-takeover-fraud/#faq-question-1776171171538"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/account-takeover-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/account-takeover-fraud/#faq-question-1706540713494","position":1,"url":"https://seon.io/resources/account-takeover-fraud/#faq-question-1706540713494","name":"What is the difference between identity theft and account takeover?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Account takeover involves someone accessing an account owned by another individual without authorization, whereas identity theft involves the fraudulent creation of a new account using stolen identity information. Account takeovers can affect both businesses and individuals, whereas identity theft exclusively impacts individuals.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/account-takeover-fraud/#faq-question-1706540725764","position":2,"url":"https://seon.io/resources/account-takeover-fraud/#faq-question-1706540725764","name":"What is the recommended method for detecting account takeover?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Monitoring account activity in real time, in addition to user behavior analysis and automated alerts for suspicious behavior is the best method to detect ATO. Additionally, regularly screening user credentials against known breaches and educating users about risks are essential components of an effective detection strategy.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/account-takeover-fraud/#faq-question-1709714745410","position":3,"url":"https://seon.io/resources/account-takeover-fraud/#faq-question-1709714745410","name":"What industries are most at risk of ATO attacks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Industries most at risk of ATO attacks include but are not limited to financial services, ecommerce, healthcare, iGaming and government and education sectors due to their access to valuable data and financial assets.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/account-takeover-fraud/#faq-question-1776171164161","position":4,"url":"https://seon.io/resources/account-takeover-fraud/#faq-question-1776171164161","name":"What are the most common signs of an account takeover?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Unusual login locations, repeated failed login attempts from unfamiliar devices, rapid account setting changes after a new login, device switches inconsistent with account history, and sudden payment method additions are the most common warning signs. No single signal confirms ATO, but clusters of anomalies, particularly device changes combined with immediate payment or contact detail modifications, are high-confidence indicators.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/account-takeover-fraud/#faq-question-1776171171538","position":5,"url":"https://seon.io/resources/account-takeover-fraud/#faq-question-1776171171538","name":"How can businesses reduce account takeover fraud without adding too much friction?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The strongest approach combines risk-based step-up authentication with device intelligence, behavioral monitoring and real-time risk analysis. Low-risk logins from recognized devices and consistent behavioral patterns proceed without additional friction. High-risk sessions trigger verification steps proportional to the detected risk level. This keeps access smooth for legitimate users while creating meaningful barriers for attackers.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ice-recap-unveiling-key-insights-and-opportunities-within-the-gaming-industry/#article","isPartOf":{"@id":"https://seon.io/resources/ice-recap-unveiling-key-insights-and-opportunities-within-the-gaming-industry/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"ICE Recap: Unveiling Key Insights and Opportunities Within the Gaming Industry","datePublished":"2024-02-23T09:43:25+00:00","dateModified":"2025-12-24T11:48:51+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ice-recap-unveiling-key-insights-and-opportunities-within-the-gaming-industry/"},"wordCount":833,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ice-recap-unveiling-key-insights-and-opportunities-within-the-gaming-industry/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/02/ICE-Recap-Unveiling-Key-Insights-and-Opportunities-Within-the-Gaming-Industry.png","articleSection":["Event Insights"],"inLanguage":"en-US","description":"The International Casinos Exhibition (ICE) stands as a cornerstone event for the global gaming industry, annually congregating gaming professionals, products and service solutions from a wide range of sectors – betting, bingo, casino, esports, lottery, mobile, online, social, sports betting and street. This year's conference, held in early February at London's ExCel exhibition center, served as a hub for innovation, collaboration and networking, bridging the gap between retail-based and digital channels.As the provider of a comprehensive, end-to-end fraud prevention and anti-money laundering (AML) solution, SEON was met with insights and opportunities at ICE within the ever-evolving landscape of anti-fraud technology. This recap distills critical takeaways, highlighting dominant concerns and the latest industry trends.\n\n\n\n\n\nNavigating the Waters of Bonus Abuse\n\n\n\nA recurring theme across the many discussions at SEON's exhibition booth revolved around the pervasive challenge of bonus abuse (or cross-betting), highlighting the issue as the primary fraud concern. Consensus on the topic underscored a notable urgency for market solutions to address and curtail this issue, which, to many, loomed as an impossible task.SEON's conversations thus centered on demonstrating how our innovative offerings proactively combat bonus abuse, highlighting our unique approach to fraud prevention that goes beyond traditional measures. By leveraging players' most comprehensive online identities – comprised of 300+ unique digital and social signals and behavioral patterns – called digital footprinting, we proactively identify bonus abusers, prevent bad actors from signing up, and stop other fraud types in their tracks.\n\n\n\nBuilt In AML and Compliance\n\n\n\nBeheld to evolving regulatory and compliance standards, Gaming companies seek done-for-you solutions in which AML and compliance are built in, enabling the easy completion of checklists for PEP, sanctions and crime lists. Deploying end-to-end fraud prevention and AML in a single solution like SEON saves operators the pain of integrating different point solutions and outperforms legacy models that fail to meet the demands of today's sophisticated fraudsters. &nbsp;Using advanced digital footprinting, device intelligence and AML screening, SEON delivers a comprehensive view of player activities and allows the creation of custom fraud and AML rules based on personal risk appetites.\n\n\n\nAI Increasing in Fraud-Decision Processes and Pattern Detection\n\n\n\nFollowing the exploration of bonus abuse and AML and compliance, another significant focus at ICE concentrated on integrating artificial intelligence (AI) in enhancing fraud-decision processes and pattern detection. While most market solutions today rely only on blackbox machine learning (ML) without explaining or showing results or decision-making, SEON uses both blackbox and whitebox machine learning to deliver fast and accurate decisions as well as a transparent breakdown of the process followed to reach its choice. This gives visibility for fraud and risk teams to understand why a particular player is approved, declined or deemed suspicious.By leveraging blackbox and whitebox machine learning, SEON enables lightning-fast AI-driven decisioning and the ability to customize fraud scores to specific business needs. This customization allows for a high degree of personalization and transparency to enhance fraud detection, refine risk decision-making to reduce manual reviews and transform fraud management strategies.\n\n\n\nDiving Deeper into Machine Learning\n\n\n\nAs gaming operators' risk tolerances vary from region to region, SEON's rules and scoring engine are designed to support varying levels of risk needs for different operators and convey the logic in its algorithmic choice-making to ensure operators understand the rationale behind every decision.Discussions around machine learning revolved around its use to uncover patterns indicative of bonus abuse, affiliate fraud and multi-accounting, highlighting SEON's ability to tackle operators' critical needs for detecting, comprehensively understanding and forecasting fraudulent activities, showcasing our commitment to equipping businesses with the tools they need to address fraud preemptively.\n\n\n\nBenefits of SEON for Gaming Customers\n\n\n\nDeriving significant value, Gaming clients are leveraging SEON for:\n\n\n\n\nBonus Abuse PreventionBy proactively identifying bonus abusers through insight into players' digital footprints, SEON helps operators understand the intricate patterns of abuse and helps them stop fraud before it impacts business.Learn how Betflag reduced bonus abuse by 15%\n\n\n\nRisk ProfilingUsing extensive device intelligence and digital footprinting, SEON creates a multi-layered defense mechanism against fraud, ensuring that platforms remain secure and trustworthy.See how Soft2Bet automated risk reviews, freeing up 40% of their resources.\n\n\n\n\nStanding Out in a Crowded Space\n\n\n\nAs we reflect on the insights gathered from ICE, it's clear that the path forward for the gaming industry is one of collaboration and technological innovation. The challenges are significant, but with advanced tools and a shared commitment to combating fraud, the opportunities for growth, security and success are immeasurable.&nbsp;SEON remains at the forefront of this journey, dedicated to evolving our solutions to meet and exceed the demands of an ever-changing industry, delivering steadfast solutions that align with the dynamic needs of our partners. Together, we are not just responding to the landscape of fraud but shaping its future, ensuring a safer, more secure gaming environment for all. We look forward to next year's ICE event – this time in Barcelona!"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/ice-recap-unveiling-key-insights-and-opportunities-within-the-gaming-industry/","url":"https://seon.io/resources/ice-recap-unveiling-key-insights-and-opportunities-within-the-gaming-industry/","name":"Key Insights and Opportunities Within the Gaming Industry | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ice-recap-unveiling-key-insights-and-opportunities-within-the-gaming-industry/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/02/ICE-Recap-Unveiling-Key-Insights-and-Opportunities-Within-the-Gaming-Industry.png","datePublished":"2024-02-23T09:43:25+00:00","dateModified":"2025-12-24T11:48:51+00:00","description":"SEON was met with insights and opportunities at ICE within the ever-evolving landscape of anti-fraud technology. Learn all about the takeaways here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ice-recap-unveiling-key-insights-and-opportunities-within-the-gaming-industry/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/02/ICE-Recap-Unveiling-Key-Insights-and-Opportunities-Within-the-Gaming-Industry.png","contentUrl":"https://seon.io/wp-content/uploads/2024/02/ICE-Recap-Unveiling-Key-Insights-and-Opportunities-Within-the-Gaming-Industry.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/digital-footprinting-against-fraud-in-the-digital-age/#article","isPartOf":{"@id":"https://seon.io/resources/digital-footprinting-against-fraud-in-the-digital-age/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Digital Footprint Analysis: Adapting Fraud Prevention for the Digital Age","datePublished":"2024-03-20T13:15:48+00:00","dateModified":"2025-11-27T11:44:29+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/digital-footprinting-against-fraud-in-the-digital-age/"},"wordCount":1117,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/digital-footprinting-against-fraud-in-the-digital-age/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Modern fraud needs digital-first defenses. See how digital footprints, AI and early signals are transforming fraud prevention."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/digital-footprinting-against-fraud-in-the-digital-age/","url":"https://seon.io/resources/digital-footprinting-against-fraud-in-the-digital-age/","name":"How Digital Footprints Are Redefining Fraud Prevention","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/digital-footprinting-against-fraud-in-the-digital-age/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","datePublished":"2024-03-20T13:15:48+00:00","dateModified":"2025-11-27T11:44:29+00:00","description":"Modern fraud needs digital-first defenses. See how digital footprints, AI and early signals are transforming fraud prevention.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/digital-footprinting-against-fraud-in-the-digital-age/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/what-is-framl-and-how-it-works/#article","isPartOf":{"@id":"https://seon.io/resources/what-is-framl-and-how-it-works/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"How FRAML Integrates Fraud Prevention and AML for Stronger Defensibility","datePublished":"2024-04-11T08:19:10+00:00","dateModified":"2026-01-29T18:04:52+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/what-is-framl-and-how-it-works/"},"wordCount":1167,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/what-is-framl-and-how-it-works/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/04/How-FRAML-Integrates-Fraud-Prevention-and-AML-for-Stronger-Defensibility.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Financial institutions worldwide are continuously evolving their strategies to combat fraud and money laundering, two threats that undermine the potential of our global financial systems. With the United Nations reporting that three to five percent of the global GDP is laundered annually and fraud costs worldwide reaching $5.13 trillion – a 56% increase over the past decade- many organizations are taking a new approach to integrating prevention and protection efforts.&nbsp;\n\n\n\nAs fraud gains in volume and velocity, so too will the need for fraudsters to launder their profits – and as cross-border financial crimes are here to stay, no institution or location is immune. With the complexity and scale of threats on the rise, any small chink in the armor can become a massive issue.\n\n\n\nWhat is FRAML?\n\n\n\nFRAML, or Fraud and Anti-Money Laundering, represents a holistic strategy that presents an effective way for organizations to strengthen their defenses against both fraud and risk. Uniting fraud protection and prevention with AML checks and compliance allows for better collaboration across the historically siloed operations of teams dealing with distinct but related crimes – fraud and financial crimes, terrorist financing or other nefarious intentions.FRAML enables companies to leverage unified customer data profiles to reduce fragmented risk and fraud views, streamline operations through information sharing that can also reduce costs, support adherence to timely regulatory changes to minimize compliance risks, as well as enable better internal and more strategic decision-making across teams. This end-to-end approach closes the gaps that fraudsters and money launderers exploit to foster a more resilient, agile, consolidated defense.\n\n\n\nFraud Vs. Money Laundering\n\n\n\nFraud and compliance teams, both operating to reduce risks, have long been stuck in their swim lanes, hindering effective collaboration and all-encompassing responses to threats. The adjacent threats of fraud and money laundering are disadvantageously positioned when siloed. Fraud refers to any deceptive or dishonest activity carried out online with the intent of gaining unauthorized benefits or causing loss to others. At the same time, money laundering is the process of making illicit money generated through criminal activity appear legitimate by integrating it into the financial system without suspicion.\n\n\n\nBoth departments are crucial in identifying and mitigating fraud and reducing risk, including financial, operational, legal and reputational hazards. When operating in isolation, teams hold fragmented risk views, potentially overlooking valuable insight that could enhance their understanding and evaluation of each scenario and thus inform their choices.\n\n\n\n\n      Bridge the Gap\n      Learn how FRAML fosters collaboration between fraud and compliance teams, breaking down siloes for a more robust defense. \n     \n        Speak with an Expert\n      \n    \n\n\n\nEnhancing Risk and Fraud Assessment Through FRAML\n\n\n\nWhen a risk team needs to assess an individual, they would first look into traditional AML checks, such as sanctions, politically exposed persons (PEPs), and crime and financial watch lists for hits to inform their AML investigation. When taking a FRAML approach, the team would then be able to augment their understanding of the individual in question by leveraging digital footprinting data and device intelligence – such as if there are multiple email addresses attached to the name, are the person’s accounts active, what is their transaction history and online behavior indicate – to derive a comprehensive digital profile that arms them with a more profound knowledge to better understand intentions and actions. The nuanced depth available in FRAML-based approach empowers quicker decisions on whether an alert needs to be escalated into a case or can be assuredly closed out faster. Moving in the other direction, fraud teams can leverage traditional AML information to create more robust and refined risk rulings. Cross-checking with AML data can uplevel alert systems to create more nuanced and context-rich alerts when looking at a digital footprint or device intelligence. For instance, if a user’s digital behavior seems suspicious but not overtly fraudulent, triggering dynamic friction (otherwise known as delayed customer friction) at strategic intersections adjustable to the level of user verification and security measures needed in real-time can optimize the balance between user convenience and prevention. This information also allows for the integration of AML checks, such as a match on a sanctions list or association with PEPs, to significantly alter the individual’s risk profile, thereby enhancing the overall effectiveness of fraud detection and prevention mechanisms.This integration enables fraud teams to prevent fraudulent transactions and block potential money laundering activities, enhancing the organization’s overall security posture. Such cross-functional insights facilitate a more proactive and predictive approach to identifying and mitigating financial crime, ensuring that organizations stay one step ahead.\n\n\n\n\n\n\n\nTechnological Enablers of FRAML\n\n\n\nFRAML streamlines fraud and money laundering detection into one system versus many systems. Advancements in data processing, machine learning and rule customization stand at the core of this approach, providing a solid foundation for institutions to refine and combine their efforts.&nbsp;\n\n\n\nBy harnessing technologies, organizations can process vast amounts of real-time data swiftly and accurately to meet the growing scale and volume of today’s threat landscape, enabling adaptive models that identify subtle patterns or anomalies indicative of fraudulent or laundering activities. Customizable rules allow for tailoring mechanisms to unique operational contexts, enhancing the precision of screening processes.&nbsp;\n\n\n\nMoreover, using one solution for both fraud prevention and protection and AML initiatives minimizes the reliance on endpoint solutions or reliance on multiple third-party data sources while maximizing the use of trusted information, reducing potential vulnerabilities and enhancing the integrity of the risk assessment and anti-fraud measures. The collaborative insights gained from this integrated approach are both additive and exponential, offering a more profound understanding of risks and enabling more informed decision-making.\n\n\n\n\n\n\n\n\n      Connect and Strengthen with FRAML\n      Eliminate isolated operations and unify your team’s risk views to gain comprehensive insights and make informed decisions.\n     \n        Speak with an Expert\n      \n    \n\n\n\nRegulatory Bodies Increasingly Endorse FRAML\n\n\n\nThe value of FRAML in fortifying the financial sector against illicit activities is increasingly registering among regulatory bodies today, with the Financial Crimes Enforcement Network (FinCEN) at the forefront, advocating for financial institutions to foster collaboration among their AML, fraud defense, legal and cybersecurity departments. This push toward an integrated strategy stems from the understanding that the convergence of expertise and information across these domains significantly enhances an organization’s ability to detect and respond to complex threats.Regulators are beginning to promote FRAML as a best practice and a comprehensive framework that aligns with broader regulatory expectations for due diligence, risk assessment and compliance. By endorsing this approach, regulatory bodies aim to elevate the industry’s standard for combating financial crimes, ensuring that institutions are compliant and better equipped to safeguard the system’s integrity and stability.\n\n\n\nA Greater Shift Toward End-to-End\n\n\n\nFolding AML into fraud prevention affords a way to approach intertwined challenges that can amplify the effectiveness of each practice. Beyond sounding like a buzzword, FRAML is a strategic imperative that empowers institutions to streamline detection and response processes by leveraging a comprehensive view of risk, enabling organizations to act more decisively and proactively.\n\n\n\nSources:\n\n\n\n\nUnodc.org: Money Laundering\n\n\n\nFinCen"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/what-is-framl-and-how-it-works/","url":"https://seon.io/resources/what-is-framl-and-how-it-works/","name":"FRAML: Fraud Prevention and AML for Stronger Defensibility","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/what-is-framl-and-how-it-works/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/04/How-FRAML-Integrates-Fraud-Prevention-and-AML-for-Stronger-Defensibility.png","datePublished":"2024-04-11T08:19:10+00:00","dateModified":"2026-01-29T18:04:52+00:00","description":"Discover what FRAML is, how it works, and how it supports fraud prevention and AML compliance programs.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/what-is-framl-and-how-it-works/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/04/How-FRAML-Integrates-Fraud-Prevention-and-AML-for-Stronger-Defensibility.png","contentUrl":"https://seon.io/wp-content/uploads/2024/04/How-FRAML-Integrates-Fraud-Prevention-and-AML-for-Stronger-Defensibility.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-advanced-technology-is-driving-app-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/how-advanced-technology-is-driving-app-fraud/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"How Advanced Technology is Driving Authorized Push Payment Fraud","datePublished":"2024-04-18T08:02:29+00:00","dateModified":"2026-03-05T11:15:42+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-advanced-technology-is-driving-app-fraud/"},"wordCount":1453,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-advanced-technology-is-driving-app-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/04/How-Advanced-Techology-is-Driving-Authorized-Push-Payment-Fraud.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"APP fraud is rising, driven by real-time payments. Businesses must use AI, ML, and digital intelligence to prevent scams."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-advanced-technology-is-driving-app-fraud/","url":"https://seon.io/resources/how-advanced-technology-is-driving-app-fraud/","name":"How Tech Drives Authorized Push Payment Fraud | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-advanced-technology-is-driving-app-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/04/How-Advanced-Techology-is-Driving-Authorized-Push-Payment-Fraud.png","datePublished":"2024-04-18T08:02:29+00:00","dateModified":"2026-03-05T11:15:42+00:00","description":"APP fraud is rising with real-time payments, costing billions. Learn how AI, ML, and monitoring tools help detect and prevent these scams.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-advanced-technology-is-driving-app-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/04/How-Advanced-Techology-is-Driving-Authorized-Push-Payment-Fraud.png","contentUrl":"https://seon.io/wp-content/uploads/2024/04/How-Advanced-Techology-is-Driving-Authorized-Push-Payment-Fraud.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-risk-management/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-risk-management/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Fraud Risk Management: Key Steps and Advanced Technologies","datePublished":"2024-04-23T16:14:00+00:00","dateModified":"2026-04-13T16:50:15+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-risk-management/"},"wordCount":1220,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-risk-management/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","inLanguage":"en-US","description":"What is fraud risk management? Discover key steps, tools, and tech to detect and prevent fraud in a fast-changing digital world."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/fraud-risk-management/","url":"https://seon.io/resources/fraud-risk-management/","name":"Fraud Risk Management: How It Works & Implementation | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-risk-management/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","datePublished":"2024-04-23T16:14:00+00:00","dateModified":"2026-04-13T16:50:15+00:00","description":"What is fraud risk management? Discover key steps, tools, and tech to detect and prevent fraud in a fast-changing digital world.","mainEntity":[{"@id":"https://seon.io/resources/fraud-risk-management/#faq-question-1747832746767"},{"@id":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875453922"},{"@id":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875478398"},{"@id":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875466655"},{"@id":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875477838"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-risk-management/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-risk-management/#faq-question-1747832746767","position":1,"url":"https://seon.io/resources/fraud-risk-management/#faq-question-1747832746767","name":"What is fraud risk management?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud risk management refers to the structured process of identifying, assessing, and mitigating the risk of fraud within an organization. It involves using advanced tools and technologies to detect and prevent fraudulent activities across operations.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875453922","position":2,"url":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875453922","name":"How can organizations adapt to the constantly evolving landscape of online fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Investing in solutions like SEON that leverage advanced technologies to enhance fraud detection and prevention capabilities provides a seamless way to stay ahead of fraudsters’ changing tactics and methods, stay updated on global regulatory changes and adapt compliance strategies accordingly.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875478398","position":3,"url":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875478398","name":"Why is fraud risk management important in today’s digital world?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"As online fraud and money laundering escalate, fraud risk management helps organizations protect their assets, reputation, and stakeholders. It ensures resilience against cyber threats and enables compliance with evolving global regulations.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875466655","position":4,"url":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875466655","name":"What role does technology play in enhancing fraud risk management?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Technology plays a pivotal role in enhancing fraud risk management by providing sophisticated tools for real-time detection and prevention of fraudulent activities, including AI, machine learning, digital footprinting and device intelligence to enable organizations to swiftly identify and thwart potential fraud, ensuring transaction integrity and maintaining a secure digital environment for both the organization and its users.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875477838","position":5,"url":"https://seon.io/resources/fraud-risk-management/#faq-question-1713875477838","name":"What are the critical components of an effective fraud risk management program?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An effective fraud risk management program combines risk assessment, strong controls, advanced detection tech, continuous monitoring, employee training, and adaptability to evolving threats, creating a resilient, proactive defense against fraud.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/assessing-credit-worthiness-with-alternative-data/#article","isPartOf":{"@id":"https://seon.io/resources/assessing-credit-worthiness-with-alternative-data/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Assessing Credit Worthiness With Alternative Data","datePublished":"2024-04-24T08:14:28+00:00","dateModified":"2025-11-14T14:39:42+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/assessing-credit-worthiness-with-alternative-data/"},"wordCount":1063,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/assessing-credit-worthiness-with-alternative-data/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/04/Assessing-Credit-Worthiness-With-Alternative-Data.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"In a world where over 1.4 billion adults remain unbanked and 7.1 million households in the United States lack access to traditional financial services, the challenge of assessing creditworthiness is more pressing than ever. The gap is particularly pronounced in low and middle-income countries, where fewer than 10% of individuals are on file in public credit registries3.\n\n\n\nThe reliance on conventional credit data to evaluate financial trustworthiness is fraught with limitations, from scarcity to the inability to reflect rapidly changing financial behaviors. Traditional metrics often fail to predict future financial stability, as they hinge on historical data that may no longer be relevant due to swift changes in an individual’s economic circumstances, such as job loss or significant life transitions. The advent of cryptocurrency has also introduced a new layer of complexity and uncertainty in evaluating financial risk.&nbsp;\n\n\n\nThis context sets the stage for exploring how alternative data can provide deeper insights into creditworthiness, especially for those traditionally underserved by banking institutions.\n\n\n\nUsing Digital Footprint Data as a Credit Signal\n\n\n\nIn today’s interconnected world, a physical bank account or traditional credit history is no longer the sole measure of an individual’s financial reliability. Surprisingly, a more universal and accessible indicator exists: digital footprinting. As of January 2024, there were 5.35 billion internet users worldwide, equating to 66% of the global population. Of this number, 5.04 billion are social media users.Digital footprinting, or digital footprint monitoring or assessment, is the process of gathering and interpreting information from an individual’s online activities and presence alongside a vast array of real-time digital, social and behavioral signals. This approach streamlines customer information verification, aiding financial institutions in examining alternative markers of economic stability and adding a critical layer of fraud prevention that allows organizations to discern genuine, qualifying applicants from ineligible or deceitful ones.Leveraging a comprehensive view of their customers’ activities online, financial institutions can achieve a new level of precision, agility and accuracy derived from comprehensive insights into a customer’s digital behavior – while minimizing disruption to the user experience.\n\n\n\n\n\n\n\n\n      Know Your Customers Through Their Digital Behavior\n      Leverage digital footprinting to gain a comprehensive view of financial reliability to enhance decision-making.\n     \n        Speak with an Expert\n      \n    \n\n\n\nMost Popular Socials\n\n\n\nThe average person has an email account and a phone number and is connected to digital platforms. To gain a deeper understanding of digital footprinting, let’s look at the average number of social profiles associated with users across various global regions, excluding ubiquitous platforms like Google, Microsoft and Facebook, to focus on more distinctive signals.In Latin America, for example, the average is 8.7 social profiles per user, while Asia shows a slightly lower average of 8. Africa’s average stands at 9.5, with Europe and North America both at 10.3, and Oceania leading with an average of 10.7. A closer look at the types of platforms reveals regional preferences. For instance, in North America, top platforms include Apple, Amazon and Spotify, while in Africa, users favor Twitter, Instagram and Pinterest. Asia shows a diverse range, with Instagram, Pinterest and Apple being prominent. Such variations offer insights into regional digital behaviors and preferences. Phone usage also varies, with WhatsApp and Telegram being universally popular, yet each region has unique choices, like Flipkart in Asia and Line in Oceania.\n\n\n\nThese statistics are not just numbers but indicators of digital engagement and potential risk factors. A significant drop, such as having fewer than 6-7 social profiles or fewer, is considered a higher risk, indicating fewer digital signals. This data helps paint a picture of what to expect from customers in different regions, aiding in the detection of potential fraud and assessing loan default risks. The nuanced understanding of digital footprints across areas and the consideration of individual variables underscores the importance of alternative data for evaluating creditworthiness. It’s a testament to the evolving landscape of financial assessment, where digital presence provides a dynamic and insightful lens into an individual’s financial behavior.\n\n\n\n\n\n\n\nMarkers of Financial Stability\n\n\n\nCertain digital and social signals can serve as indicators of financial stability, an individual’s potential affordability and economic behaviors. Regular engagements with subscription-based services like Spotify, Disney+ and Netflix suggest a level of disposable income and financial management that aligns with consistent payments. Often shared on platforms like LinkedIn, employment details signal steady income and professional stability.An affinity for high-value technology brands like Apple and Samsung can indicate an individual’s purchasing power and financial priorities. Additionally, transactions involving services that require Know Your Customer (KYC) checks, such as Airbnb, demonstrate a higher level of financial engagement and responsibility.\n\n\n\nAnalyzing data across various regions shows that while indicators are prevalent, they exhibit regional nuances. For instance, in Latin America, Spotify and Apple are common among users, suggesting a widespread culture of investing in digital entertainment and high-value technology. Similarly, platforms like Airbnb and LinkedIn are prominent in Europe and North America, highlighting a trend toward services that necessitate financial reliability and professional engagement.\n\n\n\nThis cross-regional analysis highlights commonalities in financial stability markers and underscores the importance of understanding regional digital behaviors. By recognizing these patterns, financial institutions can better assess individuals’ creditworthiness and financial health across different global markets, enhancing their ability to tailor services and offers to meet nuanced needs.\n\n\n\n\n      Unlock Credit Potential\n      Discover creditworthiness beyond traditional metrics with alternative data for a more inclusive and precise financial assessment.\n     \n        Speak with an Expert\n      \n    \n\n\n\nCredit Worthiness in a Connected World\n\n\n\nIn an era where cash-based economies and a lack of traditional credit histories are prevalent, digital footprinting – leaning on social signals and behavioral data – is emerging as an innovative method to not only quantify digital citizenship but to enhance the global financial ecosystem’s resilience. By leveraging various data sources, the financial sector can extend its reach, refine risk assessments, drive innovation, foster financial inclusion and adapt to the changing economic landscape.A more granular and dynamic understanding of an individual’s financial behavior and position enables financial institutions to customize their services and products more effectively, offering solutions in line with the needs (and risks) associated with each customer – making choices not solely based on past financial actions but on a comprehensive view of a person’s digital life.\n\n\n\nSources:\n\n\n\n\nFDIC - How America Banks: Household Use of Banking and Financial Services\n\n\n\nStatista - Number of internet and social media users worldwide as of January 2024\n\n\n\nProprietary SEON statistics"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/assessing-credit-worthiness-with-alternative-data/","url":"https://seon.io/resources/assessing-credit-worthiness-with-alternative-data/","name":"Assessing Credit Worthiness With Alternative Data - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/assessing-credit-worthiness-with-alternative-data/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/04/Assessing-Credit-Worthiness-With-Alternative-Data.png","datePublished":"2024-04-24T08:14:28+00:00","dateModified":"2025-11-14T14:39:42+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/assessing-credit-worthiness-with-alternative-data/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/04/Assessing-Credit-Worthiness-With-Alternative-Data.png","contentUrl":"https://seon.io/wp-content/uploads/2024/04/Assessing-Credit-Worthiness-With-Alternative-Data.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/device-intelligence-to-filter-out-fraudsters/#article","isPartOf":{"@id":"https://seon.io/resources/device-intelligence-to-filter-out-fraudsters/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Filtering Out the Fraudsters: Putting Device Intelligence to Work","datePublished":"2024-05-08T13:41:14+00:00","dateModified":"2026-03-26T17:06:58+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/device-intelligence-to-filter-out-fraudsters/"},"wordCount":1220,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/device-intelligence-to-filter-out-fraudsters/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Learn how device intelligence detects and prevents fraud using advanced data and behavioral insights."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/device-intelligence-to-filter-out-fraudsters/","url":"https://seon.io/resources/device-intelligence-to-filter-out-fraudsters/","name":"What Is Device Intelligence? How It Works Against Fraud | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/device-intelligence-to-filter-out-fraudsters/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","datePublished":"2024-05-08T13:41:14+00:00","dateModified":"2026-03-26T17:06:58+00:00","description":"Learn how device intelligence helps detect fraud by analyzing real-time signals from user devices, apps, and networks.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/device-intelligence-to-filter-out-fraudsters/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-01-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-case-management/#article","isPartOf":{"@id":"https://seon.io/resources/aml-case-management/"},"author":{"name":"Jeremy Doyle","@id":"https://seon.io/#/schema/person/36d2cf86a89263b8e8627bf53e6cfe86"},"headline":"How AML Case Management Drives Efficiency in Financial Investigations","datePublished":"2024-05-10T16:14:00+00:00","dateModified":"2026-01-28T20:41:43+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-case-management/"},"wordCount":1506,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-case-management/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","inLanguage":"en-US","description":"AML case management streamlines investigations, enhances compliance, and integrates fraud detection for efficient financial crime prevention."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-case-management/","url":"https://seon.io/resources/aml-case-management/","name":"AML Case Management: Best Practices & Tools | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-case-management/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","datePublished":"2024-05-10T16:14:00+00:00","dateModified":"2026-01-28T20:41:43+00:00","description":"Read SEON’s AML case management guide to streamline investigations, centralize alerts, and boost efficiency.","mainEntity":[{"@id":"https://seon.io/resources/aml-case-management/#faq-question-1715357310859"},{"@id":"https://seon.io/resources/aml-case-management/#faq-question-1746690031961"},{"@id":"https://seon.io/resources/aml-case-management/#faq-question-1715357326050"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-case-management/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/36d2cf86a89263b8e8627bf53e6cfe86","name":"Jeremy Doyle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/06/cropped-T0ETE1T7W-U06TM0V2BUY-2c9e4ec56a54-512-96x96.jpeg","url":"https://seon.io/wp-content/uploads/2025/06/cropped-T0ETE1T7W-U06TM0V2BUY-2c9e4ec56a54-512-96x96.jpeg","contentUrl":"https://seon.io/wp-content/uploads/2025/06/cropped-T0ETE1T7W-U06TM0V2BUY-2c9e4ec56a54-512-96x96.jpeg","caption":"Jeremy Doyle"},"description":"Jeremy Doyle is Director of Growth for AML Solutions at SEON, where he leads strategic initiatives and drives business expansion in anti-money laundering (AML) and financial crime prevention. With more than 20 years of experience in SaaS sales, complex deals, and go-to-market strategies, he has delivered strong growth across enterprise software and RegTech sectors. Before SEON, he held senior leadership roles at Lucinity, Q2, PrecisionLender, and IBM, overseeing international sales, client development, and market expansion in EMEA and North America. His expertise spans AML, KYC, financial regulation, and AI-powered risk solutions.","sameAs":["https://www.linkedin.com/in/jeremy-doyle-3348697/"],"knowsAbout":["AML Compliance"],"jobTitle":"Director Growth, AML Solutions","url":"https://seon.io/resources/author/jeremydoyle/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-case-management/#faq-question-1715357310859","position":1,"url":"https://seon.io/resources/aml-case-management/#faq-question-1715357310859","name":"How can you measure the effectiveness of AML case management?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Measuring the effectiveness of AML case management involves assessing its ability to streamline processes, enhance risk detection and ensure regulatory compliance. Key indicators include the speed of case resolution, reduction in false positives and the accuracy of suspicious activity reporting. Additionally, measuring user satisfaction with the system’s usability and efficiency provides insights into its effectiveness in optimizing workflow and resource utilization.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-case-management/#faq-question-1746690031961","position":2,"url":"https://seon.io/resources/aml-case-management/#faq-question-1746690031961","name":"How does AML case management software support compliance?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML case management software supports compliance by centralizing investigations, automating alert handling and to assist with timely regulatory reporting. It uses real-time data and AI analytics to enhance accuracy and reduce false positives, helping regulated organizations streamline compliance operations, maintain clear audit trails and meet AML requirements effectively.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-case-management/#faq-question-1715357326050","position":3,"url":"https://seon.io/resources/aml-case-management/#faq-question-1715357326050","name":"What is an AML case management system?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"An AML case management system is a comprehensive solution financial institutions and regulated industries use to track, investigate and report suspicious activities related to money laundering and other financial crimes. It provides a structured approach for managing the lifecycle of cases, from initial alert through escalation or resolution, enabling efficient allocation of resources and ensuring compliance with regulatory requirements. Modern systems <br /> integrate real-time data, advanced analytics and artificial intelligence (AI) to streamline processes, enhance risk detection and improve operational efficiency.<br />","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/igaming-fraud-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/igaming-fraud-prevention/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"What Is iGaming Fraud? Its Types &amp; How To Prevent It","datePublished":"2024-05-16T10:29:21+00:00","dateModified":"2026-04-10T09:39:08+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/igaming-fraud-prevention/"},"wordCount":2315,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/igaming-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","inLanguage":"en-US","description":"Explore iGaming fraud, its impact, and how to protect your platform and players while keeping gameplay fair."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/igaming-fraud-prevention/","url":"https://seon.io/resources/igaming-fraud-prevention/","name":"iGaming Fraud Prevention: Its Types, Consequences & Methods","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/igaming-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","datePublished":"2024-05-16T10:29:21+00:00","dateModified":"2026-04-10T09:39:08+00:00","description":"Learn how iGaming fraud prevention stops multi-accounting and bonus abuse. Use device intelligence and digital footprints to protect revenue.","mainEntity":[{"@id":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631865638"},{"@id":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631888734"},{"@id":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631905829"},{"@id":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631922361"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/igaming-fraud-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631865638","position":1,"url":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631865638","name":"What makes fraud prevention especially challenging in iGaming?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"iGaming involves rapid, high-value transactions and instant player interactions, making it uniquely susceptible to fraud like bonus abuse and multi-account schemes.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631888734","position":2,"url":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631888734","name":"How is AI reshaping fraud detection in iGaming?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AI enables real-time detection of fraud patterns, automates responses and adapts quickly to evolving threats, helping operators stay ahead.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631905829","position":3,"url":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631905829","name":"Why should operators prioritize seamless player experiences alongside fraud prevention?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Balancing user convenience with security increases player satisfaction and loyalty, directly impacting long-term profitability and competitiveness.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631922361","position":4,"url":"https://seon.io/resources/igaming-fraud-prevention/#faq-question-1744631922361","name":"What emerging fraud threats should iGaming operators watch closely?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Operators should be alert to sophisticated account takeovers, AI-generated fake identities, coordinated multi-accounting, and advanced bonus abuse tactics.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/why-traditional-fraud-prevention-measures-are-not-enough/#article","isPartOf":{"@id":"https://seon.io/resources/why-traditional-fraud-prevention-measures-are-not-enough/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Traditional Fraud Prevention Measures Aren’t Enough","datePublished":"2024-05-23T08:38:00+00:00","dateModified":"2026-03-26T17:35:58+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/why-traditional-fraud-prevention-measures-are-not-enough/"},"wordCount":1265,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/why-traditional-fraud-prevention-measures-are-not-enough/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/05/Traditional-Fraud-Prevention-Measures-Arent-Enough.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Learn why traditional fraud prevention measures are no longer sufficient against modern, adaptive fraud tactics."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/why-traditional-fraud-prevention-measures-are-not-enough/","url":"https://seon.io/resources/why-traditional-fraud-prevention-measures-are-not-enough/","name":"Traditional Fraud Prevention Measures Aren’t Enough - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/why-traditional-fraud-prevention-measures-are-not-enough/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/05/Traditional-Fraud-Prevention-Measures-Arent-Enough.png","datePublished":"2024-05-23T08:38:00+00:00","dateModified":"2026-03-26T17:35:58+00:00","description":"Learn why traditional fraud prevention measures are no longer sufficient against modern, adaptive fraud tactics.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/why-traditional-fraud-prevention-measures-are-not-enough/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/05/Traditional-Fraud-Prevention-Measures-Arent-Enough.png","contentUrl":"https://seon.io/wp-content/uploads/2024/05/Traditional-Fraud-Prevention-Measures-Arent-Enough.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/boosting-profitability-and-security-in-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/boosting-profitability-and-security-in-igaming/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"The Dual Path: Boosting Profitability and Security in iGaming ","datePublished":"2024-05-28T14:28:33+00:00","dateModified":"2025-10-09T10:01:47+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/boosting-profitability-and-security-in-igaming/"},"wordCount":1478,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/boosting-profitability-and-security-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/05/The-Dual-Path-Boosting-Profitability-Security-in-iGaming.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Advanced fraud prevention and AML solutions boost profitability, prevent abuse, and strengthen iGaming defenses."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/boosting-profitability-and-security-in-igaming/","url":"https://seon.io/resources/boosting-profitability-and-security-in-igaming/","name":"The Dual Path: Boosting Profitability and Security in iGaming  - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/boosting-profitability-and-security-in-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/05/The-Dual-Path-Boosting-Profitability-Security-in-iGaming.png","datePublished":"2024-05-28T14:28:33+00:00","dateModified":"2025-10-09T10:01:47+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/boosting-profitability-and-security-in-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/05/The-Dual-Path-Boosting-Profitability-Security-in-iGaming.png","contentUrl":"https://seon.io/wp-content/uploads/2024/05/The-Dual-Path-Boosting-Profitability-Security-in-iGaming.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/total-cost-of-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/total-cost-of-fraud/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"The Total Opportunity Cost of Fraud is Bigger Than You Think","datePublished":"2024-05-31T08:08:48+00:00","dateModified":"2025-11-18T16:58:40+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/total-cost-of-fraud/"},"wordCount":1981,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/total-cost-of-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"As businesses operate in an increasingly interconnected digital global landscape, combating fraud has become more urgent, complex and increasingly intertwined across company departments. What typically sat under legal’ purview for risk and compliance is now becoming an issue that permeates all aspects of business functionality, including product, marketing and customer success. Today, fighting fraud is a team sport.With worldwide fraud costs topping $5.13 trillion each year, climbing a steady 56 percent over the last decade, much of its growth is attributable to long-term social and technological factors and the effects of economic cycles. On average, businesses lose five percent of their annual revenues to fraud – but this is just the tip of the iceberg. Fraudsters and cybercriminals are ramping up, leveraging advanced techniques to exploit digital infrastructure vulnerabilities and amplifying businesses’ susceptibility across sectors.&nbsp;\n\n\n\nTraditionally, calculating the total cost of fraud relies on the percentage of revenue spent on fraud every month, including tools and vendors, resources such as headcount and salaries, and the actual losses from fraudulent activities. However, fraud’s ripple effect on opportunity costs can exponentially serve as a detriment to a company’s bottom line.\n\n\n\n\n\n\n\nFocusing too narrowly on financial losses fails to accurately reflect fraud’s full consequences, which can impact core pillars, such as operational efficiencies, compliance, customer experience and scalability. Amid escalating risks and accumulating cost burdens, companies must thoroughly evaluate their evolving fraud exposure, including fraud’s wide-reaching ramifications across their business – to truly understand the total opportunity cost lost to fraud.\n\n\n\nFactoring in ‘Soft’ Costs of Fraud\n\n\n\nFraud’s indirect consequences can jeopardize business success. These soft costs, which are harder to quantify in numbers, exacerbate and expand fraud’s cost footprint. Highlighting the more significant knock-on effect beyond direct losses contributes to understanding the total actual cost of fraud and the broader implications.&nbsp;\n\n\n\n\n\n\n\nOperational Inefficiencies\n\n\n\nInstances of fraud often trigger a chain reaction of operational inefficiencies, marked by labor-intensive manual reviews conducted by sizable teams of fraud analysts. These processes not only incur substantial labor costs but also introduce operational bottlenecks. While some market solutions integrate machine learning (ML), artificial intelligence (AI), and automation to streamline review processes and minimize reliance on manual intervention, many businesses operate with fragmented workflows, where separate departments are isolated, leading to gaps and weaknesses.As fraudulent activities escalate in complexity and volume, companies allocate a significant workforce to sift through transactions, verify identities and flag suspicious behavior. Each manual review represents an expenditure of time and human capital and a delay in processing legitimate transactions, potentially souring customer experiences and impeding revenue streams. With analysts bogged down in repetitive tasks, critical alerts might go unnoticed or unresolved, exposing vulnerabilities and allowing fraudulent activities to persist unchecked.\n\n\n\nThe advancements in AI, ML and automation transform fraud detection and protection by augmenting human capabilities with algorithmic precision and scalability. By deploying sophisticated algorithms to analyze vast datasets in real-time, businesses can swiftly identify patterns indicative of fraudulent behavior, flagging suspicious transactions for further scrutiny while minimizing false positives. By adopting a holistic approach to fraud detection and fostering cross-departmental collaboration, businesses can transcend operational inefficiencies, unlocking new levels of agility, accuracy and scalability in combating fraud.\n\n\n\nLoss of Customers\n\n\n\nBalancing anti-fraud measures with seamless customer experience is critical to prevent attrition, preserve brand loyalty and uphold customer success. Influenced by the predictive experiences offered by behemoths like Amazon, Netflix and YouTube, customers now anticipate that companies will detect and address potential fraud incidents even before they become aware of them. Fraud’s impact resonates deeply within customer interactions, especially during transactions, where prolonged fraud checks increase inconvenience. Further, fraudulent events compound the issue and increase customer dissatisfaction. Research shows that after the event of a data breach, companies saw up to a seven percent increase in customer churn.In the competitive landscape of modern commerce, customer experience reigns supreme, and each interaction shapes brand perception, influences purchase decisions and informs long-term loyalty. When fraud itself or the mechanisms to disrupt fraud disrupt the flow of transactions, customers bear the brunt of inconvenience. Lengthy verification processes, additional security checks and delayed approvals contribute to suboptimal experience. With speed and convenience paramount, every moment of friction increases the likelihood of abandonment – especially in competitive markets – as customers seek out alternative providers offering smoother transactions or experiences. When legitimate transactions are erroneously flagged as fraudulent, customers experience the inconvenience of delayed approvals and the indignity of suspicion. Such instances erode trust and undermine the perceived reliability of a company’s fraud detection systems.&nbsp;\n\n\n\nThe repercussions extend beyond individual transactions to broader brand trustworthiness and reliability perceptions. In the aftermath of a data breach or security incident, customers exhibit heightened sensitivity to potential risks, scrutinizing the company’s response and weighing the adequacy of its safeguards. Any perception of negligence or indifference can cause irreparable damage to the brand’s reputation. By leveraging advanced technologies, companies can preemptively identify and mitigate potential threats, safeguarding transactions and protecting customer activities without imposing undue burdens on customers.\n\n\n\nCosts Associated with Compliance\n\n\n\n\n\n\n\nFraud and anti-money laundering compliance costs have been rising sharply, driven by factors like new regulations, evolving financial crimes and the need for enhanced due diligence and monitoring capabilities. Globally, the total expenditure of financial crime compliance surged to approximately $274 billion in 2022. Today, companies and financial institutions face heightened vulnerability to illicit activities linked to real-time digital payments, profits from trafficking and trade-based money laundering schemes. And many are operating on tight budgets, with less than 5% of Thomson Reuters’ survey respondents citing that their budgets would increase for the next year. Managing the cost of AML compliance has become a growing concern for organizations balancing risks with limited resources.Amid this escalating regulatory environment – with the volume of regulatory changes dominating the list of compliance challenges – the issue of managing cost pressures while concurrently fulfilling competitive and compliance imperatives looms large. However, despite the glaring necessity to keep a vigilant eye on expenditure, 45% of survey respondents admitted to a lack of comprehensive monitoring of compliance costs across their organizations. Another one-third of respondents said they expected compliance teams to grow, and the overall cost of compliance staff was expected to increase despite staff turnover and budgets remaining at 2022 levels.The expenses entailed in upholding compliance standards extend far beyond the mere implementation of regulatory frameworks, encompassing a multifaceted spectrum of financial outlays, each bearing its own set of implications for organizational viability and reputation. Foremost among these costs are regulatory fines, which serve as punitive measures meted out by governing bodies in response to lapses in compliance adherence. In 2023, global AML fines reached beyond $5.8 billion for crypto and fintech groups, with the total for banks lower at $835 million. These fines take a tangible toll on financial resources and carry intangible repercussions in the form of reputational damage and erosion of stakeholder trust.&nbsp;\n\n\n\nIn addition to the financial burdens, compliance operations face significant hurdles in regulatory reporting, customer risk assessment and digital identity authentication. The convergence of these obstacles, compounded by the heightened risks of financial crime, is exerting a profound impact on various facets of business operations.\n\n\n\nMeanwhile, due diligence timelines are stretched thin as organizations grapple with verifying customer identities and assessing risk profiles in an increasingly digital and interconnected world. Moreover, the challenges associated with digital identity authentication add a layer of complexity, requiring sophisticated technological solutions and robust security measures. From deploying fraud detection solutions to conducting thorough investigations into suspicious activities, organizations must allocate substantial resources to safeguarding their assets and mitigating potential risks.\n\n\n\nDetriment to Scalability\n\n\n\nAs businesses expand and scale their operations, the impact of fraud on their total cost can become increasingly pronounced, yet it often remains overlooked until later stages of growth. What may have initially appeared as manageable losses in the early stages can quickly escalate as the business footprint expands, encompassing a more comprehensive array of transactions, customers and operational complexities.\n\n\n\nOne of the critical challenges in addressing fraud at scale lies in the evolution of fraud tactics. What may have sufficed as viable point solutions in the initial stages of business development can quickly become inadequate in the face of sophisticated and evolving fraud schemes. The transition from piecemeal fraud prevention measures or outdated legacy systems to a more comprehensive fraud prevention solution is not always straightforward if building a platform internally can entail a complex rip-and-replace process. Such endeavors demand substantial financial investment and stringent planning and execution to ensure minimal disruption to ongoing operations.\n\n\n\n\n      Make Better Anti-Fraud Decisions\n      Learn how to select the best fraud prevention for your business needs.\n\n        Download free guide\n      \n    \n\n\n\nMoreover, the pursuit of scalability often necessitates a fundamental shift in mindset, wherein fraud prevention is accorded the same strategic importance as business expansion goals. Comprehensive fraud prevention strategies must seamlessly integrate into the organization’s fabric, aligning with broader scalability initiatives and operational objectives. This entails not merely reacting to instances of fraud as they arise but proactively embedding fraud detection and prevention mechanisms into every facet of the business, from product development to customer acquisition and beyond.\n\n\n\nWhile fraud presents a tangible risk to business operations, it should not deter growth or hamper the organization’s ability to raise capital, increase sales or expand into new markets. Instead, a balanced approach is needed, wherein fraud prevention efforts are harmonized with strategic growth objectives, enabling the organization to realize its full potential while safeguarding against potential risks. By embracing a proactive stance toward fraud prevention – and partnering with an API-first anti-fraud solution that can scale and adapt alongside a company, businesses can navigate the complexities of growth with confidence and resilience.\n\n\n\nRising Concern Among Decision-Makers\n\n\n\nThe surge in fraud incidents has triggered a notable rise in concern among decision-makers across industries. Yet, this concern is often compounded by a lack of understanding regarding the true extent of risk exposure. As fraudsters continue to innovate and exploit vulnerabilities, decision-makers grapple with the elusive nature of fraud, unsure of how best to fortify their defenses. This uncertainty underscores the critical need for businesses to understand the impact of fraud on their revenue streams.\n\n\n\nThe statistics paint a stark picture: fraud inflicts substantial financial losses, significantly dragging revenue generation. The Global Economic Crime and Fraud survey, conducted in 2022, reported total losses attributed to fraud at $42 billion. These figures serve as a wake-up call, highlighting the urgent imperative for businesses to bolster their fraud prevention measures and safeguard their bottom lines against the pervasive threat of fraud.\n\n\n\nThe Need for Better Protection Now\n\n\n\nIt is no longer sufficient for businesses to react to instances of fraud as they arise; proactive measures must be taken to fortify defenses, mitigate risks preemptively and protect opportunities. This requires a concerted effort to embed fraud prevention mechanisms into every aspect of business operations. As advancements in technology enable fraudsters to commit a greater volume of fraud with unprecedented speed, fighting back with agility and precision entails harnessing the power of the same technologies: AI and machine learning algorithms.Beyond direct financial losses, fraud inflicts a ripple effect of opportunity costs that undermine operational efficiencies, compromise compliance standards, erode customer trust, and impede scalability. To fully grasp the total cost of online fraud, businesses must acknowledge and account for these indirect consequences, which often exact a more profound toll on organizational viability and reputation.\n\n\n\nSources:\n\n\n\n\nFraud isn't just a security problem, it's a marketing problem too - Marketing Interactive\n\n\n\nCrowe - Fraud costs the global economy over US$5 trillion&nbsp;\n\n\n\nAccountingToday - Organizations lose 5 percent of revenue to fraud every year\n\n\n\nSecurityMagazine - 80% of global businesses expect a breach of customer records in the next year\n\n\n\nGisReports - Why anti-money laundering policies are failing\n\n\n\nThomson Reuters - 2023 Cost of Compliance\n\n\n\nPwC’s Global Economic Crime and Fraud Survey 2022"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/total-cost-of-fraud/","url":"https://seon.io/resources/total-cost-of-fraud/","name":"The Total Cost of Fraud for Businesses [2024] | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/total-cost-of-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","datePublished":"2024-05-31T08:08:48+00:00","dateModified":"2025-11-18T16:58:40+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/total-cost-of-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ai-and-innovative-tech-to-combat-new-complex-fraud-schemes/#article","isPartOf":{"@id":"https://seon.io/resources/ai-and-innovative-tech-to-combat-new-complex-fraud-schemes/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Combating Complex Fraud with AI and New Technology","datePublished":"2024-06-07T12:44:01+00:00","dateModified":"2025-11-18T16:58:02+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ai-and-innovative-tech-to-combat-new-complex-fraud-schemes/"},"wordCount":1007,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ai-and-innovative-tech-to-combat-new-complex-fraud-schemes/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/Leveraging-AI-Innovative-Tech-to-Combat-Emerging-Complex-Fraud-Schemes.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Explore how AI-powered tools are replacing outdated fraud methods to detect deepfakes, synthetic IDs, and behavioral threats in real time."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/ai-and-innovative-tech-to-combat-new-complex-fraud-schemes/","url":"https://seon.io/resources/ai-and-innovative-tech-to-combat-new-complex-fraud-schemes/","name":"How AI Is Redefining the Fight Against Modern Fraud | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ai-and-innovative-tech-to-combat-new-complex-fraud-schemes/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/Leveraging-AI-Innovative-Tech-to-Combat-Emerging-Complex-Fraud-Schemes.png","datePublished":"2024-06-07T12:44:01+00:00","dateModified":"2025-11-18T16:58:02+00:00","description":"Explore how AI-powered tools are replacing outdated fraud methods to detect deepfakes, synthetic IDs, and behavioral threats in real time.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ai-and-innovative-tech-to-combat-new-complex-fraud-schemes/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/Leveraging-AI-Innovative-Tech-to-Combat-Emerging-Complex-Fraud-Schemes.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/Leveraging-AI-Innovative-Tech-to-Combat-Emerging-Complex-Fraud-Schemes.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/money-20-20/#article","isPartOf":{"@id":"https://seon.io/resources/money-20-20/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Money 20/20: Key Takeaways for the Financial Industry","datePublished":"2024-06-20T14:10:40+00:00","dateModified":"2025-11-18T16:28:12+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/money-20-20/"},"wordCount":609,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/money-20-20/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/20_-Key-Takeaways-for-the-Financial-Industry.png","articleSection":["Event Insights"],"inLanguage":"en-US","description":"This year’s discussions at Money 20/20 in Amsterdam shed light on pivotal trends and transformational shifts within the financial industry. Here, we explore three critical insights poised to shape the future of finance.\n\n\n\nAPP Fraud and the Upcoming UK Regulation\n\n\n\nThe looming October 2024 regulation in the UK, which shifts the responsibility for preventing APP fraud onto payment companies and financial institutions, was a hot topic. The Payment Systems Regulator (PSR) has rejected requests to delay these new rules, emphasizing the urgency of enhanced fraud prevention measures.\n\n\n\nThe regulation mandates that victims of APP fraud be reimbursed for losses up to £415,000, significantly higher than the industry-proposed threshold. This shift demands companies bolster their fraud detection and prevention capabilities to meet the new standards. As industry players brace for implementing these regulations, the focus remains on balancing regulatory compliance with operational efficiency. The proactive stance of the PSR underscores the critical need to protect consumers and maintain trust in the financial system.\n\n\n\nEuropean Fintechs Transitioning to Full-Service Financial Institutions\n\n\n\nOne prominent theme at Money 20/20 was the significant evolution of European fintechs. Once known primarily as SuperApps offering limited financial services like currency exchange, these companies are now transitioning toward becoming full-service financial institutions, offering a comprehensive suite of services such as lending, insurance, wealth management and traditional banking. With this maturation comes new challenges, particularly in regulatory compliance and licensing across various markets.\n\n\n\nDuring a keynote session, Revolut highlighted this transition, emphasizing the need for fintechs to secure appropriate licenses and adhere to stringent regulatory standards to expand their service offerings. As these companies evolve, they face greater scrutiny from regulatory bodies, necessitating robust compliance frameworks. The ongoing evolution of fintechs signifies their readiness to compete directly with more traditional banks, bringing innovative solutions to the financial services sector.\n\n\n\nThe Imperative of Fraud Preparedness for Instant Money Payments\n\n\n\nAnother critical topic at Money 20/20 was the imminent adoption of instant payments. While this advancement promises significant convenience and efficiency, it raises substantial concerns regarding fraud and anti-money laundering (AML) obligations. Many industry leaders voiced apprehensions about the current infrastructure’s ability to identify and mitigate fraudulent activities swiftly.\n\n\n\nDiscussions centered on the industry’s push for regulatory bodies to delay the implementation of instant money payments. The consensus is clear: the risk to consumers and businesses is too significant without adequate systems to detect and respond to fraud in real time. It will be essential to ensure that the necessary technological and regulatory frameworks are in place to support a successful rollout of instant payments.\n\n\n\nThe Dynamic Nature of the Financial Industry\n\n\n\nMoney 20/20 underscored the pressing need for fraud preparedness in the era of instant payments, signaling a transformative period in which innovation and regulation must work together to ensure a secure and efficient financial ecosystem. At SEON, we remain committed to supporting our partners through these transitions, offering cutting-edge fraud prevention and AML solutions that address the industry’s evolving needs.In a recent interview, Logan Porter, Director of Solution Engineering at SEON, shared the importance of leveraging advanced technologies and data analytics to detect and prevent fraudulent activities while highlighting the role of collaboration within the industry to enhance the overall effectiveness of fraud prevention strategies. Read Porter’s thoughts on combating fraud with SEON’s innovative approach in the full article on Payment Expert.\n\n\n\nWe look forward to the ongoing discussions and innovations that will change the industry, ensuring we are prepared to meet challenges and seize opportunities that lie ahead.\n\n\n\nSources:\n\n\n\n\n1. Gartner: What is a Superapp?\n\n\n\n2. Financial Times: UK payments watchdog rejects industry call to delay refund plan\n\n\n\n3. PSR: Regulatory framework"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/money-20-20/","url":"https://seon.io/resources/money-20-20/","name":"Money 20/20: Key Takeaways for the Financial Industry - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/money-20-20/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/20_-Key-Takeaways-for-the-Financial-Industry.png","datePublished":"2024-06-20T14:10:40+00:00","dateModified":"2025-11-18T16:28:12+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/money-20-20/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/20_-Key-Takeaways-for-the-Financial-Industry.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/20_-Key-Takeaways-for-the-Financial-Industry.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/identity-risk-management/#article","isPartOf":{"@id":"https://seon.io/resources/identity-risk-management/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Identity Risk Management: Strategic Approaches to Mitigate Risk","datePublished":"2024-06-24T15:59:48+00:00","dateModified":"2025-11-18T16:27:34+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/identity-risk-management/"},"wordCount":1334,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/identity-risk-management/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","inLanguage":"en-US","description":"Discover how tools like digital footprinting, device intelligence, and AI strengthen identity risk management and prevent fraud."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/identity-risk-management/","url":"https://seon.io/resources/identity-risk-management/","name":"Identity Risk Management: How to Mitigate Risk - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/identity-risk-management/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","datePublished":"2024-06-24T15:59:48+00:00","dateModified":"2025-11-18T16:27:34+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/identity-risk-management/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/balancing-ais-benefits-and-threats/#article","isPartOf":{"@id":"https://seon.io/resources/balancing-ais-benefits-and-threats/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Balancing AI’s Benefits and Threats Across Fraud and Cybersecurity","datePublished":"2024-06-27T08:20:14+00:00","dateModified":"2025-11-18T16:27:20+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/balancing-ais-benefits-and-threats/"},"wordCount":813,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/balancing-ais-benefits-and-threats/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/Balancing-AIs-Benefits-and-Threats-Across-Fraud-and-Cybersecurity.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"We don’t know what AI will look like one year from today. The technology is advancing so rapidly that it’s impossible to anticipate what comes next, and even as we stand on the cusp of transformative change, we can’t solve the unknown variable.\n\n\n\nSuch uncertainty is unwelcome in cybersecurity and fraud. Both fields are defined by their abilities to predict, prevent and mitigate risks. The evolution of AI adds layers of complexity, presenting unprecedented opportunities and significant threats. On the one hand, AI’s capabilities enhance defense mechanisms, enabling the detection and counteraction of fraud with remarkable efficiency. On the other hand, the same technology is being weaponized by malicious actors, exponentially amplifying the speed, scale and complexity of attacks.\n\n\n\n\n\n\n\nThis delicate balance between AI’s threats and benefits is a source of growing skepticism, especially among those not deeply invested in the technology itself. As AI-driven progress continues to surge, questions arise about maintaining its progress over the long term without compromising security. How can the technology driving novel and increasingly sophisticated fraud activities be harnessed to combat scams and cyber risks cost-efficient and effectively?The stakes are high as AI takes a more central role in fraud – used by fraudsters to carry out attacks and by companies to deploy multi-layered defense systems to catch fraud earlier in their customers’ journeys. With regular breakthroughs occurring in AI, there’s also growing interest in the potential for artificial general intelligence (AGI) to emerge in the near term. This potential evolution compounds the circumstances regarding how the technology will impact fraud and cybersecurity measures, presenting significant risks and transformative opportunities.\n\n\n\n\n      Fight Evolving Fraud\n      Discover how fraud tactics are changing and how to stay ahead. \n\n        Read More\n      \n    \n\n\n\nAdvancements in AI Technology\n\n\n\nInnovations in machine learning, natural language processing and data analytics have led to the development of sophisticated algorithms capable of analyzing vast amounts of data in real time, identifying patterns and making predictions with remarkable accuracy. These advancements have changed the way we approach cybersecurity and fraud detection. However, they have also provided hackers with powerful tools to enhance their attacks.AI’s capabilities, like machine learning algorithms, are being trained to identify and exploit vulnerabilities, automate phishing attacks and bypass traditional security measures. AI can generate synthetic identities, create deepfakes and lead other persuasive and difficult-to-detect social engineering tactics. These advanced methods enable fraudsters to adapt countermeasures in real time, continuously evolving their strategies to stay ahead of defenses.\n\n\n\n\n\n\n\nThe use of AI in fraud is not limited to the digital space; it extends to financial crimes, money laundering, identity theft and other illicit activities. A-driven tools can analyze financial transactions, detect unusual patterns and facilitate money-laundering schemes. In identity theft, AI can create realistic fake profiles and manipulate personal information, making it challenging for traditional verification methods to identify suspicious activities.&nbsp;\n\n\n\nLooking at the Emerging Threat of AGI\n\n\n\nWith the possible emergence of AGI, the future of fraud and cybersecurity could change dramatically. AGI’s ability to understand, learn and apply knowledge across various tasks could revolutionize multiple domains, including improving research, enriching customer interactions and enhancing workflow efficiencies. However, this same capability could also be exploited by fraudsters and online criminals to elevate the sophistication of their attacks to previously untenable levels.As AGI develops, it could be used to create more advanced and adaptive fraud schemes, making it harder for traditional security measures to keep pace. The potential for AGI to learn and apply new methods autonomously poses a significant challenge for cybersecurity experts. It necessitates a proactive and forward-thinking approach to anticipating and mitigating future threats.\n\n\n\n\n      Fraud Detection Using Machine Learning\n      Discover how your business can leverage powerful, ML-enhanced fraud detection.\n\n        Learn More\n      \n    \n\n\n\nThe Need to Evolve Thinking\n\n\n\nAs AI technology advances, so must strategies that leverage the technology to enhance defenses. This includes developing robust frameworks for monitoring and regulating AI applications to prevent misuse. This will require collaboration between various stakeholders, including tech companies, regulatory bodies and cybersecurity experts.Sharing knowledge, resources and best practices can help build a unified front against emerging threats and support ongoing research and development, all required undertakings to stay ahead of fraudsters and ensure that defenses are as adaptive and sophisticated as the attacks they aim to prevent.\n\n\n\nAs AI continues to dominate the spotlight, it is imperative to recognize and address its dual nature. While AI offers benefits, it also presents threats that must be carefully managed. By staying vigilant, investing in advanced AI-driven solutions and fostering collaboration among stakeholders, we can navigate the complex landscape of AI in fraud and cybersecurity.\n\n\n\nSources:\n\n\n\n\n1. The Washington Post: AI’s use in political campaigns meets skepticism from voters\n\n\n\n2. World Economic Forum: AI pioneers discuss breakthroughs and what's next\n\n\n\n3. McKinsey &amp; Company: What is artificial general intelligence (AGI)?"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/balancing-ais-benefits-and-threats/","url":"https://seon.io/resources/balancing-ais-benefits-and-threats/","name":"AI's Benefits vs. Risks in Fraud and Cybersecurity - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/balancing-ais-benefits-and-threats/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/Balancing-AIs-Benefits-and-Threats-Across-Fraud-and-Cybersecurity.png","datePublished":"2024-06-27T08:20:14+00:00","dateModified":"2025-11-18T16:27:20+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/balancing-ais-benefits-and-threats/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/Balancing-AIs-Benefits-and-Threats-Across-Fraud-and-Cybersecurity.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/Balancing-AIs-Benefits-and-Threats-Across-Fraud-and-Cybersecurity.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#article","isPartOf":{"@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"Transaction Monitoring for Fraud and Payments","datePublished":"2024-07-10T17:17:50+00:00","dateModified":"2026-03-05T10:55:43+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/"},"wordCount":1392,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"See how risk and fraud monitoring detects suspicious payments, stops fraud in real time, and reduces losses."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/","url":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/","name":"Guide to Transaction Monitoring for Fraud and Payments | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","datePublished":"2024-07-10T17:17:50+00:00","dateModified":"2026-03-05T10:55:43+00:00","description":"Learn how fraud transaction monitoring detects suspicious activity, reduces risk, and ensures compliance in real-time using machine learning.","mainEntity":[{"@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#faq-question-1720629962088"},{"@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#faq-question-1720629971778"},{"@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#faq-question-1720630705752"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254","name":"Nauman Abuzar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/05/cropped-T0ETE1T7W-U0677FRS2MD-dd7e0e1ada20-512-96x96.jpeg","url":"https://seon.io/wp-content/uploads/2025/05/cropped-T0ETE1T7W-U0677FRS2MD-dd7e0e1ada20-512-96x96.jpeg","contentUrl":"https://seon.io/wp-content/uploads/2025/05/cropped-T0ETE1T7W-U0677FRS2MD-dd7e0e1ada20-512-96x96.jpeg","caption":"Nauman Abuzar"},"description":"Nauman Abuzar is Director of Product for Risk Solutions at SEON, where he advises on AML, KYC, and transaction monitoring. With over a decade of global experience in compliance, financial crime, and fraud prevention, he brings expertise across fintech, crypto, and payments. He founded a RegTech firm acquired in 2024 and leads a boutique consultancy. He is a member of ACAMS and its Netherlands Chapter, holds an ACCA certification, a Wwft Transaction Monitoring certification, and earned Bachelor's and Master’s degrees in Accounting and Commerce.","sameAs":["https://www.linkedin.com/in/naumanabuzar/"],"knowsAbout":["AML Compliance","Transaction Monitoring","KYC"],"jobTitle":"Director of Product, AML & Risk Solutions","url":"https://seon.io/resources/author/naumanabuzar/"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#faq-question-1720629962088","position":1,"url":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#faq-question-1720629962088","name":"What are the challenged of fraud monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Modern transaction monitoring solutions are crucial for businesses that process millions of transactions daily to analyze all data in real time. Some systems are overly sensitive and generate too many false alarms, leading to alert fatigue or overlooking genuine fraud cases.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#faq-question-1720629971778","position":2,"url":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#faq-question-1720629971778","name":"What is fraud risk monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Normally used as a synonym of fraud monitoring, fraud <a href=\"https://seon.io/resources/risk-monitoring/\">risk monitoring</a> highlights the risk management aspect of this process, sometimes being an integral part of an organization’s <a href=\"https://seon.io/resources/comparisons/best-risk-management-software/\">risk management software</a> and/or strategy.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#faq-question-1720630705752","position":3,"url":"https://seon.io/resources/transaction-monitoring-for-fraud-and-payments/#faq-question-1720630705752","name":"Why is fraud transaction and payment monitoring important?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud and payment transaction monitoring protects the financial system, maintains consumer and business trust, and prevents significant financial losses by quickly detecting unauthorized transactions. Effective monitoring also ensures compliance with regulations, helping financial institutions avoid legal penalties and reputational damage, while maintaining customer confidence in secure operations.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/takeaways-from-collaborating-for-impact-the-benefits-for-fraud-prevention-and-aml-detection/#article","isPartOf":{"@id":"https://seon.io/resources/takeaways-from-collaborating-for-impact-the-benefits-for-fraud-prevention-and-aml-detection/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Takeaways from “Collaborating for Impact: The Benefits for Fraud Prevention and AML Detection”","datePublished":"2024-07-11T11:17:09+00:00","dateModified":"2025-11-18T16:26:03+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/takeaways-from-collaborating-for-impact-the-benefits-for-fraud-prevention-and-aml-detection/"},"wordCount":921,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/takeaways-from-collaborating-for-impact-the-benefits-for-fraud-prevention-and-aml-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/07/Collaborating-for-Impact-The-Benefits-for-Fraud-Prevention-and-AML-Detection.png","articleSection":["Webinar Takeaways"],"inLanguage":"en-US","description":"Integrating fraud and AML teams with AI and quality data boosts compliance and prevents financial crime."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/takeaways-from-collaborating-for-impact-the-benefits-for-fraud-prevention-and-aml-detection/","url":"https://seon.io/resources/takeaways-from-collaborating-for-impact-the-benefits-for-fraud-prevention-and-aml-detection/","name":"The Advantages of Fraud Prevention and AML Detection Collaboration","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/takeaways-from-collaborating-for-impact-the-benefits-for-fraud-prevention-and-aml-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/07/Collaborating-for-Impact-The-Benefits-for-Fraud-Prevention-and-AML-Detection.png","datePublished":"2024-07-11T11:17:09+00:00","dateModified":"2025-11-18T16:26:03+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/takeaways-from-collaborating-for-impact-the-benefits-for-fraud-prevention-and-aml-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/07/Collaborating-for-Impact-The-Benefits-for-Fraud-Prevention-and-AML-Detection.png","contentUrl":"https://seon.io/wp-content/uploads/2024/07/Collaborating-for-Impact-The-Benefits-for-Fraud-Prevention-and-AML-Detection.png","width":416,"height":234}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/what-is-enhanced-due-diligence/#article","isPartOf":{"@id":"https://seon.io/resources/what-is-enhanced-due-diligence/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"What Is Enhanced Due Diligence (EDD)?","datePublished":"2024-08-04T12:03:00+00:00","dateModified":"2025-11-18T16:25:29+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/what-is-enhanced-due-diligence/"},"wordCount":846,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/what-is-enhanced-due-diligence/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","inLanguage":"en-US","description":"Enhanced Due Diligence (EDD) is a more in-depth process used by financial institutions to ensure their customers are not involved in illegal activities like money laundering or financing terrorism. Unlike standard checks, EDD requires a thorough investigation into a customer's background, including verifying multiple identification documents, understanding who really owns the assets, and continuously monitoring their transactions. This extra layer of scrutiny helps institutions manage the risks associated with high-risk customers.\n\n\n\nThe process of EDD is guided by the Financial Action Task Force (FATF), a global authority that sets the standards for combating money laundering and terrorism financing. The FATF outlines which types of businesses and individuals should undergo this rigorous process, making sure that financial institutions take the necessary steps to comply with international regulations and protect their reputation.\n\n\n\nWhen Is Enhanced Due Diligence Required?\n\n\n\nAn EDD check is much more involved, costly, and time-consuming than a customer due diligence check. Thus, a&nbsp;risk-based&nbsp;approach is best, where banks, fintechs and other related organizations can decide whether to trigger EDD checks after the customer has been assessed by&nbsp;a digital footprinting solution.\n\n\n\nThe triggering flags associated with EDD are part of the government mandate and are sometimes distinct from what we associate with run-of-the-mill fraudsters. For example, Enhanced due diligence AML legislation dictates that the following are subject:\n\n\n\n\nPolitically Exposed Persons (PEPs): individuals who are in prominent positions visible to the public, remaining transparent for the sake of public trust\n\n\n\nSpecial Interest Persons (SIPs): individuals who have previously been, or are currently, linked to&nbsp;financial crimes\n\n\n\nclients from countries that have been sanctioned or embargoed\n\n\n\nindividuals who have been sanctioned or embargoed themselves\n\n\n\ncustomers who are caught up in negative media coverage\n\n\n\ncustomers whose transactions are apparently unusual or seemingly economically useless\n\n\n\nclients from countries on the Financial Action Task Force’s greylist or blacklist, or countries designated as high-risk\n\n\n\nparticularly wealthy clients\n\n\n\nclients whose transactions are unnecessarily complex and lend themselves to obfuscating a beneficial owner, including correspondence banking where the client is never physically present\n\n\n\n\nAs cybercrime is a constantly evolving landscape, these metrics evolve as well. While legislators take into account the damage excess customer friction can bring to profits, these changes can often be difficult for companies to navigate.&nbsp;\n\n\n\nWhy is EDD Important?\n\n\n\nEnhanced Due Diligence (EDD) is crucial for high-risk applicants, enabling them to access financial products that would otherwise be out of reach. Non-compliance with EDD can result in severe penalties and reputational damage for financial institutions. However, strong EDD practices enhance a company's reputation, especially in the fintech and ecommerce sectors where customer trust is vital.\n\n\n\nHow Does Enhanced Due Diligence Compliance Work?\n\n\n\nWhen a customer meets one or several of the required metrics, it is up to a company’s&nbsp;KYC compliance&nbsp;team to decide how best to deliver a reasonable assurance to regulators that this client was legit, as part of the enhanced due diligence process.\n\n\n\nTo approach this level of reasonability, the entire EDD process must be documented carefully and, from the client, the team will surely require:\n\n\n\n\nVerify Multiple Identification Documents: Ensure all necessary identification documents are thoroughly verified, which may require in-person submission.\n\n\n\nIdentify the Ultimate Beneficial Owner: Determine the true owner behind a business, especially in cases involving complex or opaque corporate structures.\n\n\n\nConduct a Comprehensive Asset Audit: Perform a detailed audit of the beneficial owner’s assets, comparing their reported assets and cash flow with actual figures to spot any suspicious inconsistencies.\n\n\n\nImplement Ongoing Account Monitoring: Develop a plan for continuous monitoring of the client’s accounts to ensure ongoing compliance with regulations.\n\n\n\n\n\n\n\n\nEnhanced Due Diligence Vs Customer Due Diligence\n\n\n\nEDD is an extension of Customer Due Diligence (CDD), which itself is the foundation of the&nbsp;Know Your Customer&nbsp;(KYC) mandates. Where the principles of CDD are applied to every customer, EDD is a step of CDD that is reserved for specific cases with a higher potential to be dangerous or damaging.\n\n\n\nIn cases where the likelihood of terrorist funding or money laundering is apparently low, as in cases of low-value accounts, SDD (Simplified Due Diligence) can be applied, which asks for less identifying information than CDD or EDD.\n\n\n\nEnhanced Due Diligence in AML\n\n\n\nUnder CDD regulations, firms must retain records of all collected information, such as identification documents and business records, for a minimum of five years. These records should be easily accessible to respond to regulatory requests and to allow authorities to trace individual transactions, including specific details like transaction amounts and currency types.\n\n\n\nWhen CDD measures indicate possible criminal activity, firms are obligated to promptly file a suspicious activity report (SAR) with their jurisdiction's financial intelligence unit (FIU). Although regulatory requirements vary, it's crucial for firms to stay informed about the specific rules in their operational areas.\n\n\n\n\n Make Compliance Easy With an AML Platform\n Keep your business and your revenue safe with anti-fraud and global AML screening, continuous monitoring, and rule-setting capabilities – together in one platform.\n\n Client Screening Software"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/what-is-enhanced-due-diligence/","url":"https://seon.io/resources/what-is-enhanced-due-diligence/","name":"What Is Enhanced Due Diligence (EDD)? - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/what-is-enhanced-due-diligence/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2024-08-04T12:03:00+00:00","dateModified":"2025-11-18T16:25:29+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/what-is-enhanced-due-diligence/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/insights-from-why-traditional-fraud-prevention-measures-arent-enough/","url":"https://seon.io/resources/why-traditional-fraud-prevention-measures-are-not-enough/","name":"Insights from “Why Traditional Fraud Prevention Measures Aren’t Enough” - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/why-traditional-fraud-prevention-measures-are-not-enough/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","datePublished":"2024-08-27T10:42:08+00:00","dateModified":"2025-11-18T16:24:29+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/payment-screening-process/#article","isPartOf":{"@id":"https://seon.io/resources/payment-screening-process/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Payment Screening: What Is It, How It Works and Its Importance","datePublished":"2024-09-23T11:31:04+00:00","dateModified":"2025-12-29T15:50:55+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/payment-screening-process/"},"wordCount":1680,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/payment-screening-process/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","inLanguage":"en-US","description":"Discover how payment screening works, why it’s vital for AML compliance, and how modern tools help block high-risk transactions in real time."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/payment-screening-process/","url":"https://seon.io/resources/payment-screening-process/","name":"Payment Screening: What It Is & Why It Matters","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/payment-screening-process/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","datePublished":"2024-09-23T11:31:04+00:00","dateModified":"2025-12-29T15:50:55+00:00","description":"Discover how payment screening works, why it’s vital for AML compliance, and how modern tools help block high-risk transactions in real time.","mainEntity":[{"@id":"https://seon.io/resources/payment-screening-process/#faq-question-1758710295754"},{"@id":"https://seon.io/resources/payment-screening-process/#faq-question-1758710307556"},{"@id":"https://seon.io/resources/payment-screening-process/#faq-question-1758710318446"},{"@id":"https://seon.io/resources/payment-screening-process/#faq-question-1766053419777"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/payment-screening-process/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/payment-screening-process/#faq-question-1758710295754","position":1,"url":"https://seon.io/resources/payment-screening-process/#faq-question-1758710295754","name":"What is the purpose of payment screening?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Payment screening ensures that transactions do not involve sanctioned individuals, high-risk entities or prohibited jurisdictions. By systematically checking payments against global sanctions lists and watchlists, businesses can comply with AML and CFT regulations, avoid regulatory fines and protect their reputations.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/payment-screening-process/#faq-question-1758710307556","position":2,"url":"https://seon.io/resources/payment-screening-process/#faq-question-1758710307556","name":"What is the difference between payment screening and transaction monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Payment screening analyzes real-time transactions at the point of processing to block prohibited or high-risk payments. Transaction monitoring, on the other hand, evaluates broader customer behavior by reviewing both real-time and historical activity to identify suspicious patterns over time. Together, they form a multi-layered defense against money laundering and fraud.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/payment-screening-process/#faq-question-1758710318446","position":3,"url":"https://seon.io/resources/payment-screening-process/#faq-question-1758710318446","name":"What is a red flag in payment screening?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A red flag in payment screening indicates that a transaction may be linked to illicit activity or a prohibited party. For example, if a sender or recipient’s name matches an entry on a sanctions list, the payment will be flagged for review. Other red flags may include unusual transaction amounts, payments involving high-risk jurisdictions or inconsistencies in customer details.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/payment-screening-process/#faq-question-1766053419777","position":4,"url":"https://seon.io/resources/payment-screening-process/#faq-question-1766053419777","name":"What are the best tools for real-time payment screening?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The best real-time payment screening tools can check transactions in milliseconds against sanctions lists and high-risk databases without slowing payments. SEON stands out with real-time sanctions, bank identifier and crypto wallet checks, plus customizable rules in one workflow.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/top-themes-from-sbc-summit-lisbon-2024/#article","isPartOf":{"@id":"https://seon.io/resources/top-themes-from-sbc-summit-lisbon-2024/"},"author":{"name":"Matt DeLauro","@id":"https://seon.io/#/schema/person/fbe3e4c532f2eadc9b7aa3d133c682a1"},"headline":"Top Themes from SBC Summit Lisbon 2024","datePublished":"2024-10-11T11:27:18+00:00","dateModified":"2025-11-18T16:22:54+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/top-themes-from-sbc-summit-lisbon-2024/"},"wordCount":591,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/top-themes-from-sbc-summit-lisbon-2024/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/10/Top-Themes-from-SBC-Summit-Lisbon-2024.png","articleSection":["Event Insights"],"inLanguage":"en-US","description":"The SBC Summit Lisbon 2024 emerged as a key gathering for the gambling and sports betting industry, showcasing emerging trends, regulatory developments and innovative solutions to the most pressing challenges operators face today. The three-day summit attracted a diverse mix of industry leaders, innovators and operators, converging to explore solutions to combat fraud, streamline identity verification and navigate today’s evolving regulatory landscapes.\n\n\n\nHere are the top themes and takeaways from the event:\n\n\n\n1. The Proliferation of Identity Verification Vendors\n\n\n\nOne consistent theme throughout the conference was the increasing number of vendors promising solutions to identity verification (IDV) challenges. Many operators openly shared concerns about new entrants’ overpromising, which has led to disappointment and, in turn, eroded trust within the industry. Attendees underscored the need for more transparent vendor claims and substantial proof points to restore their confidence in this arena.\n\n\n\n2. Balancing Fraud Prevention with Responsible Gaming Regulations\n\n\n\nModern operators face the challenge of balancing fraud protection with the need to comply with constantly changing regulatory requirements. This year’s conference highlighted the importance of responsible gaming and age verification, as operators must ensure that only eligible users can access their platforms. The difficulty lies in preserving user trust and platform security without creating too much friction, especially in unregulated or emerging markets.\n\n\n\n3. Regulatory Shifts: Centralization and Evolving Standards\n\n\n\nOne of the most critical discussions at SBC Lisbon centered on the changing regulatory environment. Many previously unregulated markets are moving toward centralized regulatory frameworks, which has implications for licensing, KYC (Know Your Customer) providers and operators. As these markets adopt more stringent regulations, operators must adjust how they verify user locations, identities and documentation, making it clear that adaptability will be critical to staying compliant and competitive.\n\n\n\n4. Challenges in Developing Markets: Bonus Abuse and Multi-Accounting\n\n\n\nBonus abuse and multi-accounting remain top concerns for gambling and sports betting operators. During booth conversations, several operators pointed out that traditional KYC measures introduce too much friction, especially in regions where regulation is minimal or non-existent. As a result, operators in these markets often rely on phone numbers for registrations, which creates vulnerabilities due to the ease with which users can generate new “virtual identities” by purchasing additional SIM cards. This allows for repeat abuse, and leading operators must develop more robust strategies to identify and prevent fraud in these markets.\n\n\n\n5. AI for Fraud Detection and Player Protection\n\n\n\nWith AI’s rapid expansion, many operators are leveraging this technology to monitor customer behavior, identify unusual patterns and flag potential fraud cases. However, one key takeaway from the panel was the emphasis on data quality – without high-quality data, even the most advanced AI systems will fail to deliver meaningful results. Operators must ensure that their data streams are both accurate and robust to maximize the impact of AI-driven fraud detection solutions.\n\n\n\nConversations to Shape the Future\n\n\n\nThis year’s summit reminded us of the intersection between sports, technology and industry evolution, all factors driving the future of gambling and sports betting. The event underscored the importance of innovation and resilience in this quickly changing sector, featuring insights from diverse thought leaders like Tony Hawk, Sir Tim Berners-Lee, Peter Schmeichel and Luís Figo. \n\n\n\nAs the industry expands, stakeholders face the ongoing challenge of balancing fraud prevention, user experience and regulatory compliance. Success will hinge on embracing cutting-edge technologies, prioritizing data quality and cultivating robust partnerships.&nbsp;To continue the conversation from SBC Global, please reach out and see why the largest names in iGaming turn to SEON: https://seon.io/industries/igaming/"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/top-themes-from-sbc-summit-lisbon-2024/","url":"https://seon.io/resources/top-themes-from-sbc-summit-lisbon-2024/","name":"Top Themes from SBC Summit Lisbon 2024 - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/top-themes-from-sbc-summit-lisbon-2024/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/10/Top-Themes-from-SBC-Summit-Lisbon-2024.png","datePublished":"2024-10-11T11:27:18+00:00","dateModified":"2025-11-18T16:22:54+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/top-themes-from-sbc-summit-lisbon-2024/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/10/Top-Themes-from-SBC-Summit-Lisbon-2024.png","contentUrl":"https://seon.io/wp-content/uploads/2024/10/Top-Themes-from-SBC-Summit-Lisbon-2024.png","width":832,"height":456}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/fbe3e4c532f2eadc9b7aa3d133c682a1","name":"Matt DeLauro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U04S5Q9041F-7fcc7dfe8870-512-96x96.jpeg","url":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U04S5Q9041F-7fcc7dfe8870-512-96x96.jpeg","contentUrl":"https://seon.io/wp-content/uploads/2025/04/cropped-T0ETE1T7W-U04S5Q9041F-7fcc7dfe8870-512-96x96.jpeg","caption":"Matt DeLauro"},"description":"Matt DeLauro is President, GTM at SEON, leading growth and go-to-market efforts across the U.S. and globally. He joined in 2024 with 20+ years of experience scaling tech and fintech firms. Known for building high-performing teams, he drives customer acquisition, partnerships, and sales-marketing alignment. His leadership is rooted in data-driven strategy and execution. Prior to SEON, he held senior roles at top tech companies, consistently delivering revenue growth and market expansion.","sameAs":["https://www.linkedin.com/in/matt-delauro-871a9b9/"],"jobTitle":"President, GTM","url":"https://seon.io/resources/author/mattdelauro/"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/the-must-know-highlights-from-acams-the-assembly-las-vegas-2024/#article","isPartOf":{"@id":"https://seon.io/resources/the-must-know-highlights-from-acams-the-assembly-las-vegas-2024/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"The Must-Know Highlights from ACAMS: The Assembly Las Vegas 2024","datePublished":"2024-10-16T11:59:49+00:00","dateModified":"2025-11-18T16:21:47+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/the-must-know-highlights-from-acams-the-assembly-las-vegas-2024/"},"wordCount":797,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/the-must-know-highlights-from-acams-the-assembly-las-vegas-2024/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/10/The-Must-Know-Highlights-from-ACAMS-The-Assembly-Las-Vegas-2024.png","articleSection":["Event Insights"],"inLanguage":"en-US","description":"As the compliance landscape evolves at a breakneck speed, maintaining balance amid regulatory shifts, technological advancements and increasingly sophisticated criminal tactics has never been more important. The Association of Certified Anti-Money Laundering Specialists (ACAMS)’s 2024 conference, The Assembly Las Vegas, provided a much-needed forum for financial crime professionals to discuss today’s challenges and opportunities, sharing insights into the future of anti-financial crime (AFC) and anti-money laundering (AML) strategies.The in-person discussions showed the future’s roadmap, from harnessing the potential of generative AI (GenAI) to addressing inefficiencies in case management and transaction monitoring. Key themes that emerged included:\n\n\n\nGenAI in Financial Crime Prevention\n\n\n\nOne of the most talked-about topics this year was GenAI, particularly its application in AFC. While there is apparent excitement surrounding its potential, there is also caution. Industry experts like Meera Das, VP of AML and Compliance Technology at Capital One, pointed out widespread adoption will take time. With this in mind, the prevailing message is to engage with and explore the potential of establishing or enhancing a dedicated Center of Excellence for GenAI strategic planning within every organization. It will be crucial that AFC leadership is integrally involved, ensuring they have a meaningful presence at the decision-making table.Other conversations centered on the need for rigorous quality assurance, centralized governance and the challenges inherent in explaining complex AI models to regulators. Additionally, discussions occurred around data privacy – specifically instances where personally identifiable information (PII) might be captured by large language models (LLMs). Compliance professionals further emphasized the importance of attracting and retaining staff with AI and regulatory expertise to navigate these issues. They encouraged staff training on the topics, highlighting how to promote and receive the best out of capabilities.&nbsp;\n\n\n\nCase Management Improvements\n\n\n\nAnother recurring pain point discussed throughout the conference was inefficiencies in handling large volumes of alerts and cases. Financial institutions continue to struggle with aging alerts, manual processes and a pervasive lack of transparency across fraud and AML workflows, resulting in increasing pressure not to miss deadlines for regulatory reporting. With regulatory reporting hampered by siloed data and disconnected workflows, institutions are calling for better tools to track and collaborate on cases, as well as real-time metrics on alert aging.\n\n\n\nTransaction Monitoring Enhancements\n\n\n\nWith the rise of real-time payments and faster money movement, financial institutions grapple with complex transaction monitoring challenges, especially across international borders. Conference conversations highlighted the need for enhanced entity-level analysis to track high-risk behaviors more effectively. In the US, faster payments are still relatively new for compliance teams, presenting ongoing challenges for monitoring and screening payments in real time, especially across counterparties and sanction lists.&nbsp;\n\n\n\n\n\n\n\n\n\nSanction Screening Innovations\n\n\n\nSanction screening continues to be difficult, especially when identifying indirect relationships between sanctioned individuals and their financial networks. The complexity of ownership structures, combined with the dynamic nature of sanction lists, is yielding gaps in detection.\n\n\n\n\n\n\n\n\n\nThe conference highlighted opportunities to use advanced analytics – including entity resolution and graph-based tools – to uncover hidden connections within corporate hierarchies. There was also a focus on improving name-matching algorithms to reduce false positives while maintaining accuracy.\n\n\n\nEvolving KYC and Perpetual Monitoring\n\n\n\nTraditional KYC processes were critiqued for needing to be faster and more consistent, with institutions moving toward perpetual KYC models. Rather than conducting checks only at onboarding or at periodic intervals, perpetual KYC ensures that customer profiles are continuously updated based on real-time data and evolving risk indicators.\n\n\n\n\n\n\n\n\n\nAs enhanced due diligence (EDD) becomes more complex as regulators scrutinize beneficial ownership structures, conference discussions emphasized the importance of keeping up with global regulatory changes and incorporating tools that allow institutions to track complex corporate hierarchies easily.\n\n\n\nAutomating Regulatory Filings\n\n\n\nAs regulatory filings grow, institutions seek ways to streamline the process. Conference-goers emphasized AI’s role in automating data gathering and improving the timeliness of creating narratives for humans to validate and enhance to ensure the quality of reporting meets regulatory compliance standards. With regulators pushing for reporting filings to more detailed and actionable with consistent information, automating some of these tasks will reduce the burden on compliance teams and improve the accuracy and quality of the reports being filed.\n\n\n\n\n\n\n\n\n\nCollaboration and Innovation Ahead\n\n\n\nThe insights gathered at The Assembly paint a clear picture: institutions must continue enhancing their technological capabilities while maintaining regulatory compliance. The path forward will involve leveraging AI for automation, improving real-time transaction monitoring and adopting perpetual KYC models for specific use cases. As regulatory frameworks tighten and financial crime becomes increasingly sophisticated, collaboration and innovation will ensure compliance teams are equipped to meet the future’s challenges.\n\n\n\nOur guide, “Aligning Forces: The Interplay of Fraud &amp; Money Laundering in AFC Compliance,” provides essential insights and strategies to combat these challenges. Continue reading here&gt;"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/the-must-know-highlights-from-acams-the-assembly-las-vegas-2024/","url":"https://seon.io/resources/the-must-know-highlights-from-acams-the-assembly-las-vegas-2024/","name":"The Must-Know Highlights from ACAMS: The Assembly Las Vegas 2024 - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/the-must-know-highlights-from-acams-the-assembly-las-vegas-2024/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/10/The-Must-Know-Highlights-from-ACAMS-The-Assembly-Las-Vegas-2024.png","datePublished":"2024-10-16T11:59:49+00:00","dateModified":"2025-11-18T16:21:47+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/the-must-know-highlights-from-acams-the-assembly-las-vegas-2024/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/10/The-Must-Know-Highlights-from-ACAMS-The-Assembly-Las-Vegas-2024.png","contentUrl":"https://seon.io/wp-content/uploads/2024/10/The-Must-Know-Highlights-from-ACAMS-The-Assembly-Las-Vegas-2024.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/sbc-summit-latam/#article","isPartOf":{"@id":"https://seon.io/resources/sbc-summit-latam/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"The Talk of SBC Summit Latinoamérica: Brazil’s High-Stakes Gambling Regulatory Landscape","datePublished":"2024-11-06T09:28:14+00:00","dateModified":"2025-07-15T15:34:20+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/sbc-summit-latam/"},"wordCount":564,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/sbc-summit-latam/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/10/The-Talk-of-SBC-Summit-Latinoamerica_-Brazils-High-Stakes-Gambling-Regulatory-Landscape.png","articleSection":["Event Insights"],"inLanguage":"en-US","description":"SBC’s Summit Latinoamérica brought together industry leaders, regulators and technology providers to discuss pressing issues and emerging opportunities in Latin America’s igaming and gambling industry. Unsurprisingly, Brazil took center stage as the country prepares to roll out its new gambling regulations in January 2025, a move that is anticipated to inspire similar systems across other countries.\n\n\n\nHere are the key insights and discussions from the event, highlighting Brazil’s regulatory landscape, compliance challenges and the urgent need for fraud prevention as companies gear up for Brazil’s new licensing requirements.\n\n\n\n1. Brazil’s Gambling Market Frenzy\n\n\n\nThe conference was abuzz with discussions about Brazil’s transformative move to implement a locally regulated gambling license, replacing foreign licensing systems. This change introduces compliance requirements that include hefty licensing fees and taxes but promises significant revenue for Brazil, estimated to boost the economy by $3 billion.\n\n\n\nAs Brazil’s January 1 deadline nears, many operators urgently seek partners to help them navigate Brazil’s regulations. The competitive atmosphere has led to a “gold rush” dynamic, where companies are vying to position themselves within Brazil’s newly regulated market.\n\n\n\n2. Rising Fraud Threats and Prevention Strategies\n\n\n\nWith Brazil’s high fraud rates, the conference highlighted the critical need for advanced fraud prevention measures. Operators discussed how regulations would enforce strict anti-fraud requirements, including enhanced geolocation, AML (Anti-Money Laundering) and KYC (Know Your Customer) protocols. However, many are concerned about controlling high-risk behaviors without adequate technology and regulatory support.\n\n\n\nSeveral common fraud types discussed included bonus abuse and multi-accounting, as operators brace for potentially increased fraud risks. With higher stakes, many platforms want to implement robust fraud prevention strategies to keep users secure and engaged while protecting themselves from massive fraud losses.\n\n\n\n3. Technology as the Compliance Catalyst\n\n\n\nCompliance is more than meeting checklists; it requires technology-driven solutions that streamline KYC processes, detect suspicious activity and ensure regulatory standards are met. Advanced geolocation capabilities, for example, are critical for ensuring users are within approved jurisdictions.\n\n\n\nThese solutions utilize real-time data processing to adapt to new regulations dynamically, making compliance an integrated part of business operations rather than an afterthought. Additionally, machine learning models can analyze patterns of behavior to identify potential non-compliance before it becomes a regulatory issue, offering proactive rather than reactive protection.\n\n\n\n4. Future Prospects and Industry Readiness\n\n\n\nBrazil’s evolving regulatory landscape is expected to inspire similar models across other Latin American countries as they anxiously watch Brazil’s strategy to capture revenue, regulate gambling and foster a safe digital gaming environment.As the industry matures, operators who equip themselves with sophisticated compliance and fraud prevention technologies will be best positioned to thrive. Operators adhering to Brazil’s regulatory requirements – and those anticipating similar frameworks in other countries – have ample opportunity to build a competitive advantage by staying compliant, enhancing transparency, and fostering a resilient gaming ecosystem that attracts loyal players and partners.\n\n\n\nCompliance to Fuel Success\n\n\n\nThe SBC Summit Latinoamérica underscored Brazil’s influence in shaping Latin America’s gambling industry. With high regulatory standards and increasing fraud risks, companies looking to operate in Brazil must prioritize compliance and fraud prevention as they prepare for the new licensing landscape. As Brazil’s gambling “gold rush” continues, only the operators with solid partnerships and technology solutions will be able to capitalize on this promising market."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/sbc-summit-latam/","url":"https://seon.io/resources/sbc-summit-latam/","name":"Brazil’s High-Stakes Gambling Regulatory Landscape | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/sbc-summit-latam/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/10/The-Talk-of-SBC-Summit-Latinoamerica_-Brazils-High-Stakes-Gambling-Regulatory-Landscape.png","datePublished":"2024-11-06T09:28:14+00:00","dateModified":"2025-07-15T15:34:20+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/sbc-summit-latam/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/10/The-Talk-of-SBC-Summit-Latinoamerica_-Brazils-High-Stakes-Gambling-Regulatory-Landscape.png","contentUrl":"https://seon.io/wp-content/uploads/2024/10/The-Talk-of-SBC-Summit-Latinoamerica_-Brazils-High-Stakes-Gambling-Regulatory-Landscape.png","width":833,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/advanced-aml-transaction-monitoring-rules/#article","isPartOf":{"@id":"https://seon.io/resources/advanced-aml-transaction-monitoring-rules/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"Advanced AML Transaction Monitoring Rules for Fraud &amp; Compliance Teams","datePublished":"2024-11-20T09:07:16+00:00","dateModified":"2025-11-18T16:20:49+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/advanced-aml-transaction-monitoring-rules/"},"wordCount":1746,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/advanced-aml-transaction-monitoring-rules/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/11/Advanced-AML-Transaction-Monitoring-Rules-for-Fraud-Compliance-Teams-thumbnail.png","inLanguage":"en-US","description":"Read how SEON’s advanced AML transaction monitoring cuts false positives, detects threats, and ensures compliance with real-time, customizable rules."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/advanced-aml-transaction-monitoring-rules/","url":"https://seon.io/resources/advanced-aml-transaction-monitoring-rules/","name":"AML Transaction Monitoring Rules for Fraud & Compliance Teams","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/advanced-aml-transaction-monitoring-rules/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/11/Advanced-AML-Transaction-Monitoring-Rules-for-Fraud-Compliance-Teams-thumbnail.png","datePublished":"2024-11-20T09:07:16+00:00","dateModified":"2025-11-18T16:20:49+00:00","description":"Detect risks and reduce false positives with SEON’s real-time AML transaction monitoring powered by flexible rules and machine learning.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/advanced-aml-transaction-monitoring-rules/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/11/Advanced-AML-Transaction-Monitoring-Rules-for-Fraud-Compliance-Teams-thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2024/11/Advanced-AML-Transaction-Monitoring-Rules-for-Fraud-Compliance-Teams-thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-investigations-made-smarter-with-fraud-insights/#article","isPartOf":{"@id":"https://seon.io/resources/aml-investigations-made-smarter-with-fraud-insights/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"Integrating Fraud Insights into AML Investigations: Compliance Strategies","datePublished":"2024-11-21T11:43:14+00:00","dateModified":"2025-07-15T15:34:59+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-investigations-made-smarter-with-fraud-insights/"},"wordCount":1513,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-investigations-made-smarter-with-fraud-insights/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Integrating fraud insights into AML workflows streamlines compliance, reduces costs, and improves risk monitoring."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/aml-investigations-made-smarter-with-fraud-insights/","url":"https://seon.io/resources/aml-investigations-made-smarter-with-fraud-insights/","name":"AML Investigations Made Smarter with Fraud Insights | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-investigations-made-smarter-with-fraud-insights/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","datePublished":"2024-11-21T11:43:14+00:00","dateModified":"2025-07-15T15:34:59+00:00","description":"Boost AML investigations with fraud insights for smarter risk detection, collaboration, and compliance for better financial crime prevention.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-investigations-made-smarter-with-fraud-insights/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/holiday-fraud-trends-and-prevention-strategies/#article","isPartOf":{"@id":"https://seon.io/resources/holiday-fraud-trends-and-prevention-strategies/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"A Look at Holiday Fraud Trends: Examining Volume, Types and Prevention Strategies","datePublished":"2024-11-22T11:04:01+00:00","dateModified":"2025-07-15T15:35:45+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/holiday-fraud-trends-and-prevention-strategies/"},"wordCount":624,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/holiday-fraud-trends-and-prevention-strategies/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"In the lead-up to the fast-approaching and busy holiday season, we’ve been carefully analyzing customer data, as we do each year, to help businesses better prepare for the coming onslaught of fraud. Driven by heightened consumer activity, fraudsters continued to capitalize on the surge in online transactions, leveraging sophisticated tactics to exploit vulnerabilities in high-traffic sectors like ecommerce, iGaming and fintech.\n\n\n\nBy studying the trends and spikes in fraud volume, specifically from November and December, we can identify patterns, uncover emerging risks and arm businesses with actionable strategies to mitigate these threats effectively. Understanding how fraud evolved last holiday season provides critical insights to help companies stay ahead as they prepare for the year’s most challenging and lucrative period.\n\n\n\nA Rise in Fraud Volume &amp; Sophistication\n\n\n\nFraudulent activity surged across industries in the last quarter of 2023. Over 8.92 million fraudulent transactions were flagged and blocked by SEON, with iGaming (3.89 million) and Buy Now Pay Later (1.75 million) sectors leading the way. The average fraud percentage peaked at 12.27% on December 18, underscoring the need for heightened vigilance during this period.\n\n\n\n\n\n\n\nKey Drivers of Increased Fraud:\n\n\n\n\nHoliday Traffic Surge: The holiday season brought a spike in online transactions, giving fraudsters more opportunities to exploit vulnerabilities.\n\n\n\nAdvanced Fraud Techniques: Privacy tools such as VPNs and proxy servers rose, with VPN usage peaking at 5.02% on December 18, marking a 50% increase over the season’s average.\n\n\n\nAutomation and Bots: Bot-driven fraud increased steadily, from 0.11% in early November to a holiday season high of 0.49% in December, targeting high-transaction sectors like ecommerce and financial services.\n\n\n\n\nFraud Peaks by Industry &amp; Activity\n\n\n\nFraudsters were not uniform in their tactics, with industries and activity types presenting unique vulnerabilities:\n\n\n\n\nIndustry Breakdown: The iGaming and Payment Gateway sectors consistently reported high fraud activity, with iGaming topping 14% on multiple occasions.\n\n\n\nType of Activity: Fraud in account creation, transactions, and subscription services rose sharply, with subscription fraud increasing in December.\n\n\n\n\nKey Holiday Fraud Trends\n\n\n\nSpecific days and weeks during the holiday season saw significant spikes in fraudulent activity. Perhaps surprisingly, December 25 stood out with the highest overall fraudulent activity, aligning with heightened consumer activity and the reduced vigilance typical of the holiday itself. Additionally, the week of December 18–24 marked the sharpest rise in fraud across most industries, underscoring the importance of heightened fraud prevention efforts during this critical period.\n\n\n\nThe Role of Privacy Tools\n\n\n\nPrivacy tools like suspicious browsers and VPNs played a significant role in enabling fraud during the holiday season. Privacy browser usage averaged 1.78% throughout the season but spiked noticeably on crucial holiday shopping days, illustrating how fraudsters strategically use these tools to exploit peak transaction periods.\n\n\n\nPreparing for 2025: Lessons from the Holiday Season\n\n\n\nThe fraud trends from last year’s holiday season highlight how crucial it is to take a proactive, data-driven approach to fraud prevention. As businesses gear up for 2025, here are some key lessons to keep in mind:\n\n\n\n\nBe Ready for Seasonal Spikes: Fraud tends to rise along with consumer activity, so planning for the holiday rush is imperative.\n\n\n\nEmbrace Automation: With bots becoming more prevalent, automated fraud detection isn’t just nice to have – it’s essential.\n\n\n\nKeep an Eye on Privacy Tools: Monitoring VPNs, proxies and suspicious browsers can help uncover vulnerabilities before they become more significant problems.\n\n\n\n\nBy acting on these insights, businesses can stay ahead of fraudsters and protect their operations during high-risk periods.\n\n\n\nThe insights and statistics shared in this article are derived from SEON's internal data and reflect activity trends observed across our customer base during the 2023 holiday season. These findings are anonymized and aggregated to protect customer confidentiality and should be viewed as indicative of broader fraud trends rather than exhaustive or industry-wide data."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/holiday-fraud-trends-and-prevention-strategies/","url":"https://seon.io/resources/holiday-fraud-trends-and-prevention-strategies/","name":"Holiday Fraud Insights & Strategies [2024-2025] | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/holiday-fraud-trends-and-prevention-strategies/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","datePublished":"2024-11-22T11:04:01+00:00","dateModified":"2025-07-15T15:35:45+00:00","description":"Tackle holiday fraud with key insights and strategies to protect ecommerce, iGaming, and fintech. Safeguard your business this year!","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/holiday-fraud-trends-and-prevention-strategies/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-ongoing-battle-against-digital-deception/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-ongoing-battle-against-digital-deception/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Fraud is Not a Single Moment in Time: The Ongoing Battle Against Digital Deception","datePublished":"2024-12-13T15:52:22+00:00","dateModified":"2025-12-12T10:59:38+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-ongoing-battle-against-digital-deception/"},"wordCount":1177,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-ongoing-battle-against-digital-deception/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","inLanguage":"en-US","description":"Combat fraud with proactive strategies like continuous monitoring, machine learning, and smarter detection methods."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fraud-ongoing-battle-against-digital-deception/","url":"https://seon.io/resources/fraud-ongoing-battle-against-digital-deception/","name":"The Evolving Battle Against Fraud: Strategies & Solutions | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-ongoing-battle-against-digital-deception/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2024-12-13T15:52:22+00:00","dateModified":"2025-12-12T10:59:38+00:00","description":"Combat fraud with proactive strategies like continuous monitoring, machine learning, and smarter detection methods. Stay ahead with layered defenses.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-ongoing-battle-against-digital-deception/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/retail-fraud-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/retail-fraud-prevention/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Retail Fraud Prevention 101: Your Guide to Staying Ahead of Fraudsters","datePublished":"2025-01-28T16:00:28+00:00","dateModified":"2025-07-15T15:38:34+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/retail-fraud-prevention/"},"wordCount":1283,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/retail-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/01/Retail-Fraud-Prevention-101_-Your-Guide-to-Staying-Ahead-of-Fraudsters-thumbnail.png","inLanguage":"en-US","description":"Discover retail fraud prevention tips using AI and monitoring to protect against payment fraud and identity theft."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/retail-fraud-prevention/","url":"https://seon.io/resources/retail-fraud-prevention/","name":"Retail Fraud Prevention Guide [2025] | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/retail-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/01/Retail-Fraud-Prevention-101_-Your-Guide-to-Staying-Ahead-of-Fraudsters-thumbnail.png","datePublished":"2025-01-28T16:00:28+00:00","dateModified":"2025-07-15T15:38:34+00:00","description":"Discover retail fraud prevention tips using AI and monitoring to protect against payment fraud and identity theft.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/retail-fraud-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/01/Retail-Fraud-Prevention-101_-Your-Guide-to-Staying-Ahead-of-Fraudsters-thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/01/Retail-Fraud-Prevention-101_-Your-Guide-to-Staying-Ahead-of-Fraudsters-thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/hot-takes-from-ice-barcelona-2025/#article","isPartOf":{"@id":"https://seon.io/resources/hot-takes-from-ice-barcelona-2025/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Hot Takes From ICE Barcelona 2025","datePublished":"2025-01-31T09:39:26+00:00","dateModified":"2025-11-18T16:19:58+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/hot-takes-from-ice-barcelona-2025/"},"wordCount":601,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/hot-takes-from-ice-barcelona-2025/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/01/Hot-Takes-From-ICE-Barcelona-2025_thumbnail.png","articleSection":["Event Insights"],"inLanguage":"en-US","description":"ICE Barcelona 2025 emphasized that fraud prevention relies on blending innovation with existing systems for secure, scalable growth in iGaming."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/hot-takes-from-ice-barcelona-2025/","url":"https://seon.io/resources/hot-takes-from-ice-barcelona-2025/","name":"Hot Takes From ICE Barcelona 2025 | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/hot-takes-from-ice-barcelona-2025/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/01/Hot-Takes-From-ICE-Barcelona-2025_thumbnail.png","datePublished":"2025-01-31T09:39:26+00:00","dateModified":"2025-11-18T16:19:58+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/hot-takes-from-ice-barcelona-2025/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/01/Hot-Takes-From-ICE-Barcelona-2025_thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/01/Hot-Takes-From-ICE-Barcelona-2025_thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/the-business-risks-of-ignoring-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/the-business-risks-of-ignoring-fraud/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"The Business Risks of Ignoring Fraud","datePublished":"2025-02-07T11:21:54+00:00","dateModified":"2026-01-28T20:45:25+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/the-business-risks-of-ignoring-fraud/"},"wordCount":1127,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/the-business-risks-of-ignoring-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/02/The-Business-Risks-of-Ignoring-Fraud-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"Ignoring fraud harms revenue, trust, and growth. Learn why prevention is key. Click for insights!"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/the-business-risks-of-ignoring-fraud/","url":"https://seon.io/resources/the-business-risks-of-ignoring-fraud/","name":"The Business Risks of Ignoring Fraud | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/the-business-risks-of-ignoring-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/02/The-Business-Risks-of-Ignoring-Fraud-Thumbnail.png","datePublished":"2025-02-07T11:21:54+00:00","dateModified":"2026-01-28T20:45:25+00:00","description":"Ignoring fraud risks your revenue, trust, and growth. Learn how proactive prevention protects your business.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/the-business-risks-of-ignoring-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/02/The-Business-Risks-of-Ignoring-Fraud-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/02/The-Business-Risks-of-Ignoring-Fraud-Thumbnail.png","width":833,"height":469}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/confronting-ecommerces-triple-threat-mrc-seons-webinar-highlights/#article","isPartOf":{"@id":"https://seon.io/resources/confronting-ecommerces-triple-threat-mrc-seons-webinar-highlights/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Confronting eCommerce’s Triple Threat: MRC &amp; SEON’s Webinar Highlights","datePublished":"2025-02-28T09:43:56+00:00","dateModified":"2026-01-28T20:43:48+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/confronting-ecommerces-triple-threat-mrc-seons-webinar-highlights/"},"wordCount":723,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/confronting-ecommerces-triple-threat-mrc-seons-webinar-highlights/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","articleSection":["Webinar Takeaways"],"inLanguage":"en-US","description":"Ecommerce fraud is rising. Learn expert strategies to combat friendly fraud, return fraud, and chargebacks with AI and data integration."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/confronting-ecommerces-triple-threat-mrc-seons-webinar-highlights/","url":"https://seon.io/resources/confronting-ecommerces-triple-threat-mrc-seons-webinar-highlights/","name":"Confronting eCommerce’s Triple Threat: MRC &amp; SEON’s Webinar Highlights - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/confronting-ecommerces-triple-threat-mrc-seons-webinar-highlights/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","datePublished":"2025-02-28T09:43:56+00:00","dateModified":"2026-01-28T20:43:48+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/confronting-ecommerces-triple-threat-mrc-seons-webinar-highlights/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/seon-2025-global-digital-fraud-report/#article","isPartOf":{"@id":"https://seon.io/resources/seon-2025-global-digital-fraud-report/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Introducing SEON&#8217;s Inaugural 2025 Global Digital Fraud Report","datePublished":"2025-03-05T09:00:00+00:00","dateModified":"2025-04-03T08:14:55+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/seon-2025-global-digital-fraud-report/"},"wordCount":447,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/seon-2025-global-digital-fraud-report/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Businesses worldwide are navigating a fraud landscape rife with increasingly complex challenges and extraordinary opportunities. At SEON, we understand the critical nature of anti-fraud innovation and are eager to share our inaugural 2025 Digital Fraud Outlook, a global fraud, risk and compliance report. Its publication comes at a crucial time, as businesses must adopt AI-driven solutions to stay ahead of increasingly complex digital fraud threats.\n\n\n\nOur extensive research across key industries – payments, financial services, fintech, iGaming and eCommerce – highlights a critical shift as businesses abandon outdated fraud detection to outpace evolving digital threats from nimble fraudsters and bad actors. The insights garnered from our report of 574 decision-makers underscore the urgency of evolving fraud prevention strategies to not only react to threats but anticipate and neutralize them before they can cause harm.\n\n\n\nThe 2025 Digital Fraud Outlook explores growing challenges, key trends and innovations, emphasizing the shift toward enhanced and proactive fraud management. With fraud prevention stakes higher than ever, the report reveals that businesses are significantly increasing their investments in real-time fraud detection capabilities, artificial intelligence (AI) and machine learning (ML) technologies. These investments reflect a broader industry trend toward automation and intelligence, aiming to outsmart fraudsters with more agile and predictive defense mechanisms. When deployed in tandem with expert human insight, the combination of AL, ML and real-time transaction monitoring is proving critical to enabling rapid responses and systems that adapt to new threats as they emerge.\n\n\n\nInvestment in technology is only part of the equation. Our findings also highlight the increasing importance of cross-departmental collaboration in combating fraud. IT and security teams remain at the forefront of this battle, but the involvement of product, marketing and customer service teams is instrumental in creating a comprehensive defense strategy. Such collaboration enhances the ability to identify and mitigate threats swiftly, turning fraud prevention into a company-wide priority.\n\n\n\nReal-time transaction monitoring has emerged as the top investment priority for the year, with a decisive shift away from outdated batch-processing methods. This move towards instantaneous data analysis and decision-making helps organizations minimize the window of opportunity for fraudsters to act, protecting revenues and enhancing customer trust.\n\n\n\nWe invite you to explore the 2025 Digital Fraud Outlook to understand how these developments can inform and transform your fraud prevention and risk mitigation strategies. Join us in navigating these complex challenges and seizing the opportunities they present as we collectively enhance our capabilities to fight fraud and build a world in which it is safer to conduct business online. \n\n\n\n\n\nA Global Fraud, Risk &amp; Compliance Trend Report\n\n\n\nExplore critical insights and learn what it takes to combat fraud in today's digital age.\n\n\n\n\nDownload Report Now"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/seon-2025-global-digital-fraud-report/","url":"https://seon.io/resources/seon-2025-global-digital-fraud-report/","name":"Introducing SEON's Inaugural 2025 Global Digital Fraud Report - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/seon-2025-global-digital-fraud-report/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","datePublished":"2025-03-05T09:00:00+00:00","dateModified":"2025-04-03T08:14:55+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/seon-2025-global-digital-fraud-report/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/key-takeaways-from-sbc-summit-rio-2025-navigating-brazils-new-gaming-landscape/#article","isPartOf":{"@id":"https://seon.io/resources/key-takeaways-from-sbc-summit-rio-2025-navigating-brazils-new-gaming-landscape/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Key Takeaways from SBC Summit Rio 2025: Navigating Brazil&#8217;s New Gaming Landscape","datePublished":"2025-03-13T10:37:14+00:00","dateModified":"2025-11-18T16:17:16+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/key-takeaways-from-sbc-summit-rio-2025-navigating-brazils-new-gaming-landscape/"},"wordCount":514,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/key-takeaways-from-sbc-summit-rio-2025-navigating-brazils-new-gaming-landscape/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","articleSection":["Event Insights"],"inLanguage":"en-US","description":"With Brazil's online betting market projected to reach $10 billion by 2029, operators are facing an urgent challenge: ensuring compliance and fraud prevention from day one. With the country's new regulatory framework now underway, operators must prioritize risk management. This year, SBC Summit Rio 2025 brought together industry leaders, government officials and technology providers to discuss the road ahead, focusing on the importance of proactive risk and fraud management, regulatory adaptation and responsible gaming practices.\n\n\n\nA Non-Negotiable Priority: Compliance\n\n\n\nAs of January 1, 2025, Brazil's online betting market is fully regulated, requiring all operators to adhere to strict compliance measures enforced by the Ministry of Finance. At the summit, officials unveiled the Betting Management System (SIGAP), developed by Serpro for the Secretariat of Prizes and Betting (SPA). This system aims to provide real-time monitoring of licensed operators, ensuring transparency and integrity across the sector.Government representatives stressed that compliance is a legal requirement and a foundation for long-term industry sustainability. With heavy fines and potential license revocations, operators must integrate robust Know Your Customer (KYC) and Anti-Money Laundering (AML) protocols to align with regulatory expectations.\n\n\n\nFraud Prevention is a Growing Concern in New Markets\n\n\n\nThe rapid expansion of online sports betting in Brazil has introduced new fraud risks, including bonus abuse, identity theft and account takeovers. Experts at the summit highlighted that aggressive advertising and an influx of new bettors have made platforms prime targets for fraudsters.\n\n\n\nOperators who fail to implement strong fraud detection measures from the start risk financial losses and regulatory penalties, as well as reputational damages. To mitigate these risks, operators should leverage AI-driven fraud detection systems, digital footprint analysis, device intelligence and behavioral analytics to identify suspicious activities before they escalate.\n\n\n\nThe Key to Success is Staying Agile \n\n\n\nBrazil's gaming regulations are still evolving, and operators must stay agile. The SPA's 2025 agenda includes:\n\n\n\n\nRegulation of fixed-odds betting suppliers\n\n\n\nCommercial promotions and advertising guidelines\n\n\n\nInstant lottery framework updates\n\n\n\n\nWith frequent regulatory reviews expected, industry players must invest in compliance automation and regulatory intelligence to adapt swiftly to new mandates.\n\n\n\nThe Future of Gambling is More Than Just Betting\n\n\n\nBeyond sports betting, Brazil's government is exploring legalizing casinos, bingos and integrated resorts, highlighting the sector's potential to boost tourism, job creation and economic growth. \"We start 2025 with strict and clear rules, as well as mechanisms to enforce them and operators to hold accountable. The imposition of these rules and their enforcement are the result of a huge effort by the Ministry of Finance, under the command of Minister Haddad and President Lula,\" said Regis Dudena, Secretary of Prizes and Gaming. While this remains a topic of debate, experts agree that a well-regulated expansion could transform Brazil into a central global gaming hub.\n\n\n\nThe SBC Summit Rio 2025 reinforced a clear message: compliance and fraud prevention are the foundation for sustainable success in Brazil's gaming market. As regulatory frameworks evolve, operators must stay informed, proactive and technologically equipped to navigate challenges and seize opportunities in this high-growth sector."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/key-takeaways-from-sbc-summit-rio-2025-navigating-brazils-new-gaming-landscape/","url":"https://seon.io/resources/key-takeaways-from-sbc-summit-rio-2025-navigating-brazils-new-gaming-landscape/","name":"Key Takeaways from SBC Summit Rio 2025: Navigating Brazil's New Gaming Landscape - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/key-takeaways-from-sbc-summit-rio-2025-navigating-brazils-new-gaming-landscape/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","datePublished":"2025-03-13T10:37:14+00:00","dateModified":"2025-11-18T16:17:16+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/key-takeaways-from-sbc-summit-rio-2025-navigating-brazils-new-gaming-landscape/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/behavioral-biometrics-fraud-prevention-and-authentication/#article","isPartOf":{"@id":"https://seon.io/resources/behavioral-biometrics-fraud-prevention-and-authentication/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"The New Role of Behavioral Biometrics in Fraud Prevention","datePublished":"2025-03-19T16:24:57+00:00","dateModified":"2025-11-14T14:35:56+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/behavioral-biometrics-fraud-prevention-and-authentication/"},"wordCount":1175,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/behavioral-biometrics-fraud-prevention-and-authentication/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/05/Filtering-Out-the-Fraudsters-Putting-Device-Intelligence-to-Work.png","inLanguage":"en-US","description":"Discover how behavioral biometrics enhances fraud prevention and authentication with real-time, AI-driven security."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/behavioral-biometrics-fraud-prevention-and-authentication/","url":"https://seon.io/resources/behavioral-biometrics-fraud-prevention-and-authentication/","name":"Behavioral Biometrics: Smarter Fraud Prevention & Authentication | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/behavioral-biometrics-fraud-prevention-and-authentication/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/05/Filtering-Out-the-Fraudsters-Putting-Device-Intelligence-to-Work.png","datePublished":"2025-03-19T16:24:57+00:00","dateModified":"2025-11-14T14:35:56+00:00","description":"Enhance security with AI-driven behavioral biometrics—reducing fraud, friction, and strengthening authentication in real-time.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/behavioral-biometrics-fraud-prevention-and-authentication/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/05/Filtering-Out-the-Fraudsters-Putting-Device-Intelligence-to-Work.png","contentUrl":"https://seon.io/wp-content/uploads/2024/05/Filtering-Out-the-Fraudsters-Putting-Device-Intelligence-to-Work.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/authorized-push-payment-app-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/authorized-push-payment-app-fraud/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"The Complete Guide to Authorized Push Payment (APP) Fraud","datePublished":"2025-04-01T09:16:46+00:00","dateModified":"2026-03-05T11:14:28+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/authorized-push-payment-app-fraud/"},"wordCount":1205,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/authorized-push-payment-app-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","inLanguage":"en-US","description":"As digital scams grow more sophisticated, APP fraud has surged, leading to significant financial losses for both businesses and consumers. In 2023, the UK saw a 12% year-on-year increase in APP fraud cases, with losses projected to reach $934.7 million by 2027.\n\n\n\nIn this article, we'll break down what APP fraud is, how to spot the warning signs, and what steps you can take to protect your organization and customers from falling victim to it.\n\n\n\nWhat Is Authorized Push Payment Fraud?\n\n\n\nAuthorized Push Payment (APP) fraud, commonly referred to as APP fraud, is a type of financial scam where victims are manipulated into authorizing payments to fraudsters. This form of fraud typically involves social engineering techniques, where scammers impersonate trusted entities or individuals to deceive the victim into making a payment under false pretenses.\n\n\n\n\n      Secure Your Business from APP Fraud\n      Learn how AI, ML, and digital footprinting can defend your transactions from APP fraud with actionable strategies\n \n        Learn More\n      \n    \n\n\n\nHow Does Authorized Push Payment Fraud Work?\n\n\n\nThis form of fraud exploits the instantaneous and irreversible nature of real-time payment systems, making it particularly challenging to detect and prevent. Criminals manipulate victims into willingly transferring money to the fraudster’s account, often through social engineering techniques. They thoroughly research their targets, establish trust and convince them to send money voluntarily. Common tactics include phishing, email spoofing and fraudulent phone calls pretending to be from legitimate entities such as banks or businesses, often creating a sense of urgency to convince victims to move funds as soon as possible.&nbsp;\n\n\n\nEssentially, APP fraud relies on tricking the victim into believing they are acting in their best interest. Ironically, the fraudster may claim to be protecting the victim from a fraud attempt, adding a layer of credibility. The fraudster provides new account details, supposedly for security, but in reality, these belong to the criminal. Once the victim transfers the money and the funds are in a “bank drop” account, the fraudster quickly moves it using techniques like smurfing, where funds are broken into smaller amounts to avoid detection by transaction monitoring systems.\n\n\n\nAuthorized Push Payment Fraud Examples\n\n\n\nAPP fraud always involves tricking the victim into transferring money to the fraudster's account. Here are a few ways it commonly unfolds:\n\n\n\nHome Renovation Scam\n\n\n\nFraudsters identify a homeowner undergoing renovations and the contractor managing the work. They send a fake invoice, appearing to be from the building firm but with the fraudster's bank details. By the time the homeowner realizes the scam, the fraudsters—and the money—are long gone.\n\n\n\nNew Bank Details Scam\n\n\n\nTargeting a business, fraudsters pose as a regular supplier and send an email or letter claiming their bank details have changed. The company updates their records, rerouting payments to the fraudster's account, often without realizing it for some time.\n\n\n\nProperty Purchase Fraud\n\n\n\nFraudsters intercept emails between a homebuyer and their solicitor, estate agent, or bank. At a crucial point in the transaction, they switch the bank details on a key document. When the buyer makes a payment, such as for a deposit, it goes to the fraudsters instead of the intended recipient.\n\n\n\nHow to Prevent and Combat Authorized Push Payment Fraud\n\n\n\nPreventing authorized push payment (APP) fraud requires a mix of communication, education, and smart financial safeguards. For businesses, clear messaging is key—many now include warnings in emails or during customer interactions, advising against sending money to unverified accounts. This proactive approach helps stop fraudsters before they exploit unsuspecting victims.\n\n\n\nFinancial institutions also play a central role. Some banks use cooling-off periods or enhanced due diligence to flag high-risk transactions. Tools like the UK’s Confirmation of Payee (CoP) verify that account details match the intended recipient. For payment platforms, integrating a payment fraud prevention solution adds another layer of protection, helping identify and stop suspicious transfers early.\n\n\n\nOngoing education is just as critical. Banks and fintech companies must regularly train staff and inform customers about social engineering tactics. When combined with advanced machine learning, real-time monitoring, and awareness campaigns, these efforts significantly reduce the risks of APP fraud and strengthen overall trust in digital payments.\n\n\n\nTechnology to Detect and Stop APP Fraud\n\n\n\nAPP fraud continues to rise — and financial institutions are strengthening their defenses. To stay ahead, many are investing in advanced tools for app fraud detection, helping them catch suspicious activity in real time, cut down on false positives and protect customers from falling victim to scams. Technologies to stop APP include:&nbsp;\n\n\n\nAI and Machine Learning: The Brains Behind Detection\nAI and machine learning (ML) technologies analyze vast amounts of transaction data to detect anomalies and patterns indicative of fraud. AI-driven systems can identify unusual events that may signal potential scams by profiling regular customer activity. These systems adapt to evolving fraud tactics, ensuring they remain effective against new threats.\nRead more\n\n\n\nWatching Transactions in Real-Time\nReal-time transaction monitoring continuously assesses incoming data, such as transaction values, geographic locations and user behaviors, against predefined rules. If suspicious activity is detected, alerts are triggered before funds are transferred, allowing institutions to intervene promptly. This approach helps reduce the risk of fraudulent transactions being completed.\nRead more\n\n\n\nFraud Prevention Tools Built for Today's Threats\nModern fraud prevention tools offer comprehensive solutions tailored to APP fraud. These systems detect document fraud and integrate identity profiling to uncover fraudulent actors. By enhancing operational efficiency, these tools ensure robust security measures are in place.\nRead more\n\n\n\nLayered Defenses That Build Trust\nThe integration of multi-layered security measures further strengthens app fraud detection strategies. Technologies that combine historical data analysis with customized business rules can flag suspicious transactions and prevent account takeovers. Additionally, features like account verification services help ensure that payments are directed to the intended recipient, reducing the risk of misdirected funds.\nRead more\n\n\n\nIn short, by embracing modern technology and staying alert to new threats, financial institutions can significantly improve their app fraud detection efforts and earn greater trust from their customers.\n\n\n\nFrequently Asked Questions\n\n\n\nHow do payment service providers fight authorized push payment (APP) fraud? APP fraud happens when fraudsters deceive victims into authorizing payments, making recovery difficult. PSPs combat this with real-time transaction monitoring to spot unusual patterns, AI-driven risk scoring to flag high-risk transfers and behavioral analytics to detect anomalies in user activity. Multi-factor authentication (MFA) adds an extra security layer, while user education and scam warnings help prevent deception. Collaboration with banks and regulators further enhances fraud detection and prevention efforts.  What measures are being introduced to help businesses prevent APP fraud? To help prevent APP fraud, two key changes are coming next year: a new industry code to guide safe practices and support reimbursement when businesses take proper precautions, and a Confirmation of Payee system that checks account names match before payments go through.  How can businesses reduce the risk of APP fraud? Businesses can lower the risk of APP fraud by training their teams to spot suspicious requests, using clear payment approval processes, and double-checking account details before sending money. Staying alert and having the right internal checks in place can make a big difference.  \n\n\n\nSources:\n\n\n\n\nInfosecurity Magazine: Authorized Push Payment Fraud Cases Surge 12% Annually\n\n\n\nACI Worldwide: Scamscope fraud report"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/authorized-push-payment-app-fraud/","url":"https://seon.io/resources/authorized-push-payment-app-fraud/","name":"What Is Authorized Push Payment Fraud & How to Stop It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/authorized-push-payment-app-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","datePublished":"2025-04-01T09:16:46+00:00","dateModified":"2026-03-05T11:14:28+00:00","description":"Authorized push payment fraud is on the rise—learn how it works and how to detect and prevent it as a business or consumer.","mainEntity":[{"@id":"https://seon.io/resources/authorized-push-payment-app-fraud/#faq-question-1743176397266"},{"@id":"https://seon.io/resources/authorized-push-payment-app-fraud/#faq-question-1743176409241"},{"@id":"https://seon.io/resources/authorized-push-payment-app-fraud/#faq-question-1743176618444"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/authorized-push-payment-app-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/authorized-push-payment-app-fraud/#faq-question-1743176397266","position":1,"url":"https://seon.io/resources/authorized-push-payment-app-fraud/#faq-question-1743176397266","name":"How do payment service providers fight authorized push payment (APP) fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"APP fraud happens when fraudsters deceive victims into authorizing payments, making recovery difficult. PSPs combat this with real-time transaction monitoring to spot unusual patterns, AI-driven risk scoring to flag high-risk transfers and <a href=\"https://seon.io/resources/dictionary/behavioral-analysis/\">behavioral analytics to detect anomalies</a> in user activity. Multi-factor authentication (MFA) adds an extra security layer, while user education and scam warnings help prevent deception. Collaboration with banks and regulators further enhances fraud detection and prevention efforts.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/authorized-push-payment-app-fraud/#faq-question-1743176409241","position":2,"url":"https://seon.io/resources/authorized-push-payment-app-fraud/#faq-question-1743176409241","name":"What measures are being introduced to help businesses prevent APP fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To help prevent APP fraud, two key changes are coming next year: a new industry code to guide safe practices and support reimbursement when businesses take proper precautions, and a <em>Confirmation of Payee</em> system that checks account names match before payments go through.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/authorized-push-payment-app-fraud/#faq-question-1743176618444","position":3,"url":"https://seon.io/resources/authorized-push-payment-app-fraud/#faq-question-1743176618444","name":"How can businesses reduce the risk of APP fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Businesses can lower the risk of APP fraud by training their teams to spot suspicious requests, using clear payment approval processes, and double-checking account details before sending money. Staying alert and having the right internal checks in place can make a big difference.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Behavioral Biometrics: What Is It &amp; How It Works Against Fraud","datePublished":"2025-04-03T10:11:57+00:00","dateModified":"2025-11-18T16:16:05+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/"},"wordCount":2056,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","inLanguage":"en-US","description":"As online activity accelerates across industries, such as banking, fintech and eCommerce, verifying the authenticity of each user in any given digital interaction has become a strategic imperative. Behavioral biometrics offers a powerful solution by continuously analyzing how individuals interact with devices — from keystrokes and mouse movement to tap pressure and navigation flow — to create a unique, real-time behavioral profile. This invisible layer of authentication is reshaping how businesses balance fraud prevention with seamless customer experiences.By leveraging machine learning (ML) and artificial intelligence (AI), behavioral biometrics detect anomalies that may signal fraud, even when traditional credentials like passwords or PINs are compromised. This advanced technology is set to grow aggressively, reaching over $4.9 billion in the next four years, to reshape fraud prevention strategies, enabling organizations to reduce false positives, enhance customer trust and stay ahead of increasingly sophisticated cyber threats – without adding friction.\n\n\n\nWhat is Behavioral Biometrics?\n\n\n\nBehavioral biometrics is a fraud prevention technology that identifies users based on how they interact with digital environments rather than what they know (passwords) or have (devices). Monitoring real-time behavioral patterns like how a person types, moves their mouse or swipes on a touchscreen builds a digital fingerprint that's extremely difficult to spoof.\n\n\n\nUnlike static methods, behavioral biometrics enables continuous authentication — validating user identity throughout a session rather than just at login. It's particularly effective at detecting anomalies in behavior that may signal account takeover attempts, bot activity or fraudulent intent, even when credentials appear valid.\n\n\n\nHow Does Behavioral Biometrics Work?\n\n\n\nBehavioral biometric systems passively collect data during user sessions and analyze the information using ML to spot unusual behavior patterns. These systems evaluate various human-device interactions to determine whether the behavior matches a known user profile or resembles a potential threat. The system doesn't focus on just one behavior but looks at a composite of small, distinctive signals to build a real-time risk assessment.\n\n\n\nHere are the key elements behavioral biometrics typically evaluates:\n\n\n\n\nTyping behavior – Measures cadence, speed and timing to flag unusual keystroke patterns\n\n\n\nMouse or cursor movement – Tracks how a user moves, clicks and navigates across a screen\n\n\n\nTouchscreen activity – Detects pressure, swipe gestures and interaction speed on mobile devices\n\n\n\nDevice handling – Analyzes movement and orientation using built-in sensors like accelerometers and gyroscopes\n\n\n\nInput methods – Identifies use of copy/paste or autofill that may suggest automation or credential stuffing\n\n\n\nEnvironmental cues – Considers contextual data like IP address, location and device type to strengthen risk scoring\n\n\n\n\nBy combining these data points, behavioral biometrics enables real-time fraud detection without interrupting the user journey — creating a more intelligent, adaptive approach to fraud prevention.\n\n\n\nWhy Is It Important? \n\n\n\nCybercriminals no longer need to guess passwords or hack devices — they can simply buy everything they need on the dark web. Personal data is cheap and accessible, and traditional security tools like one-time passcodes, device IDs and login credentials are routinely bypassed through phishing, malware and social engineering. The gap between static defenses and evolving threats has widened as the scale of digital services has increased. Behavioral biometrics steps into that gap, offering real-time, context-aware detection based on people's behavior — not just what they know or have.\n\n\n\nThis technology's ability to provide strong, continuous authentication without adding friction for real users makes it critical. It doesn't rely on static inputs or challenge-response interactions that frustrate customers or create drop-offs. Instead, it quietly monitors behavior in the background, picking up on subtle signs of risk: robotic copy-pasting, erratic touchscreen gestures, unusual session lengths and more. In a landscape where attackers often appear legitimate on the surface, behavioral biometrics adds a powerful dimension of defense that's nearly impossible to fake — and essential to maintaining digital trust at scale.\n\n\n\n\n      Discover the Future of Fraud Prevention\n       See how behavioral biometrics builds digital trust with seamless, continuous authentication that boosts security without user friction.\n     \n        Read here\n      \n    \n\n\n\n7 Types of Behavioral Biometrics \n\n\n\nBehavioral biometrics isn't limited to how people type or move a mouse. It captures a wide array of human behaviors across web and mobile environments — many of which are difficult to replicate with automation or social engineering. Here are seven distinct types that provide a deeper behavioral fingerprint for detecting fraud:\n\n\n\n\nNavigation Flow PatternsThis refers to the path users take through an application or website. Behavioral systems evaluate how users progress through steps, pages and screens — including backtracking, skipping or hesitating on specific actions. Fraudsters often move with unnatural precision or speed compared to legitimate users who follow more organic, varied flows.\n\n\n\nField Focus BehaviorThe system observes how users interact with individual form fields — including how often they click in and out, pause before typing or revisit specific fields. Real users display hesitation, re-typing and second-guessing. Bots or scripted tools, in contrast, show rigid, highly repeatable field behavior.\n\n\n\nScroll DynamicsHuman scroll behavior tends to be inconsistent. Behavioral systems monitor scrolling speed, frequency and direction — all of which can reflect user intent or comfort level. Uniform scroll behavior, erratic speed changes or scripted jumps are red flags associated with automation or spoofing attempts.\n\n\n\nGesture Recognition in Mobile AppsOn mobile, behavioral biometrics captures multi-touch gestures like pinch-to-zoom, directional swipes or tap pressure variations. These actions reflect physical muscle memory and are difficult to fake remotely. A lack of natural gestures or overly robotic touch patterns can expose fraudulent sessions.\n\n\n\nTab Switching and Multi-Tasking BehaviorLegitimate users often toggle between browser tabs or apps, especially when cross-referencing information. Behavioral systems detect patterns like idle time, context switching and window focus changes — behaviors typically absent in bot or synthetic sessions, which tend to be linear and uninterrupted.\n\n\n\nInertia and Micro-MovementsBehavioral systems can detect subtle, involuntary device movements using data from motion sensors (like gyroscopes and accelerometers). These micro-movements—even while a device appears still—are unique to each user and nearly impossible to reproduce using emulators, bots or remote desktop tools.\n\n\n\nCorrection Patterns and Input RevisionsHow a user corrects mistakes says a lot about their authenticity. Whether they delete characters mid-word, re-enter fields multiple times or make spelling corrections, these actions create behavioral depth. Automation and credential stuffing tools rarely show this imperfection, making input revision behavior a powerful fraud signal.\n\n\n\n\nUse Cases for Behavioral Biometrics  \n\n\n\nBehavioral biometrics shines in scenarios where traditional authentication falls short — especially when users appear legitimate on the surface, including:\n\n\n\n\nAccount Takeover PreventionBehavioral biometrics flags inconsistencies between a known user's behavior and that of an imposter — even if credentials are correct. Real-time session analysis helps block fraudulent transfers and protect customer accounts.\n\n\n\nNew Account Fraud DetectionFraudsters using automation to open fake accounts leave behind unnatural behavior patterns. Behavioral signals can detect this activity early in the funnel, reducing risk without delaying onboarding.\n\n\n\nSocial Engineering Scam InterventionBehavioral biometrics can detect stress signals like fragmented typing or unusual session timing and trigger step-up authentication even when a legitimate user is coerced- such as during an authorized push payment scam.\n\n\n\nMule Account DetectionBehavioral patterns reveal repeated suspicious activity linked to money mule operations, such as high-volume transfers, consistent use of automation or behavior inconsistent with legitimate users.\n\n\n\n\nHow Behavioral Biometrics Enhances Fraud Prevention\n\n\n\nTraditional fraud prevention methods — like two-factor authentication, device checks and static biometrics — were built for a different era. Today's attackers exploit weaknesses at scale using automation, stolen credentials and social engineering. These conventional tools verify identity at isolated points in time, making them reactive and easily bypassed. On the other hand, behavioral biometrics continuously monitors how users interact throughout a session, detecting subtle signs of risk that static signals simply miss. It doesn't ask, \"Is this the right device?\" — it asks, \"Is this the right person using it, and are they behaving as expected?\"\n\n\n\nWhat makes behavioral biometric fraud detection more effective is its ability to profile user intent in real time. It analyzes thousands of micro-patterns — from scroll velocity to hesitation while entering data — and builds a behavioral baseline that's nearly impossible to fake. This allows it to detect account takeover attempts even when the fraudster has the correct password, identify bot-driven account openings before they succeed and flag transactions where a legitimate user appears to be under duress. It picks up where traditional methods fall short, providing intelligence that adapts to evolving threats rather than relying on outdated rules or hardcoded thresholds.\n\n\n\nEqually important, behavioral biometrics breaks the cycle of disjointed, point-solution fraud stacks. Instead of relying on piecemeal tools stitched together across siloed systems — or AI engines trained on legacy third-party datasets — businesses gain continuous, in-session insights that don't depend on static credentials or external data providers. This improves detection accuracy, reduces false positives and speeds up fraud response. By focusing on how users behave rather than what credentials they carry, behavioral biometrics introduces a more resilient, scalable and customer-friendly way to fight fraud — one built for today's digital reality.\n\n\n\nBest Practices for Implementing a Behavioral Biometric Solution\n\n\n\nDeploying behavioral biometrics effectively requires more than just enabling a new data stream — it's about embedding behavioral intelligence into the right moments across the user journey. A well-implemented solution should minimize friction for trusted users while providing real-time defense against increasingly subtle and complex fraud tactics.\n\n\n\nThe following best practices can help organizations unlock the full value of behavioral biometrics while ensuring privacy, accuracy and operational efficiency:\n\n\n\n\nStart with High-Risk FlowsTo immediately reduce exposure to fraud, begin implementation where the impact is highest—such as account creation, login and transaction authorization.\n\n\n\nPrioritize Passive MonitoringBehavioral biometrics should enhance, not disrupt, the user experience. Ensure the solution operates invisibly in the background, applying friction only when risk is detected.\n\n\n\nIntegrate with Existing ToolsA behavioral biometric solution should complement your current fraud stack. For maximum visibility, connect it to your scoring engine, rules-based systems or orchestration layer.\n\n\n\nCustomize Your Risk ProfileTune behavioral models to your specific user base and threat landscape. Fraud in fintech may look different than in iGaming or eCommerce — your signals should reflect that.\n\n\n\nMonitor Data Privacy &amp; ComplianceCollect only the behavioral data you need. Ensure all data is encrypted, stored securely and used exclusively for fraud prevention, not marketing or profiling.\n\n\n\nTest &amp; Refine ContinuouslyUse A/B testing and retrospective analysis to calibrate your risk thresholds, validate performance and refine behavioral indicators for accuracy over time.\n\n\n\nEducate Internal TeamsEnsure the fraud, risk and customer experience teams understand how behavioral data is used and how to act on insights. The cross-team collaboration will maximize ROI.\n\n\n\n\nBuilding Trust Through Smarter Fraud Prevention\n\n\n\nAs fraud becomes more complex and digital interactions grow more personal, businesses need security strategies that evolve alongside user behavior. Behavioral biometrics offers that evolution — providing continuous, invisible authentication that strengthens fraud prevention without introducing unnecessary friction.\n\n\n\nBy adopting behavioral biometric solutions, companies can stay ahead of attackers, reduce false positives and deliver seamless, secure user journeys. Whether you're fighting bots, stopping account takeover or safeguarding digital onboarding, behavioral biometrics helps transform real-time behavioral signals into smarter fraud decisions.\n\n\n\nFrequently Asked Questions\n\n\n\nHow does behavioral biometric fraud detection work? It continuously monitors how users interact with digital platforms — analyzing inputs like typing rhythm, mouse movement and screen behavior — to build a behavioral profile. When current behavior deviates from a known pattern or resembles automation or coercion, the system flags it as suspicious in real time.  What fraud types can behavioral biometrics detect? Behavioral biometrics can detect a wide range of fraud, including account takeovers (ATOs), new account fraud, bot and automation attacks, money mule behavior and social engineering scams. It's especially effective at identifying threats that bypass traditional checks but leave behind abnormal behavioral signals.  How do businesses use behavioral biometrics for fraud prevention? Businesses integrate behavioral biometrics into their fraud prevention stack to monitor user sessions, assign risk scores, trigger dynamic friction (like step-up authentication) and block or flag suspicious activities. It helps differentiate real users from fraudsters without disrupting the experience for trusted customers.  What is a behavioral biometric solution? It's a technology platform or SDK that captures and analyzes real-time behavioral signals during digital interactions. These solutions can be deployed on web and mobile applications and are often used alongside device intelligence, scoring engines or orchestration tools to detect fraud and minimize user friction."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/","url":"https://seon.io/resources/behavioral-biometrics-against-fraud/","name":"What Is Behavioral Biometrics & How It Stops Fraud | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","datePublished":"2025-04-03T10:11:57+00:00","dateModified":"2025-11-18T16:16:05+00:00","description":"Learn how behavioral biometrics detects and prevents fraud in real time through user behavior — securing accounts without adding friction.","mainEntity":[{"@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743674949337"},{"@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743674979101"},{"@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743674995572"},{"@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743675007636"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743674949337","position":1,"url":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743674949337","name":"How does behavioral biometric fraud detection work?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It continuously monitors how users interact with digital platforms — analyzing inputs like typing rhythm, mouse movement and screen behavior — to build a behavioral profile. When current behavior deviates from a known pattern or resembles automation or coercion, the system flags it as suspicious in real time.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743674979101","position":2,"url":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743674979101","name":"What fraud types can behavioral biometrics detect?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Behavioral biometrics can detect a wide range of fraud, including account takeovers (ATOs), new account fraud, bot and automation attacks, money mule behavior and social engineering scams. It's especially effective at identifying threats that bypass traditional checks but leave behind abnormal behavioral signals.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743674995572","position":3,"url":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743674995572","name":"How do businesses use behavioral biometrics for fraud prevention?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Businesses integrate behavioral biometrics into their fraud prevention stack to monitor user sessions, assign risk scores, trigger dynamic friction (like step-up authentication) and block or flag suspicious activities. It helps differentiate real users from fraudsters without disrupting the experience for trusted customers.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743675007636","position":4,"url":"https://seon.io/resources/behavioral-biometrics-against-fraud/#faq-question-1743675007636","name":"What is a behavioral biometric solution?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It's a technology platform or SDK that captures and analyzes real-time behavioral signals during digital interactions. These solutions can be deployed on web and mobile applications and are often used alongside device intelligence, scoring engines or orchestration tools to detect fraud and minimize user friction.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/brazil-igaming-opportunities-under-new-regulations/#article","isPartOf":{"@id":"https://seon.io/resources/brazil-igaming-opportunities-under-new-regulations/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"How to Unlock Opportunities in Brazil&#8217;s iGaming Sector Under the New Regulations","datePublished":"2025-04-04T15:44:57+00:00","dateModified":"2025-11-18T16:15:20+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/brazil-igaming-opportunities-under-new-regulations/"},"wordCount":1969,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/brazil-igaming-opportunities-under-new-regulations/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/04/How-to-Unlock-Opportunities-in-Brazils-iGaming-Sector-Under-the-New-Regulations-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"Explore Brazil’s new iGaming rules and learn how operators can stay compliant, prevent fraud, and unlock growth in a $3.6B market."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/brazil-igaming-opportunities-under-new-regulations/","url":"https://seon.io/resources/brazil-igaming-opportunities-under-new-regulations/","name":"How to Tap Into Brazil’s iGaming Market Under New Regulations","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/brazil-igaming-opportunities-under-new-regulations/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/04/How-to-Unlock-Opportunities-in-Brazils-iGaming-Sector-Under-the-New-Regulations-Thumbnail.png","datePublished":"2025-04-04T15:44:57+00:00","dateModified":"2025-11-18T16:15:20+00:00","description":"Explore Brazil’s new iGaming rules and learn how operators can stay compliant, prevent fraud, and unlock growth in a $3.6B market.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/brazil-igaming-opportunities-under-new-regulations/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/04/How-to-Unlock-Opportunities-in-Brazils-iGaming-Sector-Under-the-New-Regulations-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/04/How-to-Unlock-Opportunities-in-Brazils-iGaming-Sector-Under-the-New-Regulations-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-prevention-competitive-advantage-10bet-superbet-takeaways/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-prevention-competitive-advantage-10bet-superbet-takeaways/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Key takeaways from ‘How to Turn Fraud Prevention Into Your Competitive Advantage’ featuring 10bet and Superbet","datePublished":"2025-04-07T07:39:28+00:00","dateModified":"2025-11-18T16:14:38+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-prevention-competitive-advantage-10bet-superbet-takeaways/"},"wordCount":637,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-prevention-competitive-advantage-10bet-superbet-takeaways/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","inLanguage":"en-US","description":"Discover how 10bet and Superbet use strategic fraud prevention to boost ROI, enhance player trust, and turn risk teams into business enablers."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fraud-prevention-competitive-advantage-10bet-superbet-takeaways/","url":"https://seon.io/resources/fraud-prevention-competitive-advantage-10bet-superbet-takeaways/","name":"10bet & Superbet: Fraud Prevention for Growth | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-prevention-competitive-advantage-10bet-superbet-takeaways/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","datePublished":"2025-04-07T07:39:28+00:00","dateModified":"2025-11-18T16:14:38+00:00","description":"Discover how 10bet and Superbet use strategic fraud prevention to boost ROI, enhance player trust, and turn risk teams into business enablers.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-prevention-competitive-advantage-10bet-superbet-takeaways/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/pep-screening-guide/#article","isPartOf":{"@id":"https://seon.io/resources/pep-screening-guide/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"The Complete Guide to PEP Screening","datePublished":"2025-04-29T15:48:57+00:00","dateModified":"2025-11-13T13:12:06+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/pep-screening-guide/"},"wordCount":1782,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/pep-screening-guide/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","inLanguage":"en-US","description":"Find out why PEP checks are required and how to do them more easily."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/pep-screening-guide/","url":"https://seon.io/resources/pep-screening-guide/","name":"PEP Screening for AML Compliance: Full Guide | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/pep-screening-guide/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2025-04-29T15:48:57+00:00","dateModified":"2025-11-13T13:12:06+00:00","description":"Learn what PEP screening is and how PEP screening tools support AML compliance, manage risk, and improve customer onboarding.","mainEntity":[{"@id":"https://seon.io/resources/pep-screening-guide/#faq-question-1669990683290"},{"@id":"https://seon.io/resources/pep-screening-guide/#faq-question-1669990697216"},{"@id":"https://seon.io/resources/pep-screening-guide/#faq-question-1748077191309"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/pep-screening-guide/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/pep-screening-guide/#faq-question-1669990683290","position":1,"url":"https://seon.io/resources/pep-screening-guide/#faq-question-1669990683290","name":"How do I check if someone is a PEP?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To check if someone is a PEP, you can manually enter their name on politically exposed persons lists found on official websites. You can also look at open-source or commercial databases or even monitor media sources. However, most online businesses rely on AML software to automatically aggregate PEP list data for them.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/pep-screening-guide/#faq-question-1669990697216","position":2,"url":"https://seon.io/resources/pep-screening-guide/#faq-question-1669990697216","name":"How do I run a PEP check?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"You are allowed to run a PEP check manually by searching for information about a person on official government PEP lists. You can also rely on AML software to automatically scan for that person’s name on dozens of aggregated databases. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/pep-screening-guide/#faq-question-1748077191309","position":3,"url":"https://seon.io/resources/pep-screening-guide/#faq-question-1748077191309","name":"How do PEP screening tools work and what features should you look for?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"PEP screening tools compare customer data against global PEP databases using advanced algorithms and fuzzy matching to detect potential risks, even with name variations. These tools may be manual, semi-automated, or fully automated, and often include real-time alerts, sanctions list integration, customizable risk scoring, and enhanced due diligence workflows. Leading solutions like SEON also offer AI-powered false positive reduction, digital footprint analysis, and device intelligence to give compliance teams deeper context and improve accuracy.<br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fighting-fraud-as-a-competitive-advantage/#article","isPartOf":{"@id":"https://seon.io/resources/fighting-fraud-as-a-competitive-advantage/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Fighting Fraud as a Competitive Advantage","datePublished":"2025-04-30T08:02:54+00:00","dateModified":"2025-11-18T16:13:58+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fighting-fraud-as-a-competitive-advantage/"},"wordCount":1066,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fighting-fraud-as-a-competitive-advantage/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","inLanguage":"en-US","description":"See how smart companies turn fraud prevention into growth—driving acquisition, retention, and efficiency."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fighting-fraud-as-a-competitive-advantage/","url":"https://seon.io/resources/fighting-fraud-as-a-competitive-advantage/","name":"Fighting Fraud as a Competitive Advantage | Turn Risk into ROI","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fighting-fraud-as-a-competitive-advantage/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","datePublished":"2025-04-30T08:02:54+00:00","dateModified":"2025-11-18T16:13:58+00:00","description":"Learn how companies turn fraud prevention into a growth driver, boosting acquisition, retention, and efficiency through proactive, strategic approaches.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fighting-fraud-as-a-competitive-advantage/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/real-time-compliance-vs-batch-monitoring/#article","isPartOf":{"@id":"https://seon.io/resources/real-time-compliance-vs-batch-monitoring/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Real-Time Versus Batch Processing: Why Compliance Needs to Catch Up","datePublished":"2025-05-12T18:55:09+00:00","dateModified":"2026-01-16T09:52:19+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/real-time-compliance-vs-batch-monitoring/"},"wordCount":713,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/real-time-compliance-vs-batch-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/05/Real-Time-Versus-Batch-Processing_-Why-Compliance-Needs-to-Catch-Up-Social.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Still using batch compliance? You’re handing fraudsters a head start. See why real-time is the future—and how to stay ahead."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/real-time-compliance-vs-batch-monitoring/","url":"https://seon.io/resources/real-time-compliance-vs-batch-monitoring/","name":"Why Real-Time Compliance Is Crucial for Modern Payments | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/real-time-compliance-vs-batch-monitoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/05/Real-Time-Versus-Batch-Processing_-Why-Compliance-Needs-to-Catch-Up-Social.png","datePublished":"2025-05-12T18:55:09+00:00","dateModified":"2026-01-16T09:52:19+00:00","description":"Still using batch compliance? You’re handing fraudsters a head start. See why real-time is the future—and how to stay ahead.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/real-time-compliance-vs-batch-monitoring/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/05/Real-Time-Versus-Batch-Processing_-Why-Compliance-Needs-to-Catch-Up-Social.png","contentUrl":"https://seon.io/wp-content/uploads/2025/05/Real-Time-Versus-Batch-Processing_-Why-Compliance-Needs-to-Catch-Up-Social.png","width":832,"height":469}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-alert-fatigue-risk-based-alert-triggers/#article","isPartOf":{"@id":"https://seon.io/resources/aml-alert-fatigue-risk-based-alert-triggers/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"Surfacing Risk Through Targeted Alert Triggers","datePublished":"2025-05-13T18:30:38+00:00","dateModified":"2026-02-24T14:29:18+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-alert-fatigue-risk-based-alert-triggers/"},"wordCount":1699,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-alert-fatigue-risk-based-alert-triggers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/05/Surfacing-Risk-Through-Targeted-Alert-Triggers-thumbnail-1.png","inLanguage":"en-US","description":"Alert overload hurts compliance—discover how smarter AML rules catch real threats faster."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/aml-alert-fatigue-risk-based-alert-triggers/","url":"https://seon.io/resources/aml-alert-fatigue-risk-based-alert-triggers/","name":"How to Reduce AML Alert Fatigue with Smarter Triggers | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-alert-fatigue-risk-based-alert-triggers/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/05/Surfacing-Risk-Through-Targeted-Alert-Triggers-thumbnail-1.png","datePublished":"2025-05-13T18:30:38+00:00","dateModified":"2026-02-24T14:29:18+00:00","description":"Alert fatigue is killing compliance. Discover how smarter AML triggers reduce noise and boost fraud detection accuracy.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-alert-fatigue-risk-based-alert-triggers/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/05/Surfacing-Risk-Through-Targeted-Alert-Triggers-thumbnail-1.png","contentUrl":"https://seon.io/wp-content/uploads/2025/05/Surfacing-Risk-Through-Targeted-Alert-Triggers-thumbnail-1.png","width":832,"height":469}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"How to Use Data Analytics and Predictive Models to Detect Fraud","datePublished":"2025-05-14T08:47:18+00:00","dateModified":"2025-07-15T15:28:53+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/"},"wordCount":1129,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how predictive analytics detects fraud using key tools, models, and real-world use cases."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/","url":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/","name":"Data Analytics & Predictive Techniques for Fraud Detection | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","datePublished":"2025-05-14T08:47:18+00:00","dateModified":"2025-07-15T15:28:53+00:00","description":"Discover how predictive analytics and data analysis techniques detect suspicious activity and prevent fraud. Explore essential tools, models, and use cases.","mainEntity":[{"@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163014720"},{"@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163031229"},{"@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163043047"},{"@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163054506"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163014720","position":1,"url":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163014720","name":"What is data analytics in fraud detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It involves examining data to identify suspicious patterns, detect anomalies and uncover fraudulent activities using statistical methods, machine learning and real-time monitoring.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163031229","position":2,"url":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163031229","name":"How does predictive analytics help detect fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Predictive analytics uses historical data to identify patterns, build models and assign risk scores, enabling businesses to flag suspicious behavior before it leads to fraud.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163043047","position":3,"url":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163043047","name":"What are the most effective data analysis techniques for detecting fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Effective techniques include outlier detection, clustering, social network analysis and predictive modeling, each uncovering different aspects of fraudulent behavior.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163054506","position":4,"url":"https://seon.io/resources/fraud-detection-data-analytics-predictive-techniques/#faq-question-1747163054506","name":"Why do modern AML programs depend on data analytics?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Modern AML programs rely on data analytics to efficiently detect suspicious transactions, uncover hidden risks, and adapt to evolving fraud tactics with real-time insights.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/cfpb-zelle-lawsuit-app-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/cfpb-zelle-lawsuit-app-fraud/"},"author":{"name":"Matt DeLauro","@id":"https://seon.io/#/schema/person/fbe3e4c532f2eadc9b7aa3d133c682a1"},"headline":"CFPB and Zelle: The Implications for Fraud Prevention and Consumer Trust","datePublished":"2025-05-19T07:33:45+00:00","dateModified":"2025-11-18T16:10:39+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/cfpb-zelle-lawsuit-app-fraud/"},"wordCount":546,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/cfpb-zelle-lawsuit-app-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/05/CFPB-and-Zelle_-The-Implications-for-Fraud-Prevention-and-Consumer-Trust-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Zelle users lost millions to fraud—now with less oversight, who’s protecting consumers? See what this means for fast payments."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/cfpb-zelle-lawsuit-app-fraud/","url":"https://seon.io/resources/cfpb-zelle-lawsuit-app-fraud/","name":"Zelle, CFPB & APP Fraud: What the Lawsuit Pullback Means","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/cfpb-zelle-lawsuit-app-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/05/CFPB-and-Zelle_-The-Implications-for-Fraud-Prevention-and-Consumer-Trust-Thumbnail.png","datePublished":"2025-05-19T07:33:45+00:00","dateModified":"2025-11-18T16:10:39+00:00","description":"Zelle users lost millions to fraud. With the CFPB backing off, who’s protecting consumers now? Explore the risks and what it means for fast payments.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/cfpb-zelle-lawsuit-app-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/05/CFPB-and-Zelle_-The-Implications-for-Fraud-Prevention-and-Consumer-Trust-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/05/CFPB-and-Zelle_-The-Implications-for-Fraud-Prevention-and-Consumer-Trust-Thumbnail.png","width":832,"height":469}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/pre-kyc-aml-screening-digital-footprint/#article","isPartOf":{"@id":"https://seon.io/resources/pre-kyc-aml-screening-digital-footprint/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"Smarter AML Compliance: Why Screening Should Start Before KYC","datePublished":"2025-05-19T14:59:14+00:00","dateModified":"2025-11-27T11:26:46+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/pre-kyc-aml-screening-digital-footprint/"},"wordCount":1263,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/pre-kyc-aml-screening-digital-footprint/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/05/Smarter-AML-Compliance_-Why-Screening-Should-Start-Before-KYC-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"Stop fraud early. See how pre-KYC checks and digital footprinting improve AML and cut false positives."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/pre-kyc-aml-screening-digital-footprint/","url":"https://seon.io/resources/pre-kyc-aml-screening-digital-footprint/","name":"Smarter AML: Why Screening Should Start Before KYC | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/pre-kyc-aml-screening-digital-footprint/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/05/Smarter-AML-Compliance_-Why-Screening-Should-Start-Before-KYC-Thumbnail.png","datePublished":"2025-05-19T14:59:14+00:00","dateModified":"2025-11-27T11:26:46+00:00","description":"Stop fraud before it starts. Learn how pre-KYC screening and digital footprint analysis can boost AML efficiency and reduce false positives.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/pre-kyc-aml-screening-digital-footprint/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/05/Smarter-AML-Compliance_-Why-Screening-Should-Start-Before-KYC-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/05/Smarter-AML-Compliance_-Why-Screening-Should-Start-Before-KYC-Thumbnail.png","width":832,"height":469}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/what-is-sanctions-screening/#article","isPartOf":{"@id":"https://seon.io/resources/what-is-sanctions-screening/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"What Is Sanctions Screening? Key Steps &amp; Compliance Tips","datePublished":"2025-05-23T11:16:56+00:00","dateModified":"2025-09-10T12:44:12+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/what-is-sanctions-screening/"},"wordCount":2081,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/what-is-sanctions-screening/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"See how sanctions screening supports AML compliance. Explore the process, key steps, and tips to stay ahead of regulatory risk in 2025."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/what-is-sanctions-screening/","url":"https://seon.io/resources/what-is-sanctions-screening/","name":"What Is Sanctions Screening? A 2025 Compliance Toolkit | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/what-is-sanctions-screening/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","datePublished":"2025-05-23T11:16:56+00:00","dateModified":"2025-09-10T12:44:12+00:00","description":"Learn how sanctions screening supports AML compliance in 2025. Key steps and tips to stay ahead of regulatory risks. Discover how!","mainEntity":[{"@id":"https://seon.io/resources/what-is-sanctions-screening/#faq-question-1675195863806"},{"@id":"https://seon.io/resources/what-is-sanctions-screening/#faq-question-1675195876700"},{"@id":"https://seon.io/resources/what-is-sanctions-screening/#faq-question-1675195877505"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/what-is-sanctions-screening/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/what-is-sanctions-screening/#faq-question-1675195863806","position":1,"url":"https://seon.io/resources/what-is-sanctions-screening/#faq-question-1675195863806","name":"What are sanctions in AML?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Within anti-money laundering mandates, sanctions are restrictions imposed upon entities that are meant to prohibit that entity from furthering their agenda through business. These entities generally have been determined to be malicious or otherwise detrimental – for instance, members of terrorist groups and warmongers. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/what-is-sanctions-screening/#faq-question-1675195876700","position":2,"url":"https://seon.io/resources/what-is-sanctions-screening/#faq-question-1675195876700","name":"Who should be screened for sanctions?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"For companies that fall within the AML perimeter, all new users should be screened against all relevant sanctions lists during the onboarding process. Existing users determined to be risky should also have their transactions monitored for involvement with sanctioned entities, as well as for suspicious behavior associated with corruption.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/what-is-sanctions-screening/#faq-question-1675195877505","position":3,"url":"https://seon.io/resources/what-is-sanctions-screening/#faq-question-1675195877505","name":"Who needs to do sanctions screening?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Depending on the jurisdiction – including any country business is being conducted – certain verticals need to do sanctions screening as part of KYC. Regulated verticals typically include financial institutions, building societies and other money services, gambling institutions, and in some cases high-end retail like art dealers and real estate services.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/regulatory-risk-obligations-aml-compliance/#article","isPartOf":{"@id":"https://seon.io/resources/regulatory-risk-obligations-aml-compliance/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Unsure Of Your Regulatory Obligations? Stay Compliant","datePublished":"2025-05-28T11:29:04+00:00","dateModified":"2025-11-18T16:08:52+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/regulatory-risk-obligations-aml-compliance/"},"wordCount":710,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/regulatory-risk-obligations-aml-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/05/Unsure-Of-Your-Regulatory-Obligations_-Better-to-Be-Safe-Than-Sorry-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Struggling with AML compliance? Learn how to manage regulatory risk and obligations with tools built for real-time, scalable compliance."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/regulatory-risk-obligations-aml-compliance/","url":"https://seon.io/resources/regulatory-risk-obligations-aml-compliance/","name":"Worried About Regulatory Risk? Here’s How to Stay Ahead","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/regulatory-risk-obligations-aml-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/05/Unsure-Of-Your-Regulatory-Obligations_-Better-to-Be-Safe-Than-Sorry-Thumbnail.png","datePublished":"2025-05-28T11:29:04+00:00","dateModified":"2025-11-18T16:08:52+00:00","description":"Struggling with AML compliance? Learn how to manage regulatory risk and obligations with tools built for real-time, scalable compliance.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/regulatory-risk-obligations-aml-compliance/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/05/Unsure-Of-Your-Regulatory-Obligations_-Better-to-Be-Safe-Than-Sorry-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/05/Unsure-Of-Your-Regulatory-Obligations_-Better-to-Be-Safe-Than-Sorry-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#article","isPartOf":{"@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"How to Reveal Hidden Threats With Network Analysis","datePublished":"2025-06-02T10:23:50+00:00","dateModified":"2026-02-24T11:32:23+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/"},"wordCount":1808,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","inLanguage":"en-US","description":"Uncover synthetic IDs and fraud rings with network scoring and link analysis, beyond what legacy tools can catch."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/","url":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/","name":"What Is Network Risk Scoring & Link Analysis: Guide [2025]","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","datePublished":"2025-06-02T10:23:50+00:00","dateModified":"2026-02-24T11:32:23+00:00","description":"Expose fraud rings and synthetic IDs faster. See how network risk scoring and link analysis reveal threats missed by traditional fraud tools.","mainEntity":[{"@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859512488"},{"@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859526786"},{"@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859538027"},{"@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859549753"},{"@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859562619"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859512488","position":1,"url":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859512488","name":"What is a network score in fraud detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A network score is a numerical value that indicates the level of risk associated with a user or account based on their connections to other entities, such as shared IP addresses, devices, email addresses or links to known fraudsters. This score helps fraud teams prioritize investigations by highlighting accounts that may be part of larger networks.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859526786","position":2,"url":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859526786","name":"What fraud patterns can network scoring uncover?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Network scoring can identify a wide range of fraud schemes, including organized fraud rings, mule account networks, bonus abuse, refund scams and synthetic identity clusters. By analyzing connections and shared infrastructure, it uncovers patterns that traditional single-entity checks often miss.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859538027","position":3,"url":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859538027","name":"How do graph networks detect fraudsters?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Graph networks detect fraudsters by visualizing the complex relationships between users, devices, IPs and other data points. This allows analysts to spot clusters of coordinated behavior and shared attributes, making it easier to identify groups of fraudulent accounts acting together.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859549753","position":4,"url":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859549753","name":"How does network risk assessment help prevent fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Network risk assessment helps prevent fraud by proactively identifying accounts that exhibit risky connections or behaviors. Instead of reacting after fraud occurs, it flags suspicious networks early, enabling businesses to block or review high-risk users before damage happens.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859562619","position":5,"url":"https://seon.io/resources/network-risk-scoring-link-analysis-fraud-detection/#faq-question-1748859562619","name":"Can network risk scoring detect synthetic identity fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, network risk scoring is especially effective at detecting <a href=\"https://seon.io/resources/synthetic-identity-fraud-prevention-and-detection/\">synthetic identity fraud</a>. By examining links between seemingly unrelated accounts, such as shared devices or IPs, it uncovers synthetic identities that pass traditional checks but reveal connections to known fraud activity.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/real-time-aml-customer-screening-compliance/#article","isPartOf":{"@id":"https://seon.io/resources/real-time-aml-customer-screening-compliance/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Fixing AML Gaps with Smarter Customer Screening","datePublished":"2025-06-02T10:11:00+00:00","dateModified":"2026-04-10T10:41:18+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/real-time-aml-customer-screening-compliance/"},"wordCount":824,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/real-time-aml-customer-screening-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/06/Bridging-Gaps-in-AML-Processes_-Real-Time-Customer-Screening-as-a-Differentiator-THUMBNAIL.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"See how real-time screening boosts AML compliance, cuts risk, and helps firms avoid fines and costly gaps."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/real-time-aml-customer-screening-compliance/","url":"https://seon.io/resources/real-time-aml-customer-screening-compliance/","name":"Customer Screening in Real-Time: Fix AML Gaps Fast","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/real-time-aml-customer-screening-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/06/Bridging-Gaps-in-AML-Processes_-Real-Time-Customer-Screening-as-a-Differentiator-THUMBNAIL.png","datePublished":"2025-06-02T10:11:00+00:00","dateModified":"2026-04-10T10:41:18+00:00","description":"See how real-time customer screening boosts AML compliance, cuts risk, and helps financial firms avoid fines and fix costly operational gaps.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/real-time-aml-customer-screening-compliance/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/06/Bridging-Gaps-in-AML-Processes_-Real-Time-Customer-Screening-as-a-Differentiator-THUMBNAIL.png","contentUrl":"https://seon.io/wp-content/uploads/2025/06/Bridging-Gaps-in-AML-Processes_-Real-Time-Customer-Screening-as-a-Differentiator-THUMBNAIL.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/igaming-bonus-abuse-warning-sign-or-opportunity/#article","isPartOf":{"@id":"https://seon.io/resources/igaming-bonus-abuse-warning-sign-or-opportunity/"},"author":{"name":"Husnain Bajwa","@id":"https://seon.io/#/schema/person/05d1abd4f2ffc6315998adb05ea63842"},"headline":"iGaming’s Bonus Abuse Problem Is a Mirror, Not a Mystery","datePublished":"2025-06-10T15:46:59+00:00","dateModified":"2025-11-21T13:38:28+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/igaming-bonus-abuse-warning-sign-or-opportunity/"},"wordCount":895,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/igaming-bonus-abuse-warning-sign-or-opportunity/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Bonus abuse is exposing iGaming’s weak spots. Learn how smarter fraud tools—and AI—can turn this threat into a competitive edge."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/igaming-bonus-abuse-warning-sign-or-opportunity/","url":"https://seon.io/resources/igaming-bonus-abuse-warning-sign-or-opportunity/","name":"Why iGaming Bonus Abuse Is a Growing Fraud Crisis | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/igaming-bonus-abuse-warning-sign-or-opportunity/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","datePublished":"2025-06-10T15:46:59+00:00","dateModified":"2025-11-21T13:38:28+00:00","description":"Bonus abuse is exposing iGaming’s weak spots. Learn how smarter fraud tools—and AI—can turn this threat into a competitive edge.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/igaming-bonus-abuse-warning-sign-or-opportunity/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/05d1abd4f2ffc6315998adb05ea63842","name":"Husnain Bajwa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/08/cropped-Husnain-Bajwa-526_web-96x96.jpg","url":"https://seon.io/wp-content/uploads/2025/08/cropped-Husnain-Bajwa-526_web-96x96.jpg","contentUrl":"https://seon.io/wp-content/uploads/2025/08/cropped-Husnain-Bajwa-526_web-96x96.jpg","caption":"Husnain Bajwa"},"description":"Husnain Bajwa is a fraud and risk tech leader with 30+ years in cybersecurity, cloud platforms, and infrastructure. As SVP of Product – Risk Solutions at SEON, he leads innovation in fraud prevention and compliance. He previously held leadership roles at Beyond Identity, Hewlett Packard Enterprise, Aruba Networks, and Ericsson. Husnain is a recognized voice in risk management, championing data-driven, adaptive strategies to fight digital fraud and maintain compliance in a constantly evolving threat landscape.","sameAs":["https://www.linkedin.com/in/hbajwa/"],"knowsAbout":["Fraud Prevention","AML Compliance"],"jobTitle":"SVP of Product, Risk Solutions","url":"https://seon.io/resources/author/husnainbajwa/"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/why-in-house-fraud-aml-solutions-dont-scale/#article","isPartOf":{"@id":"https://seon.io/resources/why-in-house-fraud-aml-solutions-dont-scale/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"Why In-House Fraud &amp; AML Solutions Fail at Scale","datePublished":"2025-06-10T16:16:08+00:00","dateModified":"2025-08-01T12:56:32+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/why-in-house-fraud-aml-solutions-dont-scale/"},"wordCount":1173,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/why-in-house-fraud-aml-solutions-dont-scale/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Why in-house fraud and AML systems fail under growth—and how businesses can build scalable, compliant defenses that keep up."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/why-in-house-fraud-aml-solutions-dont-scale/","url":"https://seon.io/resources/why-in-house-fraud-aml-solutions-dont-scale/","name":"Why In-House Fraud and AML Solutions Fail at Scale | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/why-in-house-fraud-aml-solutions-dont-scale/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-dark.png","datePublished":"2025-06-10T16:16:08+00:00","dateModified":"2025-08-01T12:56:32+00:00","description":"In-house fraud and AML tools break under pressure. Discover smarter, scalable ways to stay compliant and ahead of growing financial crime.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/why-in-house-fraud-aml-solutions-dont-scale/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-compliance-structured-workflows-alert-optimization/#article","isPartOf":{"@id":"https://seon.io/resources/aml-compliance-structured-workflows-alert-optimization/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"Smarter AML Compliance: Structured Workflows &amp; Alert Optimization","datePublished":"2025-06-17T08:57:54+00:00","dateModified":"2026-04-10T09:52:20+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-compliance-structured-workflows-alert-optimization/"},"wordCount":865,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-compliance-structured-workflows-alert-optimization/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Improve AML compliance with structured workflows, tuned alerts, and smart case management to cut false positives and boost detection."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/aml-compliance-structured-workflows-alert-optimization/","url":"https://seon.io/resources/aml-compliance-structured-workflows-alert-optimization/","name":"Smarter AML Compliance: Workflows & Alert Optimization | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-compliance-structured-workflows-alert-optimization/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","datePublished":"2025-06-17T08:57:54+00:00","dateModified":"2026-04-10T09:52:20+00:00","description":"Improve AML compliance with structured workflows, tuned alerts, and smart case management to cut false positives and boost detection.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-compliance-structured-workflows-alert-optimization/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-prevention-smarter-signals-vs-data-overload/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-prevention-smarter-signals-vs-data-overload/"},"author":{"name":"Husnain Bajwa","@id":"https://seon.io/#/schema/person/05d1abd4f2ffc6315998adb05ea63842"},"headline":"More Data, More Risk: Why Smarter Signals Are Winning the Fraud Fight","datePublished":"2025-07-01T12:42:44+00:00","dateModified":"2025-11-18T16:05:36+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-prevention-smarter-signals-vs-data-overload/"},"wordCount":732,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-prevention-smarter-signals-vs-data-overload/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/07/More-Data-More-Risk_-Why-Smarter-Signals-Are-Winning-the-Fraud-Fight-thumbnail.png","inLanguage":"en-US","description":"SEON, DoorDash, and Bolster AI show how real-time, high-quality signals beat data overload in the fight against fraud."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fraud-prevention-smarter-signals-vs-data-overload/","url":"https://seon.io/resources/fraud-prevention-smarter-signals-vs-data-overload/","name":"Smarter Signals: Rethinking Data in Fraud Prevention | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-prevention-smarter-signals-vs-data-overload/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/07/More-Data-More-Risk_-Why-Smarter-Signals-Are-Winning-the-Fraud-Fight-thumbnail.png","datePublished":"2025-07-01T12:42:44+00:00","dateModified":"2025-11-18T16:05:36+00:00","description":"More data isn’t always better. See how SEON, DoorDash, and Bolster AI fight fraud with high-quality signals, real-time insights, and less noise.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-prevention-smarter-signals-vs-data-overload/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/07/More-Data-More-Risk_-Why-Smarter-Signals-Are-Winning-the-Fraud-Fight-thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/07/More-Data-More-Risk_-Why-Smarter-Signals-Are-Winning-the-Fraud-Fight-thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/smarter-aml-compliance-regulatory-reporting/#article","isPartOf":{"@id":"https://seon.io/resources/smarter-aml-compliance-regulatory-reporting/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"Smarter AML Compliance: Efficient, Accurate &amp; Compliant Regulatory Reporting","datePublished":"2025-07-11T12:14:51+00:00","dateModified":"2025-07-14T13:05:53+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/smarter-aml-compliance-regulatory-reporting/"},"wordCount":888,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/smarter-aml-compliance-regulatory-reporting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/07/Smarter-AML-Compliance_-Efficient-Accurate-Compliant-Regulatory-Reporting-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"Enhance your AML compliance with smarter tools. Automate reporting and stay ahead of evolving regulations — efficiently and accurately."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/smarter-aml-compliance-regulatory-reporting/","url":"https://seon.io/resources/smarter-aml-compliance-regulatory-reporting/","name":"Smarter AML Compliance: Efficient Regulatory Reporting | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/smarter-aml-compliance-regulatory-reporting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/07/Smarter-AML-Compliance_-Efficient-Accurate-Compliant-Regulatory-Reporting-Thumbnail.png","datePublished":"2025-07-11T12:14:51+00:00","dateModified":"2025-07-14T13:05:53+00:00","description":"Enhance your AML compliance with smarter tools. Automate reporting and stay ahead of evolving regulations — efficiently and accurately.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/smarter-aml-compliance-regulatory-reporting/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/07/Smarter-AML-Compliance_-Efficient-Accurate-Compliant-Regulatory-Reporting-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/07/Smarter-AML-Compliance_-Efficient-Accurate-Compliant-Regulatory-Reporting-Thumbnail.png","width":832,"height":468,"caption":"Compliant Regulatory Reporting"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-and-compliance-collaboration-for-aml-success/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-and-compliance-collaboration-for-aml-success/"},"author":{"name":"Jeremy Doyle","@id":"https://seon.io/#/schema/person/36d2cf86a89263b8e8627bf53e6cfe86"},"headline":"Effective AML Compliance: How Fraud &amp; Compliance Teams Align for Impact","datePublished":"2025-07-04T14:15:21+00:00","dateModified":"2025-08-01T09:42:33+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-and-compliance-collaboration-for-aml-success/"},"wordCount":844,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-and-compliance-collaboration-for-aml-success/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/07/Smarter-AML-Compliance_-How-Fraud-Compliance-Teams-Can-Work-Smarter-Together-Thumbnail-1.png","articleSection":["Article"],"inLanguage":"en-US","description":"Discover how uniting fraud and AML compliance teams leads to faster decisions, fewer blind spots, and smarter financial crime detection."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fraud-and-compliance-collaboration-for-aml-success/","url":"https://seon.io/resources/fraud-and-compliance-collaboration-for-aml-success/","name":"Aligning Fraud & Compliance Teams for Better AML | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-and-compliance-collaboration-for-aml-success/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/07/Smarter-AML-Compliance_-How-Fraud-Compliance-Teams-Can-Work-Smarter-Together-Thumbnail-1.png","datePublished":"2025-07-04T14:15:21+00:00","dateModified":"2025-08-01T09:42:33+00:00","description":"See how connecting fraud and AML teams improves investigations, reduces silos, and strengthens compliance across your organization.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-and-compliance-collaboration-for-aml-success/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/07/Smarter-AML-Compliance_-How-Fraud-Compliance-Teams-Can-Work-Smarter-Together-Thumbnail-1.png","contentUrl":"https://seon.io/wp-content/uploads/2025/07/Smarter-AML-Compliance_-How-Fraud-Compliance-Teams-Can-Work-Smarter-Together-Thumbnail-1.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/brazil-igaming-compliance-customer-led-development/#article","isPartOf":{"@id":"https://seon.io/resources/brazil-igaming-compliance-customer-led-development/"},"author":{"name":"Husnain Bajwa","@id":"https://seon.io/#/schema/person/05d1abd4f2ffc6315998adb05ea63842"},"headline":"Customer-Led Growth in Brazil: Navigating Compliance for Global Expansion","datePublished":"2025-07-15T09:40:32+00:00","dateModified":"2026-02-04T12:26:55+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/brazil-igaming-compliance-customer-led-development/"},"wordCount":1086,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/brazil-igaming-compliance-customer-led-development/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/07/Navigating-Brazils-Unique-Compliance-Landscape-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Learn how iGaming operators succeed in Brazil with customer-led development, CPF validation, and tailored onboarding."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/brazil-igaming-compliance-customer-led-development/","url":"https://seon.io/resources/brazil-igaming-compliance-customer-led-development/","name":"Brazil iGaming Compliance: Winning in a Demanding Market","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/brazil-igaming-compliance-customer-led-development/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/07/Navigating-Brazils-Unique-Compliance-Landscape-Thumbnail.png","datePublished":"2025-07-15T09:40:32+00:00","dateModified":"2026-02-04T12:26:55+00:00","description":"Learn how iGaming operators succeed in Brazil with customer-led development, CPF validation, and tailored onboarding.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/brazil-igaming-compliance-customer-led-development/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/07/Navigating-Brazils-Unique-Compliance-Landscape-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/07/Navigating-Brazils-Unique-Compliance-Landscape-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#article","isPartOf":{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/"},"author":{"name":"Matyas Varga","@id":"https://seon.io/#/schema/person/ef701bc364c63c98811fe7b648f02520"},"headline":"Chargeback Fraud: Definition, How It Works &amp; Prevention","datePublished":"2025-07-15T13:34:25+00:00","dateModified":"2026-04-10T16:08:56+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/"},"wordCount":1863,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn why chargeback fraud prevention matters in 2025. Stop friendly fraud, reduce disputes, and protect revenue with smart strategies."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/","url":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/","name":"Chargeback Fraud: Definition, How It Works & Prevention","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","datePublished":"2025-07-15T13:34:25+00:00","dateModified":"2026-04-10T16:08:56+00:00","description":"Learn why chargeback fraud prevention matters in 2025. Stop friendly fraud, reduce disputes, and protect revenue with smart strategies.","mainEntity":[{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1752585974991"},{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1752585985650"},{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1752585998432"},{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836463525"},{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836476732"},{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836491147"},{"@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836505645"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1752585974991","position":1,"url":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1752585974991","name":"How many chargebacks are too many for a merchant?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Chargeback risk becomes more serious when merchants approach or exceed card network monitoring thresholds. Visa's threshold is approximately 0.9% of monthly transaction volume, and Mastercard's is 1%. Exceeding these levels triggers monitoring programs with additional fees and risks for payment acceptance if the ratio is not reduced.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1752585985650","position":2,"url":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1752585985650","name":"Can chargeback fraud be prevented completely?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Chargeback fraud cannot usually be eliminated entirely, but layered prevention can reduce dispute volume significantly before cases ever reach representment. Businesses that combine upstream fraud detection with strong payment security controls and clear customer communication consistently achieve lower chargeback ratios than those relying solely on dispute response.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1752585998432","position":3,"url":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1752585998432","name":"What is the difference between chargeback prevention and chargeback management?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Chargeback prevention focuses on stopping fraudulent or disputable transactions before disputes are filed. Chargeback management focuses on handling, triaging and responding to disputes after they have been filed. The two are complementary: prevention reduces volume, management recovers revenue from disputes that do occur.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836463525","position":4,"url":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836463525","name":"What evidence do you need to win a chargeback dispute?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The most useful evidence includes delivery confirmation with the customer's name and address, device data showing the same device was used at account creation and at the time of the disputed transaction, session logs proving the account was actively used after the purchase, and digital identity signals confirming the buyer had a consistent, credible online presence. For digital goods, evidence of download, access or use is critical. Generic screenshots of terms and conditions rarely succeed on their own.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836476732","position":5,"url":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836476732","name":"What is friendly fraud, and how is it different from criminal chargeback fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Friendly fraud is a chargeback filed by the legitimate account holder after a genuine transaction. The buyer either intentionally misrepresents the purchase as unauthorized to obtain a refund or disputes because they do not recognize the billing descriptor. Criminal chargeback fraud is filed by the genuine cardholder as a victim when a third party uses their payment credentials without authorization. The prevention and dispute approaches differ significantly between the two.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836491147","position":6,"url":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836491147","name":"How does 3DS2 affect chargeback liability?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"When a transaction passes 3DS2 authentication, liability for fraud-related chargebacks shifts from the merchant to the card issuer in most cases. This makes 3DS2 a meaningful protection against third-party card fraud chargebacks. It does not protect against friendly fraud chargebacks, where the genuine cardholder authorized the payment and is disputing it after the fact.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836505645","position":7,"url":"https://seon.io/resources/chargeback-fraud-detection-and-prevention-guide/#faq-question-1775836505645","name":"Why do some businesses have high chargeback rates despite using fraud detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The most common cause is that fraud detection is applied only at the transaction stage, while fraud originates earlier. Accounts created with stolen or synthetic identities pass checkout fraud checks because the risk was never scored at registration. Friendly fraud is another driver that transaction-level detection cannot address, since the payment was authorized by the real cardholder.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"Strategies to Reduce False Positives in AML Compliance","datePublished":"2025-07-16T14:07:52+00:00","dateModified":"2025-11-18T16:02:24+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/"},"wordCount":1345,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Reduce false positives in AML with risk-based monitoring, smarter tools, and streamlined strategies to cut alert fatigue."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/","url":"https://seon.io/resources/how-to-reduce-aml-false-positives/","name":"How to Reduce False Positives in AML Strategies | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2025-07-16T14:07:52+00:00","dateModified":"2025-11-18T16:02:24+00:00","description":"Learn how to reduce false positives in AML programs using risk-based strategies, smarter tools, and streamlined monitoring to cut alert fatigue.","mainEntity":[{"@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674539982"},{"@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674554497"},{"@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674564818"},{"@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674577511"},{"@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674588460"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674539982","position":1,"url":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674539982","name":"Why is it important to reduce AML false positives?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Excessive false positives waste time, slow down investigations and overwhelm compliance teams, while real risks may go unnoticed. Reducing them improves operational efficiency, enhances customer experience and supports more effective regulatory compliance.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674554497","position":2,"url":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674554497","name":"How can machine learning help reduce false positives in AML?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Machine learning analyzes complex patterns and adapts over time, helping distinguish between truly suspicious behavior and harmless anomalies. It can also prioritize alerts based on likelihood and severity, reducing manual workload and investigative noise.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674564818","position":3,"url":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674564818","name":"What data should be included to reduce false positives in AML systems?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"In addition to transactional data, systems should use enriched contextual signals like device intelligence, IP location, digital footprint analysis and user behavior. The broader view allows for more accurate risk assessments and fewer false flags.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674577511","position":4,"url":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674577511","name":"Can automation and AI fully eliminate AML false positives?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Not entirely, but they can drastically reduce them. Automation handles routine checks and alert triage, while AI improves decision accuracy. Human oversight remains key for complex cases and regulatory assurance.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674588460","position":5,"url":"https://seon.io/resources/how-to-reduce-aml-false-positives/#faq-question-1752674588460","name":"What are the regulatory risks of having too many false positives?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Excessive false positives can indicate poorly calibrated AML systems, leading regulators to question the effectiveness of your compliance program. If your processes are found lacking, this may result in increased scrutiny, fines or enforcement actions. Maintaining a balanced, risk-based approach is essential to meeting evolving <a href=\"https://seon.io/resources/regulatory-risk-obligations-aml-compliance/\">regulatory obligations</a> and avoiding unnecessary exposure.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/chargeback-provider-limitations-and-risks/#article","isPartOf":{"@id":"https://seon.io/resources/chargeback-provider-limitations-and-risks/"},"author":{"name":"Matt DeLauro","@id":"https://seon.io/#/schema/person/fbe3e4c532f2eadc9b7aa3d133c682a1"},"headline":"The Hidden Trade-Offs of Relying Solely on a Chargeback Provider","datePublished":"2025-07-21T14:41:09+00:00","dateModified":"2025-11-27T12:17:57+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/chargeback-provider-limitations-and-risks/"},"wordCount":1070,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/chargeback-provider-limitations-and-risks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/07/The-Hidden-Trade-Offs-of-Relying-Solely-on-a-Chargeback-Provider–-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Uncover the hidden costs of relying on chargeback providers alone. See why prevention-first fraud strategies deliver stronger long-term ROI."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/chargeback-provider-limitations-and-risks/","url":"https://seon.io/resources/chargeback-provider-limitations-and-risks/","name":"The Risks of Relying Only on a Chargeback Provider | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/chargeback-provider-limitations-and-risks/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/07/The-Hidden-Trade-Offs-of-Relying-Solely-on-a-Chargeback-Provider–-Thumbnail.png","datePublished":"2025-07-21T14:41:09+00:00","dateModified":"2025-11-27T12:17:57+00:00","description":"Discover the hidden costs and limitations of relying solely on chargeback providers. Learn why prevention-first fraud strategies drive better ROI.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/chargeback-provider-limitations-and-risks/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/07/The-Hidden-Trade-Offs-of-Relying-Solely-on-a-Chargeback-Provider–-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/07/The-Hidden-Trade-Offs-of-Relying-Solely-on-a-Chargeback-Provider–-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/takeaways-from-reinventing-aml-screening-for-greater-efficiency-impact/#article","isPartOf":{"@id":"https://seon.io/resources/takeaways-from-reinventing-aml-screening-for-greater-efficiency-impact/"},"author":{"name":"Jonathan Pryer","@id":"https://seon.io/#/schema/person/9bb627d6651a1910392c6742203943b9"},"headline":"Takeaways from ‘Reinventing AML Screening for Greater Efficiency &amp; Impact’","datePublished":"2025-07-22T11:18:03+00:00","dateModified":"2025-11-18T16:01:08+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/takeaways-from-reinventing-aml-screening-for-greater-efficiency-impact/"},"wordCount":632,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/takeaways-from-reinventing-aml-screening-for-greater-efficiency-impact/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","articleSection":["Webinar Takeaways"],"inLanguage":"en-US","description":"In this SEON webinar, experts share how real-time AML screening and fraud insights boost compliance speed and efficiency."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/takeaways-from-reinventing-aml-screening-for-greater-efficiency-impact/","url":"https://seon.io/resources/takeaways-from-reinventing-aml-screening-for-greater-efficiency-impact/","name":"SEON Webinar: Reinventing AML Screening for Efficiency","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/takeaways-from-reinventing-aml-screening-for-greater-efficiency-impact/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","datePublished":"2025-07-22T11:18:03+00:00","dateModified":"2025-11-18T16:01:08+00:00","description":"Watch SEON’s webinar to learn how real-time data, pre-KYC checks, and fraud insights make AML screening faster and more accurate.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/takeaways-from-reinventing-aml-screening-for-greater-efficiency-impact/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/9bb627d6651a1910392c6742203943b9","name":"Jonathan Pryer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/03/cropped-Jonathan-Pryer-005-PS-96x96.jpg","url":"https://seon.io/wp-content/uploads/2025/03/cropped-Jonathan-Pryer-005-PS-96x96.jpg","contentUrl":"https://seon.io/wp-content/uploads/2025/03/cropped-Jonathan-Pryer-005-PS-96x96.jpg","caption":"Jonathan Pryer"},"url":"https://seon.io/resources/author/jonny/"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-machine-learning/#article","isPartOf":{"@id":"https://seon.io/resources/aml-machine-learning/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"AML in Machine Learning: How It’s Used to Detect Money Laundering","datePublished":"2025-07-25T15:31:53+00:00","dateModified":"2026-04-10T12:06:11+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-machine-learning/"},"wordCount":1960,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-machine-learning/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"How AML machine learning improves detection, risk scoring, and alert quality."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/aml-machine-learning/","url":"https://seon.io/resources/aml-machine-learning/","name":"AML Machine Learning: How It’s Used to Detect Money Laundering","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-machine-learning/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","datePublished":"2025-07-25T15:31:53+00:00","dateModified":"2026-04-10T12:06:11+00:00","description":"AML machine learning explained: how models spot unusual behavior, prioritize alerts, and cut noise across key compliance workflows.","mainEntity":[{"@id":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457651942"},{"@id":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457663249"},{"@id":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457682871"},{"@id":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457693657"},{"@id":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457705238"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-machine-learning/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457651942","position":1,"url":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457651942","name":"What is an AML machine learning model?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AML machine learning is the use of artificial intelligence to spot signs of money laundering more effectively than traditional methods. Instead of relying on fixed rules, it looks at patterns across large amounts of data to identify suspicious activity, such as inconsistent customer behavior or hidden links between accounts, that might otherwise go unnoticed.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457663249","position":2,"url":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457663249","name":"How does machine learning improve AML transaction monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Labeling turns raw historical transaction data into the “ground truth” that machine learning systems need to learn and improve. By marking transactions as “suspicious” or “legitimate,” the model refines its sense of risk and learns to avoid false alarms. This creates an AML feedback loop that sharpens accuracy with every new data point. When integrated into an <a href=\"https://seon.io/products/aml-transaction-monitoring/\" id=\"https://seon.io/products/aml-transaction-monitoring/\">AML transaction monitoring solution</a>, this labeling ensures that automated alerts stay precise and adapt to evolving threats in real time.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457682871","position":3,"url":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457682871","name":"Can machine learning detect suspicious transactions in real time?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes. The <a href=\"https://seon.io/resources/comparisons/aml-software-tools\" id=\"https://seon.io/resources/comparisons/aml-software-tools\">best AML systems</a> operate in real time, offering the ability to flag suspicious behavior as it happens and trigger immediate actions like transaction holds or verification requests. What sets ML apart is its adaptability; it can process real-time data from various sources, such as payments, devices, or user interactions, as they occur.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457693657","position":4,"url":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457693657","name":"What is the difference between labels and rule-based tags?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Tagging is the flexible, preliminary categorization of transactions (e.g., “high-risk jurisdiction”) used to help triage cases. Labeling is more formal and reflects confirmed outcomes. High-quality labeling provides the verified, structured data that machine learning models need to learn effectively, whereas tags primarily guide initial investigations.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457705238","position":5,"url":"https://seon.io/resources/aml-machine-learning/#faq-question-1753457705238","name":"Is labeling required for AML machine learning models?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, because machine learning can only be as effective as the data it learns from. Without clear, consistent labeling, even advanced AML tools can become blunt instruments, swamping teams with false positives while missing sophisticated laundering techniques. Labeling is the backbone of building a dataset capable of detecting nuanced, emerging threats.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-ecommerce-growth-attracts-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/how-ecommerce-growth-attracts-fraud/"},"author":{"name":"Matt DeLauro","@id":"https://seon.io/#/schema/person/fbe3e4c532f2eadc9b7aa3d133c682a1"},"headline":"Pivot or Partner? When Growth Attracts the Fraudsters","datePublished":"2025-08-04T08:19:07+00:00","dateModified":"2025-11-18T16:00:12+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-ecommerce-growth-attracts-fraud/"},"wordCount":1186,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-ecommerce-growth-attracts-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Pivot-or-Partner_-When-Growth-Attracts-the-Fraudsters-–-Thumbnail-1.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Learn how to stop eCommerce fraud early using proactive prevention to protect your brand and boost customer trust."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-ecommerce-growth-attracts-fraud/","url":"https://seon.io/resources/how-ecommerce-growth-attracts-fraud/","name":"Pivot or Partner? When Growth Attracts the Fraudsters","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-ecommerce-growth-attracts-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Pivot-or-Partner_-When-Growth-Attracts-the-Fraudsters-–-Thumbnail-1.png","datePublished":"2025-08-04T08:19:07+00:00","dateModified":"2025-11-18T16:00:12+00:00","description":"Learn how to stop eCommerce fraud early using proactive prevention to protect your brand and boost customer trust.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-ecommerce-growth-attracts-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/08/Pivot-or-Partner_-When-Growth-Attracts-the-Fraudsters-–-Thumbnail-1.png","contentUrl":"https://seon.io/wp-content/uploads/2025/08/Pivot-or-Partner_-When-Growth-Attracts-the-Fraudsters-–-Thumbnail-1.png","width":833,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-identify-suspicious-financial-activity-key-red-flags/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-identify-suspicious-financial-activity-key-red-flags/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"Identifying Suspicious Activity: 11 Red Flags in Financial Transactions","datePublished":"2025-08-04T09:26:23+00:00","dateModified":"2025-08-04T09:26:26+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-identify-suspicious-financial-activity-key-red-flags/"},"wordCount":953,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-identify-suspicious-financial-activity-key-red-flags/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Identifying-Suspicious-Activity_-11-Red-Flags-in-Financial-Transactions-Thumbnail.png","keywords":["Transaction Monitoring"],"articleSection":["Article"],"inLanguage":"en-US","description":"Identify suspicious activity before it escalates. Discover 11 AML red flags in financial transactions and strengthen your AML defenses."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-to-identify-suspicious-financial-activity-key-red-flags/","url":"https://seon.io/resources/how-to-identify-suspicious-financial-activity-key-red-flags/","name":"Identifying Suspicious Activity: 11 Red Flags To Look Out For","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-identify-suspicious-financial-activity-key-red-flags/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Identifying-Suspicious-Activity_-11-Red-Flags-in-Financial-Transactions-Thumbnail.png","datePublished":"2025-08-04T09:26:23+00:00","dateModified":"2025-08-04T09:26:26+00:00","description":"Identify suspicious activity before it escalates. Discover 11 AML red flags in financial transactions and strengthen your AML defenses.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-identify-suspicious-financial-activity-key-red-flags/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/08/Identifying-Suspicious-Activity_-11-Red-Flags-in-Financial-Transactions-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/08/Identifying-Suspicious-Activity_-11-Red-Flags-in-Financial-Transactions-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/social-casino-compliance-and-fraud-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/social-casino-compliance-and-fraud-prevention/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Social Casinos: Navigating Regulatory Uncertainty &amp; Future-Proofing Fraud Tactics","datePublished":"2025-08-04T07:57:59+00:00","dateModified":"2025-11-21T15:21:06+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/social-casino-compliance-and-fraud-prevention/"},"wordCount":782,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/social-casino-compliance-and-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Social-Casinos_-Navigating-Regulatory-Gray-Areas-Building-a-Future-Proof-Fraud-Prevention-Strategy-social-1.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn the compliance and fraud risks in social casinos - and how to stay ahead with a future-proof strategy."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/social-casino-compliance-and-fraud-prevention/","url":"https://seon.io/resources/social-casino-compliance-and-fraud-prevention/","name":"Social Casinos: Navigating Regulation and Fraud Prevention","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/social-casino-compliance-and-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Social-Casinos_-Navigating-Regulatory-Gray-Areas-Building-a-Future-Proof-Fraud-Prevention-Strategy-social-1.png","datePublished":"2025-08-04T07:57:59+00:00","dateModified":"2025-11-21T15:21:06+00:00","description":"Discover the key compliance risks and fraud threats in the booming social casino market and how to build a future-proof prevention strategy.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/social-casino-compliance-and-fraud-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/08/Social-Casinos_-Navigating-Regulatory-Gray-Areas-Building-a-Future-Proof-Fraud-Prevention-Strategy-social-1.png","contentUrl":"https://seon.io/wp-content/uploads/2025/08/Social-Casinos_-Navigating-Regulatory-Gray-Areas-Building-a-Future-Proof-Fraud-Prevention-Strategy-social-1.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/retail-fraud-pain-points/#article","isPartOf":{"@id":"https://seon.io/resources/retail-fraud-pain-points/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"What Mid-Market Retailers Get Wrong About Fraud","datePublished":"2025-08-15T09:56:41+00:00","dateModified":"2025-11-18T15:59:09+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/retail-fraud-pain-points/"},"wordCount":1236,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/retail-fraud-pain-points/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Retail-Fraud-Pain-Point-Roundup-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"See how mid-market retailers can stop chargebacks, promo abuse, and other fraud threats."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/retail-fraud-pain-points/","url":"https://seon.io/resources/retail-fraud-pain-points/","name":"What Mid-Market Retailers Get Wrong About Fraud","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/retail-fraud-pain-points/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Retail-Fraud-Pain-Point-Roundup-Thumbnail.png","datePublished":"2025-08-15T09:56:41+00:00","dateModified":"2025-11-18T15:59:09+00:00","description":"Discover the fraud pain points mid-market retailers face, from chargebacks to promo abuse, and how to protect revenue and customer trust.","mainEntity":[{"@id":"https://seon.io/resources/retail-fraud-pain-points/#faq-question-1755242850181"},{"@id":"https://seon.io/resources/retail-fraud-pain-points/#faq-question-1755242875876"},{"@id":"https://seon.io/resources/retail-fraud-pain-points/#faq-question-1755242897993"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/retail-fraud-pain-points/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/08/Retail-Fraud-Pain-Point-Roundup-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/08/Retail-Fraud-Pain-Point-Roundup-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/retail-fraud-pain-points/#faq-question-1755242850181","position":1,"url":"https://seon.io/resources/retail-fraud-pain-points/#faq-question-1755242850181","name":"How can mid-market retailers reduce false declines?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Mid-market retailers can reduce false declines by adopting adaptive, real-time fraud detection solutions. Leveraging AI-driven scoring, SEON accurately identifies nuanced fraud patterns, allowing retailers to confidently approve legitimate transactions and minimize customer friction, boosting conversions without increasing risk.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/retail-fraud-pain-points/#faq-question-1755242875876","position":2,"url":"https://seon.io/resources/retail-fraud-pain-points/#faq-question-1755242875876","name":"How can I prevent promo code abuse in my eCommerce store?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Prevent promo code abuse by employing real-time analytics to detect unusual behaviors such as stacked discounts or mass account creations. SEON's device fingerprinting and behavior analytics quickly flag suspicious patterns, enabling you to protect your revenue while maintaining attractive promotions for genuine customers.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/retail-fraud-pain-points/#faq-question-1755242897993","position":3,"url":"https://seon.io/resources/retail-fraud-pain-points/#faq-question-1755242897993","name":"What tools help detect multi-account abuse in promotional campaigns?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Tools like device fingerprinting and digital footprint analysis help detect multi-account abuse. SEON uses unique device hashes and behavioral signals to instantly recognize when multiple accounts originate from the same device, effectively shutting down fraudulent promo code exploitation and preserving your promotional integrity.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/combat-first-party-fraud/#article","isPartOf":{"@id":"https://seon.io/resources/combat-first-party-fraud/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"First-Party Fraud: A Guide to Spotting and Stopping Insider Abuse","datePublished":"2025-08-15T13:23:44+00:00","dateModified":"2025-11-18T15:58:27+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/combat-first-party-fraud/"},"wordCount":1411,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/combat-first-party-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Fraud-is-Not-a-Single-Moment-in-Time_-The-Ongoing-Battle-Against-Digital-Deception\u2028-Website-thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn what first-party fraud is, how to detect and prevent it, and how SEON helps you fight back without losing customer trust."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/combat-first-party-fraud/","url":"https://seon.io/resources/combat-first-party-fraud/","name":"First-Party Fraud: A Guide to Spotting and Stopping Insider Abuse","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/combat-first-party-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Fraud-is-Not-a-Single-Moment-in-Time_-The-Ongoing-Battle-Against-Digital-Deception\u2028-Website-thumbnail.png","datePublished":"2025-08-15T13:23:44+00:00","dateModified":"2025-11-18T15:58:27+00:00","description":"Learn what first-party fraud is, how to detect and prevent it, and how SEON helps you fight back without losing customer trust.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/combat-first-party-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/08/Fraud-is-Not-a-Single-Moment-in-Time_-The-Ongoing-Battle-Against-Digital-Deception\u2028-Website-thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/08/Fraud-is-Not-a-Single-Moment-in-Time_-The-Ongoing-Battle-Against-Digital-Deception\u2028-Website-thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ai-driven-fraud-igaming-insights/#article","isPartOf":{"@id":"https://seon.io/resources/ai-driven-fraud-igaming-insights/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"AI-Driven Fraud in iGaming: Why Operators Must Evolve Faster","datePublished":"2025-08-15T15:25:31+00:00","dateModified":"2026-04-10T09:38:53+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ai-driven-fraud-igaming-insights/"},"wordCount":484,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ai-driven-fraud-igaming-insights/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/iGaming-Fraud_-Why-AI-Driven-Threats-Demand-a-Smarter-Response-social.png","articleSection":["Article"],"inLanguage":"en-US","description":"SEON’s iGB L!VE 2025 survey AI fraud is outpacing iGaming defenses. Learn how real-time prevention stops it without slowing players."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/ai-driven-fraud-igaming-insights/","url":"https://seon.io/resources/ai-driven-fraud-igaming-insights/","name":"AI-Driven Fraud in iGaming: Why Operators Must Evolve Faster","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ai-driven-fraud-igaming-insights/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/iGaming-Fraud_-Why-AI-Driven-Threats-Demand-a-Smarter-Response-social.png","datePublished":"2025-08-15T15:25:31+00:00","dateModified":"2026-04-10T09:38:53+00:00","description":"SEON’s iGB L!VE 2025 survey AI fraud is outpacing iGaming defenses. Learn how real-time prevention stops it without slowing players.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ai-driven-fraud-igaming-insights/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/08/iGaming-Fraud_-Why-AI-Driven-Threats-Demand-a-Smarter-Response-social.png","contentUrl":"https://seon.io/wp-content/uploads/2025/08/iGaming-Fraud_-Why-AI-Driven-Threats-Demand-a-Smarter-Response-social.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-compliance-in-remittance-industry/#article","isPartOf":{"@id":"https://seon.io/resources/aml-compliance-in-remittance-industry/"},"author":{"name":"Jeremy Doyle","@id":"https://seon.io/#/schema/person/36d2cf86a89263b8e8627bf53e6cfe86"},"headline":"Identifying AML Red Flags in the Remittance Industry","datePublished":"2025-08-26T09:55:52+00:00","dateModified":"2026-04-10T09:33:49+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-compliance-in-remittance-industry/"},"wordCount":1374,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-compliance-in-remittance-industry/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","inLanguage":"en-US","description":"AML compliance is critical in the remittance industry. Discover key risks, rules, and how technology enables real-time monitoring and trust."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/aml-compliance-in-remittance-industry/","url":"https://seon.io/resources/aml-compliance-in-remittance-industry/","name":"Identifying AML Red Flags in the Remittance Industry | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-compliance-in-remittance-industry/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","datePublished":"2025-08-26T09:55:52+00:00","dateModified":"2026-04-10T09:33:49+00:00","description":"AML compliance is critical in the remittance industry. Discover key risks, rules, and how technology enables real-time monitoring and trust.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-compliance-in-remittance-industry/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-02-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"How to Detect Fake Players in Online Gaming","datePublished":"2025-08-29T14:06:17+00:00","dateModified":"2025-11-18T15:56:41+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/"},"wordCount":874,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","inLanguage":"en-US","description":"Learn how gaming operators detect fake players with fraud detection, biometrics, and bot detection tools to protect users and revenue."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/","url":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/","name":"How to Detect Fake Players in Online Gaming | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2025-08-29T14:06:17+00:00","dateModified":"2025-11-18T15:56:41+00:00","description":"Learn how gaming operators detect fake players with fraud detection, biometrics, and bot detection tools to protect users and revenue.","mainEntity":[{"@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476125875"},{"@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476137164"},{"@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476147264"},{"@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476158248"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476125875","position":1,"url":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476125875","name":"What are fake players in online gaming?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fake players are accounts created with fraudulent intent, often using bots, stolen IDs or synthetic identities to exploit platforms.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476137164","position":2,"url":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476137164","name":"Why are fake players a problem for gaming platforms?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fake players create financial risks through chargebacks and regulatory scrutiny, but can also ruin fair gameplay by manipulating outcomes. Over time, this frustrates genuine users and causes reputational damage that’s harder to fix than lost revenue.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476147264","position":3,"url":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476147264","name":"How can you tell if a player is fake?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fake players often show unusual patterns, such as multiple accounts from the same device, inconsistent IP locations or accounts with no real digital footprint. Their behavior may also seem unnatural, like rapid-fire actions, scripted moves or systematic bonus abuse.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476158248","position":4,"url":"https://seon.io/resources/how-to-detect-fake-players-in-online-gaming/#faq-question-1756476158248","name":"What tools help detect fake players?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Fraud detection platforms, behavioral biometrics and <a href=\"https://seon.io/resources/comparisons/bot-detection-and-mitigation-software-tools/\">bot detection software</a> help operators spot fake players before they cause harm.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/seons-series-c-80m-to-power-global-momentum-innovation/#article","isPartOf":{"@id":"https://seon.io/resources/seons-series-c-80m-to-power-global-momentum-innovation/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"SEON’s Series C: $80M To Power Global Momentum &amp; Innovation","datePublished":"2025-09-16T09:38:54+00:00","dateModified":"2025-10-24T10:05:12+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/seons-series-c-80m-to-power-global-momentum-innovation/"},"wordCount":335,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/seons-series-c-80m-to-power-global-momentum-innovation/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/09/SEONS-Series-C_-80M-To-Power-Global-Momentum-Innovation-Thumbnail.png","articleSection":["Corporate"],"inLanguage":"en-US","description":"SEON raises $80M in Series C funding led by Sixth Street to expand its global fraud prevention and AML compliance platform."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/seons-series-c-80m-to-power-global-momentum-innovation/","url":"https://seon.io/resources/seons-series-c-80m-to-power-global-momentum-innovation/","name":"SEON Raises $80M Series C to Advance Global Fraud Prevention","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/seons-series-c-80m-to-power-global-momentum-innovation/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/09/SEONS-Series-C_-80M-To-Power-Global-Momentum-Innovation-Thumbnail.png","datePublished":"2025-09-16T09:38:54+00:00","dateModified":"2025-10-24T10:05:12+00:00","description":"SEON raises $80M in Series C funding led by Sixth Street to expand its global fraud prevention and AML compliance platform.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/seons-series-c-80m-to-power-global-momentum-innovation/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/09/SEONS-Series-C_-80M-To-Power-Global-Momentum-Innovation-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/09/SEONS-Series-C_-80M-To-Power-Global-Momentum-Innovation-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/unmask-fraud-risk-with-first-party-data/#article","isPartOf":{"@id":"https://seon.io/resources/unmask-fraud-risk-with-first-party-data/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Unmask Fraud &amp; Risk with First-Party Risk Data to Reveal Context","datePublished":"2025-09-15T15:58:33+00:00","dateModified":"2025-10-17T10:56:28+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/unmask-fraud-risk-with-first-party-data/"},"wordCount":1476,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/unmask-fraud-risk-with-first-party-data/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"See how SEON’s first-party fraud risk data provides real-time context and depth to power accurate, explainable decisions at scale."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/unmask-fraud-risk-with-first-party-data/","url":"https://seon.io/resources/unmask-fraud-risk-with-first-party-data/","name":"First-Party Fraud Risk Data & Contextual Intelligence | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/unmask-fraud-risk-with-first-party-data/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","datePublished":"2025-09-15T15:58:33+00:00","dateModified":"2025-10-17T10:56:28+00:00","description":"Discover how SEON’s first-party fraud risk data delivers real-time context, depth, and breadth to power accurate, explainable decisions at scale.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/unmask-fraud-risk-with-first-party-data/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/crypto-casinos-regulatory-gap/#article","isPartOf":{"@id":"https://seon.io/resources/crypto-casinos-regulatory-gap/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Crypto Casinos Are an Unregulated Threat Reshaping Digital Gambling","datePublished":"2025-09-22T07:27:17+00:00","dateModified":"2025-11-18T15:55:39+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/crypto-casinos-regulatory-gap/"},"wordCount":820,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/crypto-casinos-regulatory-gap/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/09/tn-article-08-light-768x432-1.png","articleSection":["Article"],"inLanguage":"en-US","description":"Discover how crypto casinos are transforming gambling, with rapid growth and new global risks."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/crypto-casinos-regulatory-gap/","url":"https://seon.io/resources/crypto-casinos-regulatory-gap/","name":"Crypto Casinos: Unregulated Threat to Digital Gambling | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/crypto-casinos-regulatory-gap/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/09/tn-article-08-light-768x432-1.png","datePublished":"2025-09-22T07:27:17+00:00","dateModified":"2025-11-18T15:55:39+00:00","description":"Learn how crypto casinos are reshaping digital gambling. Rapid growth and regulatory gray areas are creating new risks for players worldwide.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/crypto-casinos-regulatory-gap/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/09/tn-article-08-light-768x432-1.png","contentUrl":"https://seon.io/wp-content/uploads/2025/09/tn-article-08-light-768x432-1.png","width":768,"height":432}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ai-risk-engine-for-fraud-aml/#article","isPartOf":{"@id":"https://seon.io/resources/ai-risk-engine-for-fraud-aml/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"How to Build an Unbeatable AI-Powered Fraud &amp; AML Risk Engine","datePublished":"2025-09-29T06:41:44+00:00","dateModified":"2025-11-18T15:54:47+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ai-risk-engine-for-fraud-aml/"},"wordCount":1564,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ai-risk-engine-for-fraud-aml/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/09/Understanding-AI-Risk-Engines_-What-Makes-the-Best-Systems-for-Fraud-and-AML-Work-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"See how AI risk engines fight fraud and AML with real-time signals and feedback loops to outpace evolving threats."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/ai-risk-engine-for-fraud-aml/","url":"https://seon.io/resources/ai-risk-engine-for-fraud-aml/","name":"AI Risk Engines: What Makes the Best Systems for Fraud & AML","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ai-risk-engine-for-fraud-aml/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/09/Understanding-AI-Risk-Engines_-What-Makes-the-Best-Systems-for-Fraud-and-AML-Work-Thumbnail.png","datePublished":"2025-09-29T06:41:44+00:00","dateModified":"2025-11-18T15:54:47+00:00","description":"Discover how AI risk engines stop fraud and AML faster. From real-time signals to feedback loops, learn how to outpace fraud and AML threats.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ai-risk-engine-for-fraud-aml/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/09/Understanding-AI-Risk-Engines_-What-Makes-the-Best-Systems-for-Fraud-and-AML-Work-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/09/Understanding-AI-Risk-Engines_-What-Makes-the-Best-Systems-for-Fraud-and-AML-Work-Thumbnail.png","width":832,"height":469}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ai-fraud-risk-horizontal-intelligence/#article","isPartOf":{"@id":"https://seon.io/resources/ai-fraud-risk-horizontal-intelligence/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Why AI-Centric Fraud &amp; Risk Teams Will Build Horizontal Intelligence","datePublished":"2025-10-02T19:18:25+00:00","dateModified":"2025-11-25T09:29:57+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ai-fraud-risk-horizontal-intelligence/"},"wordCount":946,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ai-fraud-risk-horizontal-intelligence/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/Why-AI-Centric-Fraud-Risk-Teams-Will-Build-Horizontal-Intelligence-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"How AI-led fraud and risk teams unify defenses with horizontal intelligence to outpace modern financial crime."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/ai-fraud-risk-horizontal-intelligence/","url":"https://seon.io/resources/ai-fraud-risk-horizontal-intelligence/","name":"Why AI-Centric Fraud & Risk Teams Build Horizontal Intelligence","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ai-fraud-risk-horizontal-intelligence/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/Why-AI-Centric-Fraud-Risk-Teams-Will-Build-Horizontal-Intelligence-Thumbnail.png","datePublished":"2025-10-02T19:18:25+00:00","dateModified":"2025-11-25T09:29:57+00:00","description":"Discover how AI-driven fraud and risk teams use horizontal intelligence to break silos, detect complex threats, and unify fraud and AML defenses.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ai-fraud-risk-horizontal-intelligence/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/10/Why-AI-Centric-Fraud-Risk-Teams-Will-Build-Horizontal-Intelligence-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/10/Why-AI-Centric-Fraud-Risk-Teams-Will-Build-Horizontal-Intelligence-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/anti-fraud-registration-systems-online-casinos/#article","isPartOf":{"@id":"https://seon.io/resources/anti-fraud-registration-systems-online-casinos/"},"author":{"name":"Agnes Csoka","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6"},"headline":"Anti-Fraud Registration Systems for Online Casinos: How They Work","datePublished":"2025-10-08T16:54:49+00:00","dateModified":"2025-10-08T16:59:16+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/anti-fraud-registration-systems-online-casinos/"},"wordCount":1305,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/anti-fraud-registration-systems-online-casinos/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how anti-fraud registration systems help online casinos stop fake users, prevent bonus abuse, and stay compliant from signup."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/anti-fraud-registration-systems-online-casinos/","url":"https://seon.io/resources/anti-fraud-registration-systems-online-casinos/","name":"How Anti-Fraud Registration Systems Protect Online Casinos","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/anti-fraud-registration-systems-online-casinos/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","datePublished":"2025-10-08T16:54:49+00:00","dateModified":"2025-10-08T16:59:16+00:00","description":"Learn how anti-fraud registration systems help online casinos stop fake users, prevent bonus abuse, and stay compliant from signup.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/anti-fraud-registration-systems-online-casinos/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-05-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/risk-signals-power-better-product-experience/#article","isPartOf":{"@id":"https://seon.io/resources/risk-signals-power-better-product-experience/"},"author":{"name":"Husnain Bajwa","@id":"https://seon.io/#/schema/person/05d1abd4f2ffc6315998adb05ea63842"},"headline":"How The Right Risk Signals Power A Better Product Experience","datePublished":"2025-10-10T13:09:08+00:00","dateModified":"2025-11-18T15:45:44+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/risk-signals-power-better-product-experience/"},"wordCount":838,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/risk-signals-power-better-product-experience/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/How-The-Right-Risk-Signals-Power-A-Better-Product-Experience-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Learn how first-party, real-time risk signals help companies cut fraud, reduce friction, and make confident product and compliance decisions."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/risk-signals-power-better-product-experience/","url":"https://seon.io/resources/risk-signals-power-better-product-experience/","name":"How The Right Risk Signals Power A Better Product Experience","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/risk-signals-power-better-product-experience/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/How-The-Right-Risk-Signals-Power-A-Better-Product-Experience-Thumbnail.png","datePublished":"2025-10-10T13:09:08+00:00","dateModified":"2025-11-18T15:45:44+00:00","description":"Learn how first-party, real-time risk signals help companies cut fraud, reduce friction, and make confident product and compliance decisions.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/risk-signals-power-better-product-experience/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/10/How-The-Right-Risk-Signals-Power-A-Better-Product-Experience-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/10/How-The-Right-Risk-Signals-Power-A-Better-Product-Experience-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/human-in-the-loop-fraud-detection-and-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/human-in-the-loop-fraud-detection-and-prevention/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Human-in-the-Loop Fraud Prevention: Why Analyst-AI Collaboration Matters","datePublished":"2025-10-10T13:09:47+00:00","dateModified":"2026-04-14T10:10:16+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/human-in-the-loop-fraud-detection-and-prevention/"},"wordCount":1049,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/human-in-the-loop-fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/The-Rise-of-Human-in-the-Loop-Fraud-Prevention_-Why-Analyst-AI-Collaboration-Matters-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Discover how human-in-the-loop fraud detection and prevention empower analysts, speed investigations, and ensure transparent, explainable risk decisions."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/human-in-the-loop-fraud-detection-and-prevention/","url":"https://seon.io/resources/human-in-the-loop-fraud-detection-and-prevention/","name":"Human-in-the-Loop Fraud Prevention | Analyst-AI Collaboration","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/human-in-the-loop-fraud-detection-and-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/The-Rise-of-Human-in-the-Loop-Fraud-Prevention_-Why-Analyst-AI-Collaboration-Matters-Thumbnail.png","datePublished":"2025-10-10T13:09:47+00:00","dateModified":"2026-04-14T10:10:16+00:00","description":"Discover how human-in-the-loop fraud detection and prevention empower analysts, speed investigations, and ensure transparent, explainable risk decisions.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/human-in-the-loop-fraud-detection-and-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/10/The-Rise-of-Human-in-the-Loop-Fraud-Prevention_-Why-Analyst-AI-Collaboration-Matters-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/10/The-Rise-of-Human-in-the-Loop-Fraud-Prevention_-Why-Analyst-AI-Collaboration-Matters-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/"},"author":{"name":"Agnes Csoka","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6"},"headline":"What Is Real-Time Risk Data and How It Prevents Fraud","datePublished":"2025-10-13T10:37:17+00:00","dateModified":"2025-10-29T14:39:15+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/"},"wordCount":1598,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"Discover how real-time risk data helps detect fraud faster, balance security with user experience, and drive smarter decisions."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/","url":"https://seon.io/resources/real-time-risk-data-fraud-prevention/","name":"What Is Real-Time Risk Data and How It Prevents Fraud","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","datePublished":"2025-10-13T10:37:17+00:00","dateModified":"2025-10-29T14:39:15+00:00","description":"Discover how real-time risk data helps businesses detect fraud earlier, balance security with user experience, and make faster, data-driven decisions.","mainEntity":[{"@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350676829"},{"@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350708376"},{"@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350718865"},{"@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350770099"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350676829","position":1,"url":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350676829","name":"What kinds of risk signals are most effective in real time?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"<a href=\"https://seon.io/resources/device-fingerprinting/\">Device fingerprinting</a>, <a href=\"https://seon.io/resources/ip-fraud-score/\">IP fraud scoring</a>, velocity rules and digital footprint checks are especially powerful when combined.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350708376","position":2,"url":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350708376","name":"How do real-time signals reduce false positives?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Real-time signals add context to customer interactions. A flagged IP may look risky, but if the user has a long-standing digital presence, they’re less likely to be fraudulent.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350718865","position":3,"url":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350718865","name":"Can iGaming platforms use the same signals as payments / eCommerce?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, the same real-time risk signals that protect payments and eCommerce also apply to iGaming. The difference is in emphasis: iGaming platforms often focus more on detecting multi-accounting, while payments and eCommerce lean heavily on transaction monitoring. In practice, the core signals remain the same, it’s how they’re weighted and combined that makes them fit each industry.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350770099","position":4,"url":"https://seon.io/resources/real-time-risk-data-fraud-prevention/#faq-question-1760350770099","name":"What is the difference between behavioral analytics and device signals?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Behavioral signals show <em>how</em> users interact with a platform, while device signals show what the devices they use","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/explainable-ai-in-fraud-and-compliance/#article","isPartOf":{"@id":"https://seon.io/resources/explainable-ai-in-fraud-and-compliance/"},"author":{"name":"Tamas Kadar","@id":"https://seon.io/#/schema/person/d5d05fc06f6a1139fdd93eb202717405"},"headline":"Explainable AI for Trusted Fraud &amp; Compliance Decisions","datePublished":"2025-10-17T06:55:19+00:00","dateModified":"2025-10-22T08:44:01+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/explainable-ai-in-fraud-and-compliance/"},"wordCount":747,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/explainable-ai-in-fraud-and-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/Augment-Dont-Abstract_-Explainable-AI-for-Trusted-Fraud-Compliance-Decisions-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Discover why explainable AI in fraud and compliance builds trust, meets regulatory demands, and powers audit-ready risk management decisions."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/explainable-ai-in-fraud-and-compliance/","url":"https://seon.io/resources/explainable-ai-in-fraud-and-compliance/","name":"Explainable AI in Fraud & Compliance Decisions | SEON Insights","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/explainable-ai-in-fraud-and-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/Augment-Dont-Abstract_-Explainable-AI-for-Trusted-Fraud-Compliance-Decisions-Thumbnail.png","datePublished":"2025-10-17T06:55:19+00:00","dateModified":"2025-10-22T08:44:01+00:00","description":"Discover why explainable AI in fraud and compliance builds trust, meets regulatory demands, and powers audit-ready risk management decisions.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/explainable-ai-in-fraud-and-compliance/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/10/Augment-Dont-Abstract_-Explainable-AI-for-Trusted-Fraud-Compliance-Decisions-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/10/Augment-Dont-Abstract_-Explainable-AI-for-Trusted-Fraud-Compliance-Decisions-Thumbnail.png","width":833,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-and-compliance-convergence-in-payments/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-and-compliance-convergence-in-payments/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"The Fraud &amp; Compliance Convergence in Payments: How Risk Teams Stay Ahead","datePublished":"2025-10-28T07:59:52+00:00","dateModified":"2026-03-05T10:59:54+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-and-compliance-convergence-in-payments/"},"wordCount":1298,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-and-compliance-convergence-in-payments/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/The-Fraud-Compliance-Convergence-in-Payments_-How-Risk-Teams-Stay-Ahead-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn why convergence between fraud prevention and AML compliance is reshaping payments, reducing silos, and improving detection accuracy."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fraud-and-compliance-convergence-in-payments/","url":"https://seon.io/resources/fraud-and-compliance-convergence-in-payments/","name":"The Fraud & Compliance Convergence in Payments","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-and-compliance-convergence-in-payments/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/The-Fraud-Compliance-Convergence-in-Payments_-How-Risk-Teams-Stay-Ahead-Thumbnail.png","datePublished":"2025-10-28T07:59:52+00:00","dateModified":"2026-03-05T10:59:54+00:00","description":"Learn why convergence between fraud prevention and AML compliance is reshaping payments, reducing silos, and improving detection accuracy.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-and-compliance-convergence-in-payments/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/10/The-Fraud-Compliance-Convergence-in-Payments_-How-Risk-Teams-Stay-Ahead-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/10/The-Fraud-Compliance-Convergence-in-Payments_-How-Risk-Teams-Stay-Ahead-Thumbnail.png","width":833,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-rules-for-payments-companies/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-rules-for-payments-companies/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Fraud Rules for Payments: Baseline &amp; Transaction-Level Protections","datePublished":"2025-10-31T13:07:37+00:00","dateModified":"2025-11-18T15:49:53+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-rules-for-payments-companies/"},"wordCount":832,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-rules-for-payments-companies/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/Top-Fraud-Rules-for-Payments-Companies_-Baseline-Transaction-Level-Protections-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"Discover how top PSPs build baseline and transaction rules to detect fraud in milliseconds and protect digital payment trust."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fraud-rules-for-payments-companies/","url":"https://seon.io/resources/fraud-rules-for-payments-companies/","name":"How Payments Companies Build Smarter Fraud Rules","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-rules-for-payments-companies/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/10/Top-Fraud-Rules-for-Payments-Companies_-Baseline-Transaction-Level-Protections-Thumbnail.png","datePublished":"2025-10-31T13:07:37+00:00","dateModified":"2025-11-18T15:49:53+00:00","description":"Discover how top PSPs build baseline and transaction rules to detect fraud in milliseconds and protect digital payment trust.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-rules-for-payments-companies/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/10/Top-Fraud-Rules-for-Payments-Companies_-Baseline-Transaction-Level-Protections-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/10/Top-Fraud-Rules-for-Payments-Companies_-Baseline-Transaction-Level-Protections-Thumbnail.png","width":833,"height":469}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/aml-program-that-adapts-to-risk/#article","isPartOf":{"@id":"https://seon.io/resources/aml-program-that-adapts-to-risk/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"How to Build an AML Compliance Program that Adapts as Fast as Risk Does","datePublished":"2025-11-10T16:08:14+00:00","dateModified":"2025-11-26T11:45:06+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/aml-program-that-adapts-to-risk/"},"wordCount":1407,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/aml-program-that-adapts-to-risk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/11/How-to-Build-an-AML-Compliance-Program-that-Adapts-as-Fast-as-Risk-Does-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Discover how to build an AML program that adapts quickly with flexible screening and real-time monitoring."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/aml-program-that-adapts-to-risk/","url":"https://seon.io/resources/aml-program-that-adapts-to-risk/","name":"How to Build an AML Program that Adapts as Fast as Risk Does","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/aml-program-that-adapts-to-risk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/11/How-to-Build-an-AML-Compliance-Program-that-Adapts-as-Fast-as-Risk-Does-Thumbnail.png","datePublished":"2025-11-10T16:08:14+00:00","dateModified":"2025-11-26T11:45:06+00:00","description":"Discover how to design an AML program that adapts fast to new risks and rules with flexible screening and real-time monitoring.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/aml-program-that-adapts-to-risk/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/11/How-to-Build-an-AML-Compliance-Program-that-Adapts-as-Fast-as-Risk-Does-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/11/How-to-Build-an-AML-Compliance-Program-that-Adapts-as-Fast-as-Risk-Does-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/managing-real-time-payments-risk/#article","isPartOf":{"@id":"https://seon.io/resources/managing-real-time-payments-risk/"},"author":{"name":"Husnain Bajwa","@id":"https://seon.io/#/schema/person/05d1abd4f2ffc6315998adb05ea63842"},"headline":"Managing Real-Time Payments Risk: Strategies from High-Growth Payments Companies","datePublished":"2025-11-14T09:27:11+00:00","dateModified":"2025-11-18T15:49:07+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/managing-real-time-payments-risk/"},"wordCount":890,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/managing-real-time-payments-risk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/11/Managing-Real-Time-Payments-Risk_-Strategies-from-High-Growth-Payments-Companies-social.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Discover how high-growth payments companies manage real-time payments through faster decisions, better signals and scalable automation."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/managing-real-time-payments-risk/","url":"https://seon.io/resources/managing-real-time-payments-risk/","name":"Managing Real-Time Payments Risk: Strategies from Top Firms","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/managing-real-time-payments-risk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/11/Managing-Real-Time-Payments-Risk_-Strategies-from-High-Growth-Payments-Companies-social.png","datePublished":"2025-11-14T09:27:11+00:00","dateModified":"2025-11-18T15:49:07+00:00","description":"Discover how high-growth payments companies manage real-time payments through faster decisions, better signals, and scalable automation.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/managing-real-time-payments-risk/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/11/Managing-Real-Time-Payments-Risk_-Strategies-from-High-Growth-Payments-Companies-social.png","contentUrl":"https://seon.io/wp-content/uploads/2025/11/Managing-Real-Time-Payments-Risk_-Strategies-from-High-Growth-Payments-Companies-social.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/dynamic-kyc-orchestration-vip-onboarding/#article","isPartOf":{"@id":"https://seon.io/resources/dynamic-kyc-orchestration-vip-onboarding/"},"author":{"name":"Mira Sidhu","@id":"https://seon.io/#/schema/person/48b09375f19aad4196e49bfa2265b1aa"},"headline":"KYC Orchestration: Why VIP Onboarding Should Frustrate Fraudsters","datePublished":"2025-11-28T12:44:11+00:00","dateModified":"2026-04-10T10:22:08+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/dynamic-kyc-orchestration-vip-onboarding/"},"wordCount":939,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/dynamic-kyc-orchestration-vip-onboarding/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/11/Why-VIP-Onboarding-Should-Frustrate-Fraudsters\u2028–-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Dynamic KYC orchestration and signal-based verification help you fast-track genuine users, cut fraud, and streamline VIP onboarding."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dynamic-kyc-orchestration-vip-onboarding/","url":"https://seon.io/resources/dynamic-kyc-orchestration-vip-onboarding/","name":"How Dynamic KYC Orchestration Redefines VIP Onboarding","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dynamic-kyc-orchestration-vip-onboarding/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/11/Why-VIP-Onboarding-Should-Frustrate-Fraudsters\u2028–-Thumbnail.png","datePublished":"2025-11-28T12:44:11+00:00","dateModified":"2026-04-10T10:22:08+00:00","description":"Dynamic KYC orchestration and signal-based identity verification let you fast-track genuine users, cut fraud, and turn VIP onboarding into an advantage.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dynamic-kyc-orchestration-vip-onboarding/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/11/Why-VIP-Onboarding-Should-Frustrate-Fraudsters\u2028–-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/11/Why-VIP-Onboarding-Should-Frustrate-Fraudsters\u2028–-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/48b09375f19aad4196e49bfa2265b1aa","name":"Mira Sidhu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2025/06/cropped-Mira-Sidhu-96x96.jpg","url":"https://seon.io/wp-content/uploads/2025/06/cropped-Mira-Sidhu-96x96.jpg","contentUrl":"https://seon.io/wp-content/uploads/2025/06/cropped-Mira-Sidhu-96x96.jpg","caption":"Mira Sidhu"},"description":"Mira Sidhu is Director of Growth for Compliance Solutions at SEON, leading initiatives in customer acquisition, market expansion, and fraud prevention. She specializes in integrating KYC and identity verification into enterprise systems, balancing compliance, legal, and tech needs. With 9+ years in SaaS sales, she’s driven growth at Veriff, Equiniti, and Jumio. Mira excels in global projects across digital channels like e-discovery, KYC, AML, and compliance software. She holds an LLB (Hons) in Law and a CIPD Level 7.","sameAs":["https://www.linkedin.com/in/mira-s-1a838b3b/"],"knowsAbout":["Identity Verification"],"jobTitle":"Director of Growth, Compliance Solutions (IDV)","url":"https://seon.io/resources/author/mirasidhu/"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/what-is-liveness-detection/#article","isPartOf":{"@id":"https://seon.io/resources/what-is-liveness-detection/"},"author":{"name":"Agnes Csoka","@id":"https://seon.io/#/schema/person/dd15367dce347e51c23be4eab0e6ede6"},"headline":"What Is Liveness Detection? How It Helps Fraud Prevention","datePublished":"2025-12-01T11:13:49+00:00","dateModified":"2026-03-13T15:05:33+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/what-is-liveness-detection/"},"wordCount":843,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/what-is-liveness-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/12/What-Is-Liveness-Detection_-How-It-Helps-Fraud-Prevention-Thumbnail.png","inLanguage":"en-US","description":"See how liveness detection stops deepfakes and spoofing and strengthens modern identity verification."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/what-is-liveness-detection/","url":"https://seon.io/resources/what-is-liveness-detection/","name":"What Is Liveness Detection? How It Helps Fraud Prevention","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/what-is-liveness-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/12/What-Is-Liveness-Detection_-How-It-Helps-Fraud-Prevention-Thumbnail.png","datePublished":"2025-12-01T11:13:49+00:00","dateModified":"2026-03-13T15:05:33+00:00","description":"Liveness detection stops deepfakes and spoofing by confirming real human presence. Learn how it strengthens identity verification and fraud prevention.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/what-is-liveness-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/12/What-Is-Liveness-Detection_-How-It-Helps-Fraud-Prevention-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/12/What-Is-Liveness-Detection_-How-It-Helps-Fraud-Prevention-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/hidden-risks-in-remote-hiring-fraud-patterns/#article","isPartOf":{"@id":"https://seon.io/resources/hidden-risks-in-remote-hiring-fraud-patterns/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Hidden Risks in Remote Hiring: Emerging Fraud Patterns &amp; How to Detect Them","datePublished":"2025-12-02T09:25:38+00:00","dateModified":"2025-12-04T15:22:51+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/hidden-risks-in-remote-hiring-fraud-patterns/"},"wordCount":837,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/hidden-risks-in-remote-hiring-fraud-patterns/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Pivot-or-Partner_-When-Growth-Attracts-the-Fraudsters-–-Thumbnail-1.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Learn how remote hiring fraud is evolving, and how to spot deepfakes, impersonation, and payroll diversion with monitoring."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/hidden-risks-in-remote-hiring-fraud-patterns/","url":"https://seon.io/resources/hidden-risks-in-remote-hiring-fraud-patterns/","name":"Risks in Remote Hiring: Emerging Fraud Patterns & How to Detect Them","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/hidden-risks-in-remote-hiring-fraud-patterns/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/08/Pivot-or-Partner_-When-Growth-Attracts-the-Fraudsters-–-Thumbnail-1.png","datePublished":"2025-12-02T09:25:38+00:00","dateModified":"2025-12-04T15:22:51+00:00","description":"Learn how remote hiring fraud is evolving, and how to detect impersonation, deepfake interviews, and payroll diversion with continuous monitoring.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/hidden-risks-in-remote-hiring-fraud-patterns/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/08/Pivot-or-Partner_-When-Growth-Attracts-the-Fraudsters-–-Thumbnail-1.png","contentUrl":"https://seon.io/wp-content/uploads/2025/08/Pivot-or-Partner_-When-Growth-Attracts-the-Fraudsters-–-Thumbnail-1.png","width":833,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-spot-deepfakes-fraud-detection/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-spot-deepfakes-fraud-detection/"},"author":{"name":"Mira Sidhu","@id":"https://seon.io/#/schema/person/48b09375f19aad4196e49bfa2265b1aa"},"headline":"How to Instantly Spot a Deepfake (Hint: They Don’t Have a Digital Past)","datePublished":"2025-12-03T10:37:14+00:00","dateModified":"2025-12-24T11:45:48+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-spot-deepfakes-fraud-detection/"},"wordCount":989,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-spot-deepfakes-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/12/How-to-Instantly-Spot-a-Deepfake-Hint_-They-Dont-Have-a-Digital-Past-social.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Learn how to spot deepfakes using pre-KYC risk signals plus device, IP, and risk-based IDV."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-to-spot-deepfakes-fraud-detection/","url":"https://seon.io/resources/how-to-spot-deepfakes-fraud-detection/","name":"How to Spot Deepfakes: Deepfake Fraud Detection Guide","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-spot-deepfakes-fraud-detection/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/12/How-to-Instantly-Spot-a-Deepfake-Hint_-They-Dont-Have-a-Digital-Past-social.png","datePublished":"2025-12-03T10:37:14+00:00","dateModified":"2025-12-24T11:45:48+00:00","description":"Learn how to spot deepfakes with pre-KYC risk signals, device and IP intelligence, and risk-based IDV to block deepfake fraud early.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-spot-deepfakes-fraud-detection/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/12/How-to-Instantly-Spot-a-Deepfake-Hint_-They-Dont-Have-a-Digital-Past-social.png","contentUrl":"https://seon.io/wp-content/uploads/2025/12/How-to-Instantly-Spot-a-Deepfake-Hint_-They-Dont-Have-a-Digital-Past-social.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/lessons-from-brazil-pix-incident/#article","isPartOf":{"@id":"https://seon.io/resources/lessons-from-brazil-pix-incident/"},"author":{"name":"Husnain Bajwa","@id":"https://seon.io/#/schema/person/05d1abd4f2ffc6315998adb05ea63842"},"headline":"Real-Time Payments, Real-Time Risk: Lessons From Brazil’s PIX Incident","datePublished":"2025-12-05T15:01:48+00:00","dateModified":"2025-12-24T11:44:20+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/lessons-from-brazil-pix-incident/"},"wordCount":886,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/lessons-from-brazil-pix-incident/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"Learn how the PIX incident exposed gaps in visibility and why dynamic, context-aware risk evaluation is the key to prevention."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/lessons-from-brazil-pix-incident/","url":"https://seon.io/resources/lessons-from-brazil-pix-incident/","name":"Brazil PIX Incident: Real-Time Payment Fraud Lessons","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/lessons-from-brazil-pix-incident/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2025-12-05T15:01:48+00:00","dateModified":"2025-12-24T11:44:20+00:00","description":"Learn how the PIX incident exposed gaps in visibility and why dynamic, context-aware risk evaluation is the key to prevention.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/lessons-from-brazil-pix-incident/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/is-your-identity-verification-program-behind/#article","isPartOf":{"@id":"https://seon.io/resources/is-your-identity-verification-program-behind/"},"author":{"name":"Mira Sidhu","@id":"https://seon.io/#/schema/person/48b09375f19aad4196e49bfa2265b1aa"},"headline":"If Your Identity Verification Program Starts with a Document Check, You&#8217;re Already Behind","datePublished":"2025-12-05T15:02:55+00:00","dateModified":"2026-02-19T14:22:19+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/is-your-identity-verification-program-behind/"},"wordCount":1057,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/is-your-identity-verification-program-behind/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/12/If-Your-Identity-Verification-Program-Starts-with-a-Document-Check-Youre-Already-Behind-Thumbnail.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"See why document-first ID verification creates blind spots, and why real verification starts with context, not a scan."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/is-your-identity-verification-program-behind/","url":"https://seon.io/resources/is-your-identity-verification-program-behind/","name":"Is Your Identity Verification Program Already Behind? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/is-your-identity-verification-program-behind/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/12/If-Your-Identity-Verification-Program-Starts-with-a-Document-Check-Youre-Already-Behind-Thumbnail.png","datePublished":"2025-12-05T15:02:55+00:00","dateModified":"2026-02-19T14:22:19+00:00","description":"See why a document-first identity verification program creates a blind spot, and why real verification starts with context, not a scan.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/is-your-identity-verification-program-behind/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/12/If-Your-Identity-Verification-Program-Starts-with-a-Document-Check-Youre-Already-Behind-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/12/If-Your-Identity-Verification-Program-Starts-with-a-Document-Check-Youre-Already-Behind-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/how-to-prevent-account-takeover-brazil-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/how-to-prevent-account-takeover-brazil-igaming/"},"author":{"name":"Oliver Bognar","@id":"https://seon.io/#/schema/person/b5461bcf75829644bd246becc5637c20"},"headline":"How Brazil iGaming Operators Can Prevent Account Takeovers with Login &amp; Activity Monitoring","datePublished":"2025-12-05T11:13:37+00:00","dateModified":"2026-04-14T12:38:39+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/how-to-prevent-account-takeover-brazil-igaming/"},"wordCount":1056,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/how-to-prevent-account-takeover-brazil-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how login and activity monitoring reduce account takeover risk in Brazil’s iGaming market."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/how-to-prevent-account-takeover-brazil-igaming/","url":"https://seon.io/resources/how-to-prevent-account-takeover-brazil-igaming/","name":"How Brazil iGaming Operators Can Reduce Account Takeover Risk","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/how-to-prevent-account-takeover-brazil-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","datePublished":"2025-12-05T11:13:37+00:00","dateModified":"2026-04-14T12:38:39+00:00","description":"Learn how login and activity monitoring can reduce account takeover risk in Brazil’s iGaming market, using device, network, and behavior signals.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/how-to-prevent-account-takeover-brazil-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-04-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#article","isPartOf":{"@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/"},"author":{"name":"Bence Jendruszak","@id":"https://seon.io/#/schema/person/5d5e811c505791d5d00756468c797f4d"},"headline":"Shopify Fraud Prevention: Top Apps to Protect Your Store","datePublished":"2025-12-09T12:16:22+00:00","dateModified":"2025-12-22T16:46:37+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/"},"wordCount":1532,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"What is Shopify fraud and how do you prevent it? See top apps to reduce chargebacks, stop ATO, and approve more good orders."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/","url":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/","name":"Shopify Fraud Prevention: Top Apps to Protect Your Store","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","datePublished":"2025-12-09T12:16:22+00:00","dateModified":"2025-12-22T16:46:37+00:00","description":"What is Shopify fraud and how do you prevent it? See top apps to reduce chargebacks, stop ATO, and approve more good orders.","mainEntity":[{"@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#faq-question-1651054143772"},{"@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#faq-question-1635761374011"},{"@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#faq-question-1635761400963"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#faq-question-1651054143772","position":1,"url":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#faq-question-1651054143772","name":"How does Shopify protect against fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Shopify has its own fraud prevention service, which you can download for free in the app store. It offers basic chargeback prevention based on the company's internal knowledge. However, it offers no flexibility or transparency. You may find some of your orders are blocked with no explanation, which is why third-party fraud prevention tools are highly recommended. ","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#faq-question-1635761374011","position":2,"url":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#faq-question-1635761374011","name":"Is the Shopify Fraud Protect App right for my business?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"If your business is looking for a secure anti-fraud solution that will remove most cases of fraud, then yes. However, to maximize profits, it is recommended to look at other options that will minimize the risk of false positives, enabling you to safely sell to more people.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#faq-question-1635761400963","position":3,"url":"https://seon.io/resources/shopify-fraud-prevention-to-protect-your-store/#faq-question-1635761400963","name":"What types of chargebacks am I protected against?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"This depends on your choice of solution. Companies offering a chargeback guarantee cover the costs. However, this can entail a conflict of interest, as it is in these anti-fraud companies' interest to play it safer in order to minimize costs. Alternative solutions will look to spot potential fraudsters before the transaction is completed.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/brazil-igaming-compliance-tools-buyers-guide/#article","isPartOf":{"@id":"https://seon.io/resources/brazil-igaming-compliance-tools-buyers-guide/"},"author":{"name":"Husnain Bajwa","@id":"https://seon.io/#/schema/person/05d1abd4f2ffc6315998adb05ea63842"},"headline":"Buyer’s Guide: Essential Features to Look For in Brazil iGaming Compliance Tools","datePublished":"2025-12-11T09:52:14+00:00","dateModified":"2025-12-11T11:24:16+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/brazil-igaming-compliance-tools-buyers-guide/"},"wordCount":910,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/brazil-igaming-compliance-tools-buyers-guide/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/12/Buyers-Guide_-Essential-Features-to-Look-For-in-Brazil-iGaming-Compliance-Tools\u2028–-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"Key fraud, AML, CPF and geolocation tools Brazil iGaming operators need to meet SPA rules, reduce risk and stay audit-ready."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/brazil-igaming-compliance-tools-buyers-guide/","url":"https://seon.io/resources/brazil-igaming-compliance-tools-buyers-guide/","name":"Buyer’s Guide to Brazil iGaming Compliance Tools & Features","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/brazil-igaming-compliance-tools-buyers-guide/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2025/12/Buyers-Guide_-Essential-Features-to-Look-For-in-Brazil-iGaming-Compliance-Tools\u2028–-Thumbnail.png","datePublished":"2025-12-11T09:52:14+00:00","dateModified":"2025-12-11T11:24:16+00:00","description":"Learn which fraud, AML, CPF and geolocation features Brazil iGaming operators need to meet SPA rules, cut risk and stay audit-ready at scale.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/brazil-igaming-compliance-tools-buyers-guide/#primaryimage","url":"https://seon.io/wp-content/uploads/2025/12/Buyers-Guide_-Essential-Features-to-Look-For-in-Brazil-iGaming-Compliance-Tools\u2028–-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2025/12/Buyers-Guide_-Essential-Features-to-Look-For-in-Brazil-iGaming-Compliance-Tools\u2028–-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/quick-service-restaurants-must-rethink-fraud-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/quick-service-restaurants-must-rethink-fraud-prevention/"},"author":{"name":"Matt DeLauro","@id":"https://seon.io/#/schema/person/fbe3e4c532f2eadc9b7aa3d133c682a1"},"headline":"Why Quick-Service Restaurants Must Rethink Fraud Prevention — Now","datePublished":"2025-12-22T13:23:16+00:00","dateModified":"2025-12-22T17:15:52+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/quick-service-restaurants-must-rethink-fraud-prevention/"},"wordCount":890,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/quick-service-restaurants-must-rethink-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Fraud is hurting QSR margins and trust. See how real-time prevention helps brands move from reactive to resilient."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/quick-service-restaurants-must-rethink-fraud-prevention/","url":"https://seon.io/resources/quick-service-restaurants-must-rethink-fraud-prevention/","name":"Why Quick-Service Restaurants Must Rethink Fraud Prevention","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/quick-service-restaurants-must-rethink-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","datePublished":"2025-12-22T13:23:16+00:00","dateModified":"2025-12-22T17:15:52+00:00","description":"Fraud is putting QSR margins and customer trust at risk. See how real-time fraud prevention helps brands move from reactive to resilient.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/quick-service-restaurants-must-rethink-fraud-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/psr-psd3-fraud-prevention-for-psps/#article","isPartOf":{"@id":"https://seon.io/resources/psr-psd3-fraud-prevention-for-psps/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"New EU Payment Rules: PSR &amp; PSD3 Fraud Compliance for PSPs","datePublished":"2025-12-29T17:26:46+00:00","dateModified":"2026-01-16T11:10:03+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/psr-psd3-fraud-prevention-for-psps/"},"wordCount":1335,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/psr-psd3-fraud-prevention-for-psps/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"What PSR and PSD3 change for fraud liability, refunds, and monitoring, plus how PSPs can build real-time, compliant fraud stacks."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/psr-psd3-fraud-prevention-for-psps/","url":"https://seon.io/resources/psr-psd3-fraud-prevention-for-psps/","name":"PSR & PSD3 Explained: Compliant Fraud Prevention for PSPs","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/psr-psd3-fraud-prevention-for-psps/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2025-12-29T17:26:46+00:00","dateModified":"2026-01-16T11:10:03+00:00","description":"What PSR and PSD3 change for fraud liability, refunds, and monitoring, plus how PSPs can build real-time, compliant fraud stacks.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/psr-psd3-fraud-prevention-for-psps/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/automating-igaming-transaction-monitoring-risk-scoring/#article","isPartOf":{"@id":"https://seon.io/resources/automating-igaming-transaction-monitoring-risk-scoring/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"How to Automate iGaming Transaction Monitoring with Real-Time Risk Scoring","datePublished":"2026-01-21T13:51:32+00:00","dateModified":"2026-01-22T11:46:37+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/automating-igaming-transaction-monitoring-risk-scoring/"},"wordCount":1536,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/automating-igaming-transaction-monitoring-risk-scoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"A practical guide to automating iGaming transaction monitoring, from real-time risk scoring to group-wide blacklists across multiple brands."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/automating-igaming-transaction-monitoring-risk-scoring/","url":"https://seon.io/resources/automating-igaming-transaction-monitoring-risk-scoring/","name":"How iGaming Teams Automate Transaction Monitoring at Scale","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/automating-igaming-transaction-monitoring-risk-scoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","datePublished":"2026-01-21T13:51:32+00:00","dateModified":"2026-01-22T11:46:37+00:00","description":"A practical guide to automating iGaming transaction monitoring, from real-time risk scoring to group-wide blacklists across multiple brands.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/automating-igaming-transaction-monitoring-risk-scoring/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/automated-sar-reporting/#article","isPartOf":{"@id":"https://seon.io/resources/automated-sar-reporting/"},"author":{"name":"Jeremy Doyle","@id":"https://seon.io/#/schema/person/36d2cf86a89263b8e8627bf53e6cfe86"},"headline":"Automated SAR Reporting: Workflow, Controls, and What Can (and Can’t) Be Automated","datePublished":"2026-01-13T14:34:42+00:00","dateModified":"2026-01-13T14:41:47+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/automated-sar-reporting/"},"wordCount":1667,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/automated-sar-reporting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-light-1.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how automated SAR reporting supports AML compliance, what can be automated, and why human oversight is still essential."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/automated-sar-reporting/","url":"https://seon.io/resources/automated-sar-reporting/","name":"Automated SAR Reporting: Workflows, Controls, and Limits","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/automated-sar-reporting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-light-1.png","datePublished":"2026-01-13T14:34:42+00:00","dateModified":"2026-01-13T14:41:47+00:00","description":"Learn how automated SAR reporting supports AML compliance, what can be automated, and why human oversight is still essential.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/automated-sar-reporting/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-light-1.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-light-1.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/psr-psd3-transaction-monitoring-compliance/#article","isPartOf":{"@id":"https://seon.io/resources/psr-psd3-transaction-monitoring-compliance/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"How Payment Service Providers Use Transaction Monitoring for PSR &amp; PSD3 Compliance","datePublished":"2026-01-16T11:03:30+00:00","dateModified":"2026-01-16T11:07:02+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/psr-psd3-transaction-monitoring-compliance/"},"wordCount":1400,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/psr-psd3-transaction-monitoring-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how PSR and PSD3 change fraud liability for PSPs, and why real-time transaction monitoring is now central to payments compliance."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/psr-psd3-transaction-monitoring-compliance/","url":"https://seon.io/resources/psr-psd3-transaction-monitoring-compliance/","name":"PSR & PSD3 Compliance: Transaction Monitoring for PSPs","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/psr-psd3-transaction-monitoring-compliance/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","datePublished":"2026-01-16T11:03:30+00:00","dateModified":"2026-01-16T11:07:02+00:00","description":"Learn how PSR and PSD3 change fraud liability for PSPs, and why real-time transaction monitoring is now central to payments compliance.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/psr-psd3-transaction-monitoring-compliance/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-07-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#article","isPartOf":{"@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"Resume Fraud and Fake Job Applicants: How Companies Detect AI-Driven Hiring Abuse","datePublished":"2026-01-30T15:57:57+00:00","dateModified":"2026-02-21T12:35:56+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/"},"wordCount":1682,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Detect resume fraud and fake job applicants. Learn how to spot AI-driven profiles using device, network, and identity signals."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/","url":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/","name":"Resume Fraud Detection: How to Spot Fake Job Applicants (2026)","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","datePublished":"2026-01-30T15:57:57+00:00","dateModified":"2026-02-21T12:35:56+00:00","description":"Protect your hiring pipeline from resume fraud and AI-generated profiles. Learn how to detect fake job applicants using device, network, and identity signals.","mainEntity":[{"@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788387780"},{"@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788406553"},{"@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788407431"},{"@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788408592"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-03-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788387780","position":1,"url":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788387780","name":"How can you tell if AI generated a resume?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AI-generated resumes typically feature generic language, flawless formatting, vague achievements lacking specific metrics and unnaturally consistent writing quality. However, AI content alone isn't definitive proof of fraud — many legitimate candidates use AI writing assistants. Behavioral and technical signals provide more reliable indicators when combined with content analysis.<br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788406553","position":2,"url":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788406553","name":"How do companies detect fake job applicants before onboarding?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Effective detection combines multiple layers: content analysis of resumes and portfolios, device intelligence to identify suspicious hardware patterns, network data, including VPN and proxy detection and consistency checks across all candidate materials. This layered approach flags risk early in the hiring funnel, often before initial screening calls.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788407431","position":3,"url":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788407431","name":"What’s the difference between resume fraud and identity fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Resume fraud involves fabricating qualifications, experience or achievements—essentially lying about professional capabilities. Identity fraud involves impersonation using stolen identities or creating entirely synthetic personas. The most sophisticated fake job applicants combine both, presenting fabricated qualifications under false identities to create compelling but entirely fictional candidates.<br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788408592","position":4,"url":"https://seon.io/resources/resume-fraud-detection-fake-job-applicants/#faq-question-1769788408592","name":"Is an employment verification tool enough to stop resume fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No. Employment verification tools validate identities and past employment. These checks occur too late and cannot prevent the waste of resources on fraudulent candidates during the hiring process. Effective fraud prevention requires earlier intervention by analyzing device, network and behavioral signals that reveal fraud before interviews begin.<br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fca-aml-compliance-software-uk/#article","isPartOf":{"@id":"https://seon.io/resources/fca-aml-compliance-software-uk/"},"author":{"name":"Oliver Lebhardt","@id":"https://seon.io/#/schema/person/123b6c88bbdfecdd3cb10e628fc550ee"},"headline":"FCA-Aligned AML Compliance Software: Top Solutions","datePublished":"2026-02-03T16:40:56+00:00","dateModified":"2026-02-26T16:22:41+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fca-aml-compliance-software-uk/"},"wordCount":1784,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fca-aml-compliance-software-uk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","articleSection":["Article"],"inLanguage":"en-US","description":"FCA AML compliance software in the UK: compare tools for transaction monitoring, screening and audit readiness."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/fca-aml-compliance-software-uk/","url":"https://seon.io/resources/fca-aml-compliance-software-uk/","name":"FCA-Aligned AML Compliance Software: Top Solutions","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fca-aml-compliance-software-uk/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","datePublished":"2026-02-03T16:40:56+00:00","dateModified":"2026-02-26T16:22:41+00:00","description":"A practical guide to FCA AML compliance software in the UK. Compare tools for transaction monitoring, screening and audit readiness.","mainEntity":[{"@id":"https://seon.io/resources/fca-aml-compliance-software-uk/#faq-question-1770135542782"},{"@id":"https://seon.io/resources/fca-aml-compliance-software-uk/#faq-question-1770135552838"},{"@id":"https://seon.io/resources/fca-aml-compliance-software-uk/#faq-question-1770135573584"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fca-aml-compliance-software-uk/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fca-aml-compliance-software-uk/#faq-question-1770135542782","position":1,"url":"https://seon.io/resources/fca-aml-compliance-software-uk/#faq-question-1770135542782","name":"Is AML software mandatory for FCA-regulated firms?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The FCA does not mandate a specific AML software product, but it does require firms to have practical, proportionate and risk‑based systems and controls. In practice, once you reach even a moderate scale, dedicated AML software becomes the only realistic way to meet expectations around ongoing monitoring, screening, governance and auditability.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fca-aml-compliance-software-uk/#faq-question-1770135552838","position":2,"url":"https://seon.io/resources/fca-aml-compliance-software-uk/#faq-question-1770135552838","name":"What types of firms need FCA-aligned AML software?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Any firm within the FCA’s regulatory perimeter that is exposed to money laundering or terrorist financing risk should consider FCA‑aligned AML software, including EMIs, payment institutions, banks, lending platforms and many fintechs. The exact configuration will vary, but all such firms need tools that support risk assessment, screening, transaction monitoring and the evidencing of controls for supervision and audits.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/fca-aml-compliance-software-uk/#faq-question-1770135573584","position":3,"url":"https://seon.io/resources/fca-aml-compliance-software-uk/#faq-question-1770135573584","name":"How should I compare FCA AML solutions for my business?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Start by mapping your permissions, customer types, transaction volumes and risk appetite to what you actually need from an AML platform. Then compare vendors on core areas such as screening coverage, <a href=\"https://seon.io/resources/transaction-monitoring-software-how-it-works-and-tips/\">transaction monitoring tools</a>, case management, ease of integration and total cost of ownership, focusing on how well each solution supports FCA expectations rather than feature lists.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/top-kyc-software-tools/#article","isPartOf":{"@id":"https://seon.io/resources/top-kyc-software-tools/"},"author":{"name":"Katy Chrisler","@id":"https://seon.io/#/schema/person/c0b3183e7c5621608e7ffdae218d1fd6"},"headline":"Top KYC Software &#038; Tools to Consider in 2026","datePublished":"2026-02-04T12:17:28+00:00","dateModified":"2026-04-10T10:23:58+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/top-kyc-software-tools/"},"wordCount":2742,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/top-kyc-software-tools/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Explore top KYC software for secure onboarding, fraud prevention and global compliance, and learn which features matter most as risk evolves."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/top-kyc-software-tools/","url":"https://seon.io/resources/top-kyc-software-tools/","name":"Top KYC Software & Tools in 2026 | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/top-kyc-software-tools/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2026-02-04T12:17:28+00:00","dateModified":"2026-04-10T10:23:58+00:00","description":"Explore top KYC software for secure onboarding, fraud prevention and global compliance, and learn which features matter most as risk evolves.","mainEntity":[{"@id":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1647943190784"},{"@id":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1647943227015"},{"@id":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1647943234013"},{"@id":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1774961763701"},{"@id":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1774961784251"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/top-kyc-software-tools/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1647943190784","position":1,"url":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1647943190784","name":"Why do you need to invest in KYC software?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"KYC software is one of the most convenient solutions for automating Know Your Customer checks. These are legal requirements in a growing number of industries, including finance, iGaming, and crypto exchanges. KYC software can help you avoid compliance fines and accelerate customer verification to onboard more new customers without spending additional resources. <br/>","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1647943227015","position":2,"url":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1647943227015","name":"How do KYC tools reduce onboarding abandonment without increasing fraud risk?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Risk-based workflows apply friction proportionally. Low-risk users — those with low-risk profiles based on device, IP and behavioral signals,— can move through quickly while high-risk users trigger additional verification steps.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1647943234013","position":3,"url":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1647943234013","name":"How should KYC be handled for businesses with multiple products or regions?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Use policy segmentation so verification depth adapts by geography, product risk level and customer profile. A business onboarding retail consumers in a low-risk jurisdiction requires different verification depth than one onboarding high-value financial services customers in a high-risk market.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1774961763701","position":4,"url":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1774961763701","name":"What regulatory frameworks govern KYC requirements for fintechs and iGaming operators?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Requirements vary significantly. US fintechs fall under<a href=\"https://www.fincen.gov/resources/statutes-regulations/guidance\" rel=\"nofollow\"> FinCEN's Customer Due Diligence Rule</a> and the Bank Secrecy Act. UK-regulated firms follow FCA guidelines informed by the Money Laundering Regulations. iGaming operators are governed by their licensing jurisdiction, with MGA, UKGC, Gibraltar and others each carrying specific player verification standards. Global alignment draws on<a href=\"https://www.fatf-gafi.org/\" rel=\"nofollow\"> FATF Recommendations</a>.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1774961784251","position":5,"url":"https://seon.io/resources/top-kyc-software-tools/#faq-question-1774961784251","name":"What are the best integrated KYC and fraud detection platforms that can streamline player onboarding?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The strongest platforms combine identity verification, real-time fraud detection and AML screening in a single workflow rather than requiring separate tools for each function. A unified platform reduces handoffs between systems, lowers manual review volume and shortens time-to-approval — all of which directly impact onboarding completion rates.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/afasa-compliance-real-time-fraud-monitoring-philippines/#article","isPartOf":{"@id":"https://seon.io/resources/afasa-compliance-real-time-fraud-monitoring-philippines/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"How to Use AFASA Compliance to Win the Philippine Fintech Market","datePublished":"2026-02-26T10:05:52+00:00","dateModified":"2026-02-27T09:26:15+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/afasa-compliance-real-time-fraud-monitoring-philippines/"},"wordCount":992,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/afasa-compliance-real-time-fraud-monitoring-philippines/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2026/02/How-to-Use-AFASA-Compliance-to-Win-the-Philippine-Fintech-Market–-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"AFASA is reshaping fraud compliance in the Philippines. Learn how fintechs can use real-time monitoring and mule detection to drive growth."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/afasa-compliance-real-time-fraud-monitoring-philippines/","url":"https://seon.io/resources/afasa-compliance-real-time-fraud-monitoring-philippines/","name":"Winning the Philippine Fintech Market with AFASA Compliance","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/afasa-compliance-real-time-fraud-monitoring-philippines/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2026/02/How-to-Use-AFASA-Compliance-to-Win-the-Philippine-Fintech-Market–-Thumbnail.png","datePublished":"2026-02-26T10:05:52+00:00","dateModified":"2026-02-27T09:26:15+00:00","description":"AFASA is reshaping fraud compliance in the Philippines. Learn how fintechs can use real-time monitoring and mule detection to drive growth by 2026.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/afasa-compliance-real-time-fraud-monitoring-philippines/#primaryimage","url":"https://seon.io/wp-content/uploads/2026/02/How-to-Use-AFASA-Compliance-to-Win-the-Philippine-Fintech-Market–-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2026/02/How-to-Use-AFASA-Compliance-to-Win-the-Philippine-Fintech-Market–-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#article","isPartOf":{"@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/"},"author":{"name":"Husnain Bajwa","@id":"https://seon.io/#/schema/person/05d1abd4f2ffc6315998adb05ea63842"},"headline":"Responsible Gambling and Player Protection in the Age of Data","datePublished":"2026-03-12T13:00:42+00:00","dateModified":"2026-04-02T11:28:19+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/"},"wordCount":1150,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how iGaming operators detect at-risk gambling, manage compliance and use real-time behavioral monitoring to protect players."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/","url":"https://seon.io/resources/responsible-gambling-player-protection-igaming/","name":"Responsible Gambling & Player Protection in the Age of Data","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","datePublished":"2026-03-12T13:00:42+00:00","dateModified":"2026-04-02T11:28:19+00:00","description":"Learn how iGaming operators detect at-risk gambling, manage compliance and use real-time behavioral monitoring to protect players.","mainEntity":[{"@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#faq-question-1773844011319"},{"@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#faq-question-1773844171230"},{"@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#faq-question-1773844202889"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#faq-question-1773844011319","position":1,"url":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#faq-question-1773844011319","name":"How does data-driven self-exclusion prevent duplicate account creation?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Traditional self-exclusion often fails when players use synthetic identities or new device configurations to bypass bans. By leveraging digital footprint analysis and device fingerprinting, operators can match users against exclusion lists in real time. This ensures that a self-imposed ban remains effective across all related accounts and prevents individuals from exploiting identity gaps to circumvent their own restrictions.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#faq-question-1773844171230","position":2,"url":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#faq-question-1773844171230","name":"How does AI identify at-risk gambling behavior before it escalates?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"AI models analyze behavioral velocity — such as sudden increases in session length, deposit frequency and late-night activity — to detect deviations from normal play patterns. These real-time insights allow operators to deploy proportionate interventions or affordability checks before a player reaches a crisis point. This proactive approach moves beyond reactive account blocking to offer support based on evolving player risk.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#faq-question-1773844202889","position":3,"url":"https://seon.io/resources/responsible-gambling-player-protection-igaming/#faq-question-1773844202889","name":"What are the benefits of unifying fraud and responsible gambling teams?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A unified risk architecture allows operators to use shared data signals like IP reputation, device ID and transaction history for multiple compliance goals. This integration eliminates data silos, improves the accuracy of risk scoring and ensures that responsible gambling interventions are consistent across the entire player lifecycle. By streamlining these workflows, operators can scale their compliance efforts without creating unnecessary friction for low-risk users.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/why-real-time-telco-signals-are-the-new-frontline-in-account-security/#article","isPartOf":{"@id":"https://seon.io/resources/why-real-time-telco-signals-are-the-new-frontline-in-account-security/"},"author":{"name":"Balint Toth","@id":"https://seon.io/#/schema/person/513273b65abd3bfd0fc3e59be069cd4c"},"headline":"Why Real-Time Telco Signals Are the New Frontline in Account Security","datePublished":"2026-03-13T17:35:45+00:00","dateModified":"2026-03-13T17:35:50+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/why-real-time-telco-signals-are-the-new-frontline-in-account-security/"},"wordCount":1339,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/why-real-time-telco-signals-are-the-new-frontline-in-account-security/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"In the digital arena, a phone number often acts as the skeleton key to our digital lives, serving as one of the primary authentication methods for our most sensitive accounts — banking, email, cryptocurrency, social media and so on. But this reliance has created a critical vulnerability, one that today’s increasingly sophisticated fraudsters are able to exploit with alarming success through an attack vector known as SIM swapping.\n\n\n\nIn a SIM swap attack, a criminal convinces a mobile carrier to transfer a victim's phone number to a SIM card in their control. Armed with the victim's number, the bad actor is then able to intercept one-time passwords (OTPs), password reset links and other timely authentication messages, gaining control of the victim's accounts. The consequences are dire, ranging from drained bank accounts and stolen cryptocurrency to reputational damage and systemic market disruption.\n\n\n\nA Growing Threat Backed by Hard Numbers\n\n\n\nThis threat is more than a theoretical risk. In February of this year, a Texas man was sentenced to nearly six years in federal prison for coordinating a SIM swap scheme that stole over $1.7 million in cryptocurrency from victims – stealing both peoples’ life savings and sense of security.\n\n\n\nThis case is just one data point in a rapidly accelerating trend. The FBI's Internet Crime Complaint Center (IC3) reported nearly $26 million in losses from SIM swapping in its 2024 annual report. Across the pond, the UK fraud prevention service Cifas recorded a 1,055% increase in SIM swap fraud cases, with nearly 3,000 incidents logged in the National Fraud Database alongside a 76% rise in account takeover cases overall.\n\n\n\nPerhaps the most audacious example came in early 2025, when a fraudster used a SIM swap to seize control of the U.S. Securities and Exchange Commission's official X account]. The attacker posted a fake announcement that the SEC had approved Bitcoin Exchange Traded Funds, causing a temporary $1,000 spike in Bitcoin's price before the deception was revealed and the value subsequently dropped by more than $2,000. The perpetrator — who had printed a fake ID on a portable card printer and walked into an AT&amp;T store to impersonate the victim — was sentenced to 14 months in prison in May 2025.\n\n\n\nThe Industrialization of SIM Swap Fraud\n\n\n\nWhat makes SIM swapping particularly dangerous is how it has evolved from an opportunistic crime into an industrialized operation. The CISA Cyber Safety Review Board's landmark report on the LAPSUS$ hacking group documented how organized threat actors use SIM swaps as a core technique, noting that these attacks leverage weaknesses of multi-factor authorizations (MFA).One of LAPSUS$'s successors, the group known as Scattered Spider, has notoriously continued to refine these methods. In July of last year, the FBI and CISA issued a joint advisory documenting Scattered Spider's escalating attacks across the aviation, insurance and retail sectors, with SIM swapping remaining their primary tool.\n\n\n\nThe systemic risk extends beyond individual attacks. In April 2025, SK Telecom — South Korea's largest mobile carrier — disclosed a data breach that had persisted undetected for nearly three years, compromising the SIM card data of 27 million subscribers, including subscriber identity numbers, authentication keys and network activity logs. South Korean regulators imposed a $97 million fine, and the company reported a 90% drop in operating profit from breach-related costs. This kind of breach does not just affect the telecom provider; it creates a vast reservoir of stolen data that can be weaponized for SIM swap attacks against the financial institutions and digital platforms those subscribers use for years after they gain access to the information.\n\n\n\nFor fraud and risk leaders, this creates an untenable situation. A customer can present a pristine digital footprint — a clean IP address, a legitimate email and a history of normal behavior — yet still be in the process of having their account taken over. Without direct visibility into the status of a phone number at the Mobile Network Operator (MNO) level, fraud prevention systems are blind to a crucial layer of risk. And with AI agents expected to swiftly reduce the time it takes to exploit account exposures up to 50% by 2027, the window for detection is only getting shorter.\n\n\n\nWhy Traditional Authentication Can’t Keep Up \n\n\n\nThe rise of SIM swap fraud demonstrates the painful truth that traditional authentication methods are no longer sufficient on their own. While MFA is a necessary layer of security, its overreliance on SMS and voice calls creates a single point of failure that fraudsters are ruthlessly exploiting, and the problem is compounded by the accelerating role of AI.\n\n\n\nThe historical response to SIM swap fraud has been to layer additional authentication steps on top of SMS — security questions, email confirmations, app-based authenticators. But these measures treat the symptom, not the disease. Additionally, they add undesirable friction for legitimate customers while doing little to stop a determined attacker who has already key pieces of information that underpins the entire authentication chain.\n\n\n\nThe problem with MFA is that it cannot answer the most critical question in a SIM swap scenario: has this phone number been reassigned to a different SIM card? Answering that question requires real-time intelligence from the mobile network itself — and that intelligence must be combined with every other available signal to build a complete picture of risk.\n\n\n\nThe Multi-Layered Approach: Combining Telco Intelligence with Digital Identity Signals\n\n\n\nSEON's fraud prevention platform addresses this challenge by integrating real-time telco intelligence directly into its scoring engine, alongside the full spectrum of digital identity signals. Rather than treating SIM swap detection as a standalone check, SEON combines it with multiple layers of data to create a comprehensive, real-time risk assessment.\n\n\n\nThe platform's telco intelligence capabilities provide three critical signals:\n\n\n\n\nReal-time SIM swap detection to confirm whether a SIM swap has occurred on a given phone number and when, providing an immediate, high-confidence indicator that an account may be under attack.\n\n\n\nPorting history and velocity tracking to monitor how frequently a phone number has been ported between carriers over a rolling window, flagging the kind of rapid, repeated porting that is a hallmark of organized fraud.\n\n\n\nAI-driven telco risk scoring to analyze static attributes, behavioral patterns and usage velocity to produce a pre-computed risk assessment — capable of flagging, for example, a number receiving passcode requests from multiple countries within a single week.\n\n\n\n\nThese telco signals are powerful on their own, but their true value emerges when they are combined with the rest of SEON's multi-layered data stack:\n\n\n\n\nDigital footprint analysis cross-references a phone number and email address across more than 90 online platforms to build a rich picture of a user's legitimate online presence — or reveal the absence of one.\n\n\n\nDevice intelligence analyzes hundreds of data points from a user's browser and device to detect inconsistencies, emulation and signs of automation.\n\n\n\nIP intelligence assesses the risk associated with a user's connection, including the use of proxies, VPNs, Tor or data center IPs.\n\n\n\nNetwork analysis uncovers hidden connections between seemingly unrelated users, identifying coordinated fraud rings that a single-transaction view would miss.\n\n\n\n\nBy feeding all of these signals into a unified scoring engine, fraud teams can build highly nuanced rule sets. A rule can be as straightforward as blocking any transaction where a SIM swap has occurred in the last 24 hours, or as sophisticated as escalating to manual review when a SIM swap coincides with a login from an unrecognized device, an IP address in a different country, and an email with no social media presence.\n\n\n\nThe Clear Path Ahead\n\n\n\nSIM swap fraud is a direct assault on the trust infrastructure that underpins the digital economy. It exploits the gap between what telecom networks know and what fraud prevention systems can see. Closing that gap requires more than better passwords or additional authentication steps. It requires real-time visibility into the telecom layer, combined with the full constellation of digital identity signals that distinguish a legitimate customer from a compromised account. With real-time telco signals, that shrinking window becomes your advantage, not the attacker’s."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/why-real-time-telco-signals-are-the-new-frontline-in-account-security/","url":"https://seon.io/resources/why-real-time-telco-signals-are-the-new-frontline-in-account-security/","name":"Why Real-Time Telco Signals Are the New Frontline in Account Security - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/why-real-time-telco-signals-are-the-new-frontline-in-account-security/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2026-03-13T17:35:45+00:00","dateModified":"2026-03-13T17:35:50+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/why-real-time-telco-signals-are-the-new-frontline-in-account-security/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/513273b65abd3bfd0fc3e59be069cd4c","name":"Balint Toth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2026/03/cropped-Balint-Toth-1548_web-1-96x96.jpg","url":"https://seon.io/wp-content/uploads/2026/03/cropped-Balint-Toth-1548_web-1-96x96.jpg","contentUrl":"https://seon.io/wp-content/uploads/2026/03/cropped-Balint-Toth-1548_web-1-96x96.jpg","caption":"Balint Toth"},"description":"Bálint Tóth is Head of Product at SEON, where he leads the Digital Footprint and Device Intelligence portfolio to help businesses stay ahead of fast-evolving online fraud. An experienced product leader in the B2B SaaS space, he focuses on building solutions that make complex risk decisions simple, actionable and scalable for digital-first brands.","jobTitle":"Head of Product - Digital Footprint & Device Intelligence","url":"https://seon.io/resources/author/seon_admin/"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#article","isPartOf":{"@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/"},"author":{"name":"Ádám Vass","@id":"https://seon.io/#/schema/person/1dc48ec21a336313ac6a5ef7ede65297"},"headline":"ACH Fraud: How These Attacks Work and How to Stop Them","datePublished":"2026-03-23T14:43:33+00:00","dateModified":"2026-04-14T12:55:11+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/"},"wordCount":2159,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","articleSection":["Article"],"inLanguage":"en-US","description":"Prevent ACH fraud via monitoring and MFA. Detect ATO/BEC attacks and claw back funds with bank-led traces."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/","url":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/","name":"ACH Fraud Prevention: How Attacks Work and How to Stop Them","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","datePublished":"2026-03-23T14:43:33+00:00","dateModified":"2026-04-14T12:55:11+00:00","description":"Stop ACH fraud with real-time monitoring and Nacha rules. Detect ATO/BEC threats and recover funds through ODFI/RDFI traces.","mainEntity":[{"@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276660289"},{"@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276685302"},{"@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276697410"},{"@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276715601"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276660289","position":1,"url":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276660289","name":"What is ACH fraud and how does it occur?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"ACH fraud is the misuse of bank account and routing numbers or online access to push or pull money through the ACH network without proper authorization. It typically involves unauthorized debits, compromised online banking, manipulated emails or timing gaps in batch settlement.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276685302","position":2,"url":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276685302","name":"Who is held liable for unauthorized ACH transactions?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Consumers are usually protected if they report unauthorized transfers quickly, while businesses are assessed against “commercially reasonable” controls agreed with their bank. In scams where staff approve a fraudulent request, the business often bears much of the loss.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276697410","position":3,"url":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276697410","name":"What are the most effective ways to prevent ACH fraud?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The strongest defenses combine multi‑factor authentication, out‑of‑band checks, ACH blocks and filters and real‑time monitoring of payment behavior. Clear internal approval rules and fast issue reporting are just as important as technical controls.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276715601","position":4,"url":"https://seon.io/resources/ach-fraud-prevention-detection-recovery/#faq-question-1774276715601","name":"What are the new Nacha requirements for ACH fraud monitoring?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Nacha now expects banks and payment providers to monitor ACH traffic based on their actual fraud risk, not just formatting rules. This includes monitoring both outgoing and incoming payments, maintaining written policies and regularly reviewing controls to ensure they remain appropriate.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#article","isPartOf":{"@id":"https://seon.io/resources/email-intelligence-fraud-prevention/"},"author":{"name":"Marco Crispin","@id":"https://seon.io/#/schema/person/509c0869689e9bb6e3beb815532fdc3a"},"headline":"Email Intelligence for Fraud Detection: Signals, Use Cases and Benefits","datePublished":"2026-03-24T11:52:11+00:00","dateModified":"2026-04-16T10:34:17+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/email-intelligence-fraud-prevention/"},"wordCount":1791,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"Learn how email intelligence goes beyond basic verification to uncover hidden fraud signals like digital footprints and domain reputation."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/email-intelligence-fraud-prevention/","url":"https://seon.io/resources/email-intelligence-fraud-prevention/","name":"Email Intelligence: Beyond Verification for Fraud Prevention | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","datePublished":"2026-03-24T11:52:11+00:00","dateModified":"2026-04-16T10:34:17+00:00","description":"Learn how email intelligence goes beyond basic verification to uncover hidden fraud signals like digital footprints and domain reputation.","mainEntity":[{"@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352808119"},{"@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352820114"},{"@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352834808"},{"@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352847253"},{"@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352858751"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-12-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352808119","position":1,"url":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352808119","name":"What is email intelligence in fraud detection?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Email intelligence is the analysis of signals associated with an email address to assess risk in fraud prevention. It goes beyond checking whether an address is valid to evaluate the context and intent behind it.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352820114","position":2,"url":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352820114","name":"What signals does email intelligence use?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Common signals include email age, domain reputation, disposable address detection, social media presence and breach exposure. These can be used individually or combined into an email risk score.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352834808","position":3,"url":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352834808","name":"What types of fraud can email intelligence help prevent?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Email intelligence is particularly effective against synthetic identity fraud, fake account creation, bonus and referral abuse, account takeover attempts and coordinated multi-accounting schemes. It also provides useful pre-KYC context for onboarding decisions in regulated industries.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352847253","position":4,"url":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352847253","name":"How is email intelligence different from email verification?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Email verification confirms that an address is formatted correctly and can receive messages. Email intelligence examines the risk associated with the address — its history, associations and behavioral signals. Verification is a technical check; intelligence is an investigative one.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352858751","position":5,"url":"https://seon.io/resources/email-intelligence-fraud-prevention/#faq-question-1774352858751","name":"Is email intelligence enough to detect fraud on its own?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"No. Email intelligence is a valuable early-stage signal, but it works best as part of a layered fraud stack. Combining it with digital footprint analysis, <a href=\"https://seon.io/resources/device-intelligence-to-filter-out-fraudsters/\" type=\"link\" id=\"https://seon.io/resources/device-intelligence-to-filter-out-fraudsters/\">device intelligence</a>, <a href=\"https://seon.io/resources/dictionary/behavioral-analysis/\" type=\"link\" id=\"https://seon.io/resources/dictionary/behavioral-analysis/\">behavioral analytics</a> and identity verification gives fraud teams a more complete and reliable risk picture.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/uk-remote-gaming-duty-tax-doubled/#article","isPartOf":{"@id":"https://seon.io/resources/uk-remote-gaming-duty-tax-doubled/"},"author":{"name":"George Pace","@id":"https://seon.io/#/schema/person/e63aab38d26f200338329bb17993b8d8"},"headline":"UK Remote Gaming Duty Tax Doubled. The Operators Who Survive Will Be the Ones Who Consolidate.","datePublished":"2026-04-01T09:18:31+00:00","dateModified":"2026-04-01T18:11:45+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/uk-remote-gaming-duty-tax-doubled/"},"wordCount":1158,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/uk-remote-gaming-duty-tax-doubled/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"The UK government is about to pull a very real lever on every UK‑licensed remote gambling operator: from 1 April 2026, the Remote Gaming Duty is moving from 21% to 40%.&nbsp;\n\n\n\nThis is a 100% increase in the tax rate on gross gaming yield — in other words, not a minor adjustment in a budget footnote. It is the industry's biggest single cost shock in more than a decade, landing in a market where fraud had already been eroding margins.In SEON’s 2026 Fraud &amp; AML Leaders Survey of 1,000+ fraud, risk and compliance professionals, 57% of betting and gaming respondents said fraud losses were already outpacing revenue before the tax change was announced. On the surface, brands have been reporting strong top‑line growth. Underneath, fraud and financial crime have been quietly catching up.\n\n\n\nHere are the top considerations for operators who need to adapt to this change.&nbsp;\n\n\n\nGrowth is Soaring, Which Means Fraud Rates Do Too\n\n\n\nThe growth engine is still running hot. According to the same research, 99% of betting and gaming operators plan to launch a new product or enter a new market in 2026, and nearly half saw revenue climb by more than 26% over the past year. New brands, game formats and jurisdictions, backed by aggressive promotions, remain the standard way to defend market share.&nbsp;\n\n\n\nThat same playbook is also what today’s fraud problem feeds on.\n\n\n\nThree categories dominate the loss profile: bonus abuse, loyalty fraud and account takeover. Together, they account for 68% of reported fraud in betting and gaming. Each one is tightly connected to how operators drive both acquisition and retention.\n\n\n\nOn the acquisition side, generous welcome and reload offers invite synthetic identities and multi‑accounting. If you are rewarding every “new” player aggressively, you are also rewarding the fraudsters who are best at looking new on repeat. On the retention side, rich loyalty and VIP schemes make existing accounts more valuable targets. In addition to creating new profiles, fraudsters also look for ways into trusted, aging accounts so they can harvest bonuses and rewards that the operator has already earmarked for genuine players.\n\n\n\nThe more operators do to accelerate growth and deepen retention, the more surface area they expose to this kind of abuse. The same levers used to push revenue up are also expanding the attack surface fraud teams must defend.\n\n\n\nInefficiencies Such as Fragmented Stacks and Manual Fixes Don't Scale\n\n\n\nUnderneath the loss figures sits a foundational problem in how systems are wired together. Betting and gaming operators are almost four times more likely than peers in other industries to describe creating a unified customer view as “extremely challenging.”&nbsp;\n\n\n\nData silos run well above the cross‑vertical baseline, and identity workflows are often split between multiple providers with incompatible data models. Fraud prevention, AML monitoring and IDV are often handled under separate contracts and integrations, each with its own events, rules and reporting.\n\n\n\nGiven this architecture, what happens when pressure hits is rarely a surprise. Instead of fixing the foundation, many operators simply add more people around the edges. The Fraud Survey shows that betting and gaming operators invest significantly more budget in analyst headcount and significantly less in AI and automation than other verticals — making it the only sector where spending on people surpasses spending on automation.&nbsp;\n\n\n\nWhen fraud spikes or a new product launches, the first move is to expand manual review teams and plug gaps between tools with human effort. The extra headcount creates the sense that the issue is under control, so the organisation leans back into the same growth tactics: more offers, more markets, more volume through the same fragmented stack.\n\n\n\nBut this approach has a structural limit: human capacity increases one case at a time, whereas fraud grows on a curve that hiring plans cannot keep pace with. High false‑positive rates compound the problem, pushing more legitimate players into already long queues and inflating costs without a corresponding improvement in control.\n\n\n\n\n\n\n\nOver time, the pattern gets more entrenched: ambitious growth creates more fraud, fragmented tools miss signals, hiring more people masks the strain just long enough to fuel the next round of growth — and the cycle repeats at a higher cost base each time.\n\n\n\nWhat Leading Operators Are Doing to Adapt\n\n\n\nThe Remote Gaming Duty increase didn’t start this pattern, but it transforms these challenges from expensive into unsustainable. Under a doubled tax rate, every extra analyst, every redundant vendor contract and every player lost at a broken verification step consumes a larger share of the value generated by each bet.&nbsp;\n\n\n\nWhat once felt like an expensive, slightly messy way of working is now a direct threat to the business model.\n\n\n\nThis is why the industry’s attention is shifting from individual point solutions to an architecture that connects them. The operators best placed to defend their margins in the coming years will be those who break the cycle by consolidating their risk stack. In practical terms, this means bringing fraud, AML and IDV together in a single platform: one integration, one data pipeline and one view of each player.&nbsp;\n\n\n\nWhen fraud signals feed directly into AML decisions, plus IDV flows are informed by digital footprint data and device intelligence before a document is requested, the economics change. Detection sharpens, and the dead weight of redundant manual work, along with its cost, finally starts to lift.\n\n\n\nTiming matters. Multi‑year contracts are being negotiated now as the AML and risk technology market consolidates around a smaller number of platforms. Leveraging a cluster of standalone tools today effectively locks in fragmentation and costs for the duration of those agreements.&nbsp;\n\n\n\nChoosing a unified platform instead is a way of building in flexibility: controls can be adjusted centrally, automation can expand as operators gain confidence, and scarce human expertise can be deployed where it genuinely adds value.\n\n\n\nWhat Survives When the Dust Settles\n\n\n\nThe old pattern of fragmented tools and ever‑larger manual teams is no longer something operators can grow their way out of. SEON is built to offer a different route. Instead of adding another point solution to an already crowded stack, it brings fraud, AML and IDV into a single environment where every signal can inform every decision. The same controls that keep acquisition fast can harden high‑risk journeys, and the same data powering fraud decisions can sharpen AML alerts without adding friction.&nbsp;\n\n\n\nIn a market where duty has doubled, and fraud was already eroding margins, consolidation stops being a tidy efficiency play and becomes one of the last real levers left to protect profitability.\n\n\n\n\n\n\nTurn Tax Pressure Into a Fraud Advantage\n\n\n\nSEON’s 2026 Betting &amp; Gaming Fraud &amp; AML Report dives into how operators are reshaping fraud, AML and IDV this year — and where consolidation is already turning rising costs into better margins and stronger controls.\n\n\n\n\nGet the report"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/uk-remote-gaming-duty-tax-doubled/","url":"https://seon.io/resources/uk-remote-gaming-duty-tax-doubled/","name":"UK Remote Gaming Duty Tax Doubled - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/uk-remote-gaming-duty-tax-doubled/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","datePublished":"2026-04-01T09:18:31+00:00","dateModified":"2026-04-01T18:11:45+00:00","description":"The UK government is about to pull a very real lever on every UK‑licensed remote gambling operator: from 1 April 2026, the Remote Gaming Duty is moving from 21% to 40%. ","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/uk-remote-gaming-duty-tax-doubled/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-10-green.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Person","@id":"https://seon.io/#/schema/person/e63aab38d26f200338329bb17993b8d8","name":"George Pace","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/wp-content/uploads/2026/04/George-Pace-357_web-96x96.webp","url":"https://seon.io/wp-content/uploads/2026/04/George-Pace-357_web-96x96.webp","contentUrl":"https://seon.io/wp-content/uploads/2026/04/George-Pace-357_web-96x96.webp","caption":"George Pace"},"jobTitle":"Sr. Product Marketing Manager","url":"https://seon.io/resources/author/george/"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fraud-idv-and-aml-one-problem-three-languages-and-ai-misalignment/#article","isPartOf":{"@id":"https://seon.io/resources/fraud-idv-and-aml-one-problem-three-languages-and-ai-misalignment/"},"author":{"name":"Mira Sidhu","@id":"https://seon.io/#/schema/person/48b09375f19aad4196e49bfa2265b1aa"},"headline":"Fraud, IDV and AML: One Problem, Three Languages and AI Misalignment","datePublished":"2026-04-02T15:26:28+00:00","dateModified":"2026-04-07T08:24:00+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fraud-idv-and-aml-one-problem-three-languages-and-ai-misalignment/"},"wordCount":1193,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fraud-idv-and-aml-one-problem-three-languages-and-ai-misalignment/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2026/04/Fraud-IDV-and-AML_-One-Problem-Three-Languages-and-AI-Misalignment-Thumbnail.png","articleSection":["Article"],"inLanguage":"en-US","description":"More teams are discovering that they are fighting the same underlying risk using three different vocabularies — and it is starting to cost them real money. Globally, banks and fintechs now spend an estimated $206 billion every year on financial crime compliance, and that’s not even counting other regulated industries like gambling. Yet fraud losses and compliance penalties continue to climb, a clear signal that effort is not translating into shared understanding or outcomes. In the US alone, over 1.1 million identity fraud reports were filed last year, reinforcing that identity has become one of the primary battlegrounds for financial crime.\n\n\n\nThe fraud team is testing behavioral models, compliance is expanding its review of account activity and the IDV team is rolling out new ID documents and biometric checks as part of broad KYC programs, all powered by some flavor of AI. In a world where AI-driven criminal tactics and face-swap‑based ID attacks are surging, that language gap has shifted from a cultural annoyance to a structural weakness in your defenses.\n\n\n\nOne Risk Surface, Three Mental Models\n\n\n\nOn paper, fraud, identity and AML functions all look at the same customer and the same journeys — onboarding, account login, payments and withdrawals. In practice, they inherit different mandates and mental modes: fraud teams are rewarded for cutting losses and abuse, AML teams for reducing sanctions and money-laundering exposure, IDV teams for keeping verification fast and conversion-friendly. Each function then builds its own dashboards, metrics and escalation paths around that lens so that the same risky session can be flagged as a false positive, a failed verification or a suspicious pattern depending on who is looking at it.\n\n\n\n\n\n\n\nThose divergent mental models made sense when data, systems and mandates were clearly separated. Today, the stack and regulators are converging around a shared identity‑driven risk surface - the point at which you decide who a user is, how much you trust them and what they are allowed to do next. Yet the language and incentives have not kept up. That’s why an anomalous onboarding, a high‑risk login and a group of suspicious transactions often trigger three different conversations, three sets of investigations and three partially overlapping models, instead of one joined‑up assessment of the same underlying risk.\n\n\n\nWhere AI Makes Misalignment Worse (or Better)\n\n\n\nCollectively, we’ve moved past the experimental AI phase, and it is now deeply embedded in financial crime programs. Fraud functions plug AI into device, behavior and transaction streams to spot anomalies in real time. IDV teams, meanwhile, are deploying AI into document checks, liveness and biometric matching to keep pass rates high without letting deepfakes and synthetic identities slip through, at a time when face-swap attacks against remote identity verification systems have surged by more than 700% in a single year. AML functions apply machine learning to transaction monitoring, name screening and SAR triage.\n\n\n\nThis parallel adoption looks like progress from the outside, yet it often hard‑codes the very misalignment you are trying to solve. Each team trains models on its own data, with its own labels and its own definition of suspicious - a failed selfie, an unusual payment route, a sanctions hit, or a risky account login can all be logged differently for the same customer and at the exact moment in time. The result is duplicated investigations, inconsistent decisions and blind spots, all of which increase operational costs, slow customer journeys and dilute accountability.\n\n\n\nAI’s upside only really appears when the organization treats risk as a shared surface powered by an AI-led operating system, rather than a collection of siloed tools. Using isolated AI agents — one for IDV, another for enhanced due diligence and a third for transaction monitoring — creates blind spots. Instead, smart systems need a foundation that allows agents to understand everything holistically, starting with standardized frameworks like the Model Context Protocol (MCP) to ensure all data captured in the system is readable and actionable across functions.\n\n\n\nWhen built on this unified foundation, shared features — like device reputation, behavioral patterns between onboarding and the first payment or IDV outcomes — can feed both fraud and AML models. This reduces false positives while increasing the likelihood of catching genuinely bad actors. Standard definitions and event taxonomies ensure that a high-risk login or onboarding anomaly has the same meaning and priority, whether you are looking at a fraud dashboard, an AML case or an IDV report.\n\n\n\nShared Risk Language and Operating Rhythm\n\n\n\nThe fastest way to align AI workflows for fraud, IDV and AML is not to redraw the org chart, but to standardize how risk is defined, measured and acted upon across customer journeys. Many institutions are moving toward a common financial‑crime taxonomy - a single set of risk categories, event types and severities that sits above fraud, KYC and AML - so everyone can map their controls and alerts to the same backbone. In practice, this means defining once what constitutes a high‑risk onboarding, a risky account login or a suspicious payment, and then letting each team attach its own fields and thresholds without changing the underlying language and for example, aligning on what signals trigger escalation versus monitoring — regardless of whether they originate in fraud, IDV or AML systems. \n\n\n\nFrom there, you can design around a shared risk object: a consolidated customer or session profile that combines onboarding data, IDV results, device and behavioral signals, and transactional activity into a single view. Unified case management and investigations tooling make this concrete by pulling fraud and AML alerts for the same subject into a single workspace, cutting duplicate effort and making it easier to see blended typologies. IDV becomes the natural bridge in this model — it is the earliest, most structured touchpoint and its outcomes (who this person is, how they proved it, how confident you are) can be reused by both fraud and AML teams rather than re‑collected in different formats downstream.​\n\n\n\nFinally, a shared language only sticks if you embed it in the operating rhythm. That means joint risk reviews for critical journeys (onboarding, account login, first payment), cross‑functional runbooks for escalation, and standing forums where fraud, IDV and AML leads review the same metrics and model outputs against the same taxonomy. \n\n\n\nFrom Separate Projects to a Shared Risk Narrative\n\n\n\nThe next wave of financial crime won’t be lost because your models were a version behind. It will be lost because your experts couldn’t agree on what they were seeing. Regulators, boards and even customers are converging on the same expectation: one joined‑up view of risk, one accountable story, no matter which team picked up the signal first.\n\n\n\nThat makes vocabulary a strategic choice and not an internal preference. If you can't describe a risky onboarding, login or payment in the same terms across fraud, IDV and AML, you simply can't govern it, and you or your AI automation certainly can't explain it when something goes wrong. In an environment where regulators, boards and customers increasingly expect consistency and accountability, fragmented risk language is no longer just inefficient — it's untenable."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fraud-idv-and-aml-one-problem-three-languages-and-ai-misalignment/","url":"https://seon.io/resources/fraud-idv-and-aml-one-problem-three-languages-and-ai-misalignment/","name":"Fraud, IDV and AML: One Problem, Three Languages and AI Misalignment - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fraud-idv-and-aml-one-problem-three-languages-and-ai-misalignment/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2026/04/Fraud-IDV-and-AML_-One-Problem-Three-Languages-and-AI-Misalignment-Thumbnail.png","datePublished":"2026-04-02T15:26:28+00:00","dateModified":"2026-04-07T08:24:00+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fraud-idv-and-aml-one-problem-three-languages-and-ai-misalignment/#primaryimage","url":"https://seon.io/wp-content/uploads/2026/04/Fraud-IDV-and-AML_-One-Problem-Three-Languages-and-AI-Misalignment-Thumbnail.png","contentUrl":"https://seon.io/wp-content/uploads/2026/04/Fraud-IDV-and-AML_-One-Problem-Three-Languages-and-AI-Misalignment-Thumbnail.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/financial-crime-compliance-q1-trends/#article","isPartOf":{"@id":"https://seon.io/resources/financial-crime-compliance-q1-trends/"},"author":{"name":"Nauman Abuzar","@id":"https://seon.io/#/schema/person/e78bfcb0603eab401ea6f60364c3d254"},"headline":"Financial Crime Compliance in Q1: Key Regulatory Shifts &amp; AML Trends","datePublished":"2026-04-20T15:03:11+00:00","dateModified":"2026-04-20T15:38:43+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/financial-crime-compliance-q1-trends/"},"wordCount":2531,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/financial-crime-compliance-q1-trends/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2026/04/Financial-Crime-Compliance-in-Q1_-Key-Regulatory-Shifts-and-AML-Trends-Thumbnail.webp","keywords":["AML"],"articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"$4.4T\n\n\n\nGlobal illicit finance\n\n\n\n\n\n\n\n417%\n\n\n\nAML penalty increase\n\n\n\n\n\n\n\n$80M\n\n\n\nFINCEN record fine\n\n\n\n\n\n\n\n39\n\n\n\nEU Banks under AMLA supervision&nbsp;\n\n\n\n\n\n\n\nThe Numbers Behind the New Era of Zero-Tolerance Enforcement\n\n\n\n\n$4.4T Global illicit finance\n\n\n\n417% AML penalty increase\n\n\n\n$80M FINCEN record fine\n\n\n\n39 EU banks under AMLA supervision\n\n\n\n\nIf 2025 was the year of laying regulatory groundwork, 2026 is proving to be the year of aggressive, unyielding enforcement. For compliance leaders, the message from global regulators is unequivocal: the grace period for adapting to new frameworks has expired.\n\n\n\nWe are currently facing a $4.4 trillion global financial crime epidemic. Driven by the industrialization of AI fraud, the geopolitical shockwaves of global conflicts and the staggering profitability of illicit networks. The stakes have never been higher, and regulators are responding not just with new rules, but with severe financial penalties, asset seizures and, most critically, personal accountability for senior executives.\n\n\n\nRecently, I had the opportunity to speak at a couple of incredible panel sessions that brought together some of the sharpest minds across banking, fintech and regulation. The consensus was that the old ways of managing risk are breaking under the weight of modern financial crime.\n\n\n\nCustomers now expect unified, data-driven risk platforms that make decisions in real time, are explainable to regulators and adapt seamlessly across jurisdictions. Here is a definitive briefing on the regulatory shifts defining Q1 2026, looking at how institutions must adapt their controls and technology to survive.\n\n\n\nThe AML Regulatory Shift: From Process to Outcomes \n\n\n\nThe regulatory landscape is moving away from rote, mindless processes toward a laser focus on material risks and outcomes.\n\n\n\nAt the global level, the Financial Action Task Force (FATF) concluded its February 2026 Plenary in Mexico City with a decisive shift toward measuring the actual effectiveness of anti-money laundering (AML) regimes rather than mere technical compliance. The Plenary approved strategic reports on cyber-enabled fraud and virtual asset risks, signaling heightened scrutiny of online scams and crypto.\n\n\n\nThe addition of Kuwait and Papua New Guinea to the \"Grey List\" and new strategic publications, targeting offshore Virtual Asset Service Providers (VSPs) signal that decentralized finance remains squarely in the crosshairs. The Plenary also adopted the first mutual evaluation reports under its new assessment cycle and appointed a new President for 2026–28, reinforcing the global push for stronger cross-border payment transparency.\n\n\n\nMeanwhile, the EU Anti-Money Laundering Authority (AMLA) is rapidly moving from concept to reality. On January 1, 2026, the EBA formally transferred all AML mandates to AMLA, centralizing European AML/CFT supervision. In March, AMLA hosted its first public hearing on draft regulatory technical standards, engaging over 1,600 stakeholders on definitions of \"business relationship\" and Customer Due Diligence (CDD).&nbsp;\n\n\n\nIn the United States, the tone from the top is similarly shifting. Federal Deposit Insurance Corporation (FDIC) Chairman Travis Hill recently emphasized that compliance should focus on real risk, explicitly supporting the adoption of AI to detect suspicious activity with the speed and precision that legacy rules-based systems cannot match.\n\n\n\nSimilarly, Office of the Comptroller of the Currency (OCC) Comptroller Jonathan Gould pushed for a move away from overly complex, process-heavy frameworks, advocating for innovation and a reduction in \"gotcha\" exams.&nbsp;\n\n\n\nFurthermore, FinCEN issued exemptive relief in February 2026 to its 2016 CDD rule, meaning banks no longer need to re-verify a customer's beneficial owners at every new account, only at initial know your customer (KYC) or on red flags. This reduces operational burden while preserving a risk-based approach. FinCEN also ran an awareness campaign on burgeoning online scams, reporting a 60% surge in \"#DatingorDefrauding\" schemes involving AI-generated fake images.\n\n\n\nThe message is straightforward: less box-checking, more openness to new technology and a return to prudent risk management. Gould went further, calling out \"reputation risk\" as a subjective supervisory tool used inconsistently, and signaling a shift toward more objective, risk-based criteria.&nbsp;\n\n\n\n\n\n\n\nFATF Grey List Movement, February 2026CountriesAddedKuwait, Papua New GuineaRemoved (2026)Burkina Faso, Mozambique, Nigeria, South AfricaBlack List (unchanged)North Korea, Iran, Myanmar\n\n\n\nRegional Regulatory Highlights\n\n\n\nThe start of 2026 has seen a wave of regulatory momentum across all major jurisdictions, reinforcing the convergence of fraud and AML compliance globally.\n\n\n\n\nAmericas: On the enforcement front, regulators at both federal and state levels have been highly active. FINRA fined Cetera Financial Group's affiliates approximately $1.1 million for AML program failures, while California's regulator fined Nexo Capital $500,000 for offering crypto loans without a license. These actions reflect a \"no-soft-touch\" trend following high-profile DOJ fines on crypto firms last year. In Canada, FINTRAC has focused on educating new reporting sectors and preparing businesses for the October 2026 beneficial ownership registry obligations, signaling a clear trend toward greater transparency of corporate ownership.\n\n\n\nEurope &amp; UK: Member states continue to align their national laws with the EU AML Regulation and Directive. The first Annual AML Peer Review by the European Commission assessed supervisory convergence, and the EU finalized its high-risk third-country list. The UK consolidated its sanctions lists into a Single Sanctions List as of January 28, 2026, and is moving ahead with its own AML reforms. The FCA issued guidance on its impending \"crypto authorization gateway,\" requiring firms to seek permission from late 2026 onward.\n\n\n\nAsia-Pacific: The Monetary Authority of Singapore (MAS) emphasized the effective implementation of its recent AML Notice updates, held industry workshops and signaled strict enforcement. Japan's FSA released new guidance to strengthen AML oversight for regional banks and crypto exchanges, while South Korea debated closing loopholes in crypto regulation. Across the region, regulators are focusing on AML issues related to virtual assets and exploring how to extend controls to online gaming and payment apps.\n\n\n\nMiddle East &amp; Africa: The Gulf states pressed forward on enforcement. Dubai regulators ramped up unannounced AML inspections of virtual asset service providers, and the UAE Central Bank published detailed AML guidelines covering proliferation financing. Notably, Nigeria was removed from FATF's grey list and the EU's AML high-risk list, a vindication of its recent reforms. Overall, the region is adopting FATF-style reforms and chasing down predicate crimes with new AML tools.\n\n\n\n\nInsights from the Frontlines: Bridging the AML &amp; Fraud Divide\n\n\n\nA recurring topic was the convergence of fraud and AML. Five or ten years ago, fraud was treated as a commercial issue, something managed internally. Today, with initiatives such as the UK's Failure to Prevent Fraud offense and the EU's single rulebook, regulators are treating fraud as a core compliance obligation.\n\n\n\nThis convergence requires a fundamental change in how we use data. The Wolfsberg Group's latest guidance urges institutions to incorporate dynamic customer data alongside static KYC data. What does this mean in practice? It means going beyond the basic details collected at onboarding and utilizing the digital fingerprints customers leave as they transact.\n\n\n\nFraud systems already capture device IDs, IP addresses, login velocity and behavioral anomalies. This data is absolute gold for AML. By integrating fraud intelligence into AML monitoring, institutions can spot anomalies that static KYC will never catch. However, data enrichment only works if it improves the signal-to-noise ratio. It requires rigorous governance, relevance to high-risk segments and continuous feedback loops.\n\n\n\nConsortium data has become a real differentiator. When banks and fintechs share anonymized fraud intelligence, whether that's device fingerprints, behavioral anomalies or mule account patterns, everyone's detection improves. Regulators already recognize this approach as a best practice: collaborative, privacy-respecting and focused on effectiveness.\n\n\n\nThe RegTech Paradox: Technology Amplifies Judgment\n\n\n\nOne of the most striking findings discussed was from the European Banking Authority, which noted that over half of serious compliance failures reported to its EuReCA database were linked to the improper or unthinking use of RegTech. This is the RegTech paradox: technology designed to reduce compliance risk is often a source of risk itself.\n\n\n\nThe failure is rarely the technology; it is the governance. Too often, firms purchase powerful systems and run them \"out of the box\" with minimal tuning, no ownership and little understanding of how the underlying models work. Automation without understanding simply shifts the problem from humans to machines. The goal must be human-led, tech-enabled compliance.\n\n\n\nAt SEON, we take the same approach, working closely with our customers throughout every implementation. The best outcomes happen when providers and clients build together. The vendor brings deep technical expertise, while the institution brings an understanding of its unique risk profile. The emerging expectations from regulators are threefold: explainability, data quality and human oversight.\n\n\n\nThis requires three pillars:\n\n\n\n\nTransparency and Explainability: No blackboxes. Firms must understand how models make decisions and be able to explain them to regulators in plain language.\n\n\n\nGovernance Frameworks: RegTech must be treated like any risk model, validated, back-tested and continuously monitored with active QA.\n\n\n\nCo-Design and Calibration: The best outcomes occur when vendors and financial institutions build together. The vendor brings technical expertise; the institution brings its unique risk context.\n\n\n\n\nThe Enforcement Landscape: Record Penalties, Personal Accountability\n\n\n\nThe enforcement data tells a stark story. Globally, regulators imposed roughly $1.23 billion in AML penalties in H1 2025 alone, a 417% increase versus H1 2024. This momentum has continued into 2026, reflecting regulators' zero-tolerance stance on AML/CFT lapses.&nbsp;\n\n\n\nA notable trend is the growing number of actions against individuals. In Europe, the Swedbank case saw an appeals court uphold a former CEO's conviction for misleading statements about AML controls. In the Gulf, regulators have begun publicly naming compliance officers who presided over egregious failures. The Financial Conduct Authority (FCA) in the UK has banned individuals from the financial services industry for AML breaches. This shift toward personal accountability is expected to accelerate.\n\n\n\nEntityRegulatorAmountIssueCanaccord GenuityFinCEN (US)$80MAML program failuresCapital Asia InvestmentsMAS (Singapore)S$160M+Asset seizure, ML concernsSaxo BankFinanstilsynet (Denmark)€40M+Inadequate CDD and monitoringJ.P. Morgan (Germany)BaFin (EU)€45MAML control deficienciesCaixaBankSpanish Authorities€30MAML failures in real estate transactionsCoinbase EuropeCBI (Ireland)€21.5MTransaction monitoring failuresBarclays PLCFCA (UK)€1.65MAML compliance gapsCetera Financial GroupFINRA (US)$1.1MAML program breachesNexo CapitalCalifornia (US)$500KUnlicensed crypto lendingRakuten Europe BankCSSF (Luxembourg)€185KAML/CFT compliance deficienciesBank of ScotlandOFSI (UK)£160KSanctions screening failuresOKXDOJ (US, EU, UAE)$504MUnlicensed money transmitting\n\n\n\nThese actions show that no institution is immune: global banks, digital-first challengers and even tech-savvy crypto firms are being held to strict standards. Regulators will drill down on execution, not just frameworks.\n\n\n\nAML &amp; Fraud Trends\n\n\n\nAs we analyze the Q1 2026 data, several distinct trends have emerged that demand immediate attention from risk leaders.\n\n\n\nAI, Deepfakes and the Evolution of IDV \n\n\n\nFraudsters are exploiting genAI at scale. Industry research cautions that AI is now the biggest threat in financial crime, with criminals using it to create synthetic identities and highly convincing phishing content. We are seeing the rise of \"all-green fraud,\" where scams succeed even in fully authenticated sessions. Regulators such as FinCEN and Wolfsberg have warned about deepfake scams. In response, Identity Verification (IDV) is no longer a simple checkbox. Firms are overhauling their IDV processes to require robust liveness detection software, advanced biometric checks, and dynamic document verification. Static identity checks are obsolete; continuous, layered AI defenses with human oversight are now mandatory.\n\n\n\nPayment and Open-Banking Fraud \n\n\n\nFaster rails have enabled new scam typologies. The latest ECB/EBA report shows EU payment fraud jumping to €4.2 billion in 2024. Much of this is due to social engineering, with 85% of credit transfer fraud losses borne by users tricked into authorizing transfers. Authorized Push Payment (APP) fraud is on the rise, emphasizing the need for real-time anomaly detection and consumer alerts.\n\n\n\nCrypto, Stablecoins, and Innovation Controls \n\n\n\nThe dynamic crypto landscape remains a major risk area. The EU's MiCA regime requires strict AML/CFT rules. In the US, the GENIUS Act (July 2025) officially brought stablecoins under the Bank Secrecy Act (BSA). Crucially, regulators are no longer trying to banish these assets; the OCC has positioned itself as supportive of bringing stablecoins and new financial infrastructure into a regulated framework rather than pushing them out of the system. Institutions know that any significant compliance failure in this maturing space will attract massive regulatory scrutiny.\n\n\n\nHigh-Risk Jurisdictions and Sanctions\n\n\n\nA shifting country-risk landscape demands attention. The continuation of the Russia-Ukraine war and new Middle East tensions have led to rapidly expanding sanctions lists. Regulators have stressed the need for automated, real-time sanctions screening and cautioned against circumvention. Firms are building \"evergreen\" sanctions programs that automatically update lists and ensure suspicious cases receive swift analyst attention.\n\n\n\nCollaboration and Data Sharing\n\n\n\nIn response to sophisticated schemes, public-private consortia and utilities are expanding. Consortiums now share anonymized fraud indicators, enabling all members to detect threats earlier. Global AML networks are growing, and intelligence-sharing is now recognized as a core part of the risk-based approach, significantly reducing false positives and surfacing cross-border networks faster.\n\n\n\nBuilding for Change: Compliance as Core Architecture\n\n\n\nIf regulations will keep changing, and all signs suggest they will, organizations need to focus less on specific rules and more on building resilient foundations. In my panel discussions, I emphasized a critical shift: from fragmented point solutions to integrated risk infrastructure. Real-time decisioning, explainability and global adaptability are now baseline expectations.\n\n\n\nAs we move further into 2026, the compliance playbook must evolve. Here are the five capabilities I highlight for resilience:\n\n\n\n\nBuild Flexible Compliance Architecture: Compliance systems should be architected, not patched. Integrate fraud, IDV, KYC, transaction monitoring and analytics into a single platform. Equip them for real-time scoring and easy rule updates to meet new regulations without costly re-engineering.\n\n\n\nLeverage Advanced Analytics Responsibly: Analytics and AI are now table stakes. Use machine learning models to detect complex patterns and adapt to new typologies, but ensure explainability. Maintain rigorous model validation, clear audit trails and human-in-the-loop reviews.\n\n\n\nFocus on High-Risk Areas: Stay current on jurisdiction risk lists and sanctions expansions. Apply enhanced due diligence to any customer or transaction linked to flagged countries or sectors.\n\n\n\nEmphasize Governance and Data Quality: Effective compliance relies on clean data and strong processes. Maintain up-to-date customer and transaction data, test your screening systems against real variations and enforce consistent naming standards across systems.&nbsp;\n\n\n\nCollaborate and Share Intelligence: No one firm can spot every global threat. Participate in industry groups, KYC utilities and Financial Information Unit FIU consortia to share insights and typologies. Contributing analytics to a central database or subscribing to reputation feeds can multiply detection coverage.\n\n\n\n\nTechnology shouldn't just satisfy compliance; it should add business value. Fraud controls can absolutely be a competitive differentiator. When you prevent fraud effectively, you protect revenue, reduce chargebacks and strengthen customer trust. And when you do it with the right technology, you reduce friction for good customers, which, in turn, drives growth.\n\n\n\nKey Takeaway\n\n\n\nIf there is one priority for compliance leaders this year, it is this: Treat fraud and compliance infrastructure as core business architecture, not just operational tooling. When fraud controls are built on strong data, shared governance and flexible technology, they cease to be a \"necessary evil.\" Instead, they become a strategic asset, a competitive differentiator that protects revenue, satisfies regulators and enhances the customer experience. The future of compliance is about using technology and collaboration to make fraud prevention measurable, explainable and genuinely value-adding."}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/financial-crime-compliance-q1-trends/","url":"https://seon.io/resources/financial-crime-compliance-q1-trends/","name":"Financial Crime Compliance in Q1: Key Regulatory Shifts &amp; AML Trends - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/financial-crime-compliance-q1-trends/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2026/04/Financial-Crime-Compliance-in-Q1_-Key-Regulatory-Shifts-and-AML-Trends-Thumbnail.webp","datePublished":"2026-04-20T15:03:11+00:00","dateModified":"2026-04-20T15:38:43+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/financial-crime-compliance-q1-trends/#primaryimage","url":"https://seon.io/wp-content/uploads/2026/04/Financial-Crime-Compliance-in-Q1_-Key-Regulatory-Shifts-and-AML-Trends-Thumbnail.webp","contentUrl":"https://seon.io/wp-content/uploads/2026/04/Financial-Crime-Compliance-in-Q1_-Key-Regulatory-Shifts-and-AML-Trends-Thumbnail.webp","width":832,"height":468}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/psp-risk-detection-at-scale/#article","isPartOf":{"@id":"https://seon.io/resources/psp-risk-detection-at-scale/"},"author":{"name":"Ádám Vass","@id":"https://seon.io/#/schema/person/1dc48ec21a336313ac6a5ef7ede65297"},"headline":"How PSPs Detect Risk at Scale","datePublished":"2026-04-17T13:47:41+00:00","dateModified":"2026-04-17T13:49:47+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/psp-risk-detection-at-scale/"},"wordCount":1836,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/psp-risk-detection-at-scale/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","articleSection":["Article"],"inLanguage":"en-US","description":"PSPs must detect risk without direct data. Learn to manage portfolio fraud using behavioral signals and network patterns."}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/psp-risk-detection-at-scale/","url":"https://seon.io/resources/psp-risk-detection-at-scale/","name":"How PSPs Detect Risk at Scale | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/psp-risk-detection-at-scale/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","datePublished":"2026-04-17T13:47:41+00:00","dateModified":"2026-04-17T13:49:47+00:00","description":"PSPs must detect risk without direct customer data. Learn to manage fraud across merchant portfolios using behavioral signals and network patterns.","mainEntity":[{"@id":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432310421"},{"@id":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432322642"},{"@id":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432334175"},{"@id":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432345913"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/psp-risk-detection-at-scale/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-09-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432310421","position":1,"url":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432310421","name":"How do PSPs balance fraud detection and approval rates?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"PSPs must detect high-risk transactions without blocking legitimate payments. This requires a risk-based approach that evaluates transaction patterns, merchant behavior and network signals in real time, rather than relying on rigid rules that lead to unnecessary declines.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432322642","position":2,"url":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432322642","name":"How can PSPs reduce false positives without losing revenue?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Reducing false positives starts with better context. By analyzing behavioral patterns, transaction velocity and merchant-level activity, PSPs can distinguish between genuine and suspicious activity more accurately, approving more legitimate transactions while still controlling risk.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432334175","position":3,"url":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432334175","name":"How do PSPs manage latency in real-time risk decisions?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Real-time risk detection must operate within strict latency constraints to avoid slowing down payment processing. PSPs typically use lightweight scoring models and pre-configured rules that can evaluate transactions instantly, ensuring risk checks do not impact user experience or conversion rates.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432345913","position":4,"url":"https://seon.io/resources/psp-risk-detection-at-scale/#faq-question-1776432345913","name":"What is the difference between risk-based decisions and binary fraud rules?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Binary rules approve or decline transactions based on fixed thresholds, which can be too rigid at scale. Risk-based decisioning assigns a score to each transaction, allowing PSPs to take more flexible actions such as approving, reviewing or flagging activity based on overall risk levels.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Article","@id":"https://seon.io/resources/fintech-vendor-consolidation-in-2026-why-platforms-are-replacing-point-solutions/#article","isPartOf":{"@id":"https://seon.io/resources/fintech-vendor-consolidation-in-2026-why-platforms-are-replacing-point-solutions/"},"author":{"name":"Matt DeLauro","@id":"https://seon.io/#/schema/person/fbe3e4c532f2eadc9b7aa3d133c682a1"},"headline":"Fintech Vendor Consolidation in 2026: Why Platforms Are Replacing Point Solutions","datePublished":"2026-04-20T13:00:26+00:00","dateModified":"2026-04-20T13:45:33+00:00","mainEntityOfPage":{"@id":"https://seon.io/resources/fintech-vendor-consolidation-in-2026-why-platforms-are-replacing-point-solutions/"},"wordCount":972,"publisher":{"@id":"https://seon.io/#organization"},"image":{"@id":"https://seon.io/resources/fintech-vendor-consolidation-in-2026-why-platforms-are-replacing-point-solutions/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2026/04/The-Fintech-Vendor-Reckoning-Will-Take-Place-in-2026-Thumbnail.webp","articleSection":["Thought Leadership"],"inLanguage":"en-US","description":"After a decade of buying \"just one more tool,\" fintech companies are confronting an uncomfortable truth: fragmented stacks, not fraudsters, may now be their most serious vulnerability. Years of layering specialist applications for Know Your Customer (KYC), Anti-Money Laundering (AML), fraud prevention and detection, case management and reporting have left many organizations running architectures that are expensive to maintain, slow to adapt and nearly impossible to govern end-to-end.\n\n\n\nCompounding the issue, global fintech funding is down 12%&nbsp; — from $120 billion to $105 billion — indicating that capital is rotating decisively toward scalable, AI-native platforms with credible paths to profitability, and away from the narrow point solutions that defined the previous era.&nbsp;\n\n\n\nColliding with mounting regulatory pressure and deep tech-stack fatigue, the industry’s long-deferred vendor reckoning is finally here, and with it, choices that will determine which providers endure, which get absorbed into broader platforms and how operators will create the strong foundations risk and compliance infrastructure needs.\n\n\n\nA Decade of Accumulation in Fintech Stacks&nbsp;\n\n\n\nThe hyper-specialization wave that swept fintech in the early 2020s left a complicated legacy. Every new risk category or regulatory demand seemed to justify its own dedicated tool, each sold as best-of-breed, each promising painless integration. The cumulative effect was something far messier: integration debt, deepening data silos and a total cost of ownership that crept steadily beyond what anyone had budgeted for.\n\n\n\nNow the bill is due. With less than half of the world's top 70 fintechs achieving profitability, standalone niche tools face an equation that no longer works. It’s a catch-22; they cannot grow without capital, and they cannot raise capital without profits. Consolidation pressure has become a permanent feature of the market, and the most fragmented architectures are already its most visible casualties.\n\n\n\n\n\n\n\nThe Forces Driving Fintech Vendor Consolidation \n\n\n\nThe buyer motion across enterprise fintech has fundamentally shifted. Organizations are no longer running quiet pilots in departmental silos and worrying about integration and governance later. Recent CIO and IT leadership research shows a clear pivot toward consolidation, as more organizations streamline overlapping tools and commit to a smaller set of core providers.\n\n\n\nCentralized vendor management, rigorous security reviews and compliance gating now sit at the front of most buying processes, raising the bar for any new tool entering a stack and accelerating the exit of tools that cannot clear it. The operating logic has moved from test-and-expand to audit, consolidate and commit.\n\n\n\nRegulatory expectations are further amplifying the pressure. Supervisors are raising the bar on AI explainability, AML typology coverage and cross‑border fraud surveillance, and they are asking firms to demonstrate precisely how decisions were made and which policies governed each step. As more institutions deploy AI and real‑time monitoring in their risk programs, regulators expect transparent, auditable models and integrated controls across jurisdictions, not opaque engines bolted onto the edge of the journey.\n\n\n\nThis level of accountability is nearly impossible to provide when risk signals and enforcement actions are scattered across siloed tools with no shared context. Platform consolidation has consequently shifted from a cost‑cutting initiative to a compliance and governance program, a way to close gaps before auditors and supervisors surface them in reviews or enforcement actions.&nbsp;\n\n\n\nWhat Consolidation Looks Like in Practice\n\n\n\nConsolidation in 2026 shows up directly in how vendors position themselves. The players winning deals are expanding laterally by adding adjacent modules, pulling former point solutions into their orbit and positioning themselves as the control plane across multiple workflows. Instead of solving a single slice of onboarding or transaction monitoring, they offer connected coverage across the journey, using shared data, policy engines and reporting to keep everything in sync.\n\n\n\nThe 5.15‑billion‑dollar acquisition of Brex by Capital One illustrates this shift: a major bank chose to buy an AI-native platform already spanning cards, spend and workflows rather than assembling those capabilities tool by tool. Vertical SaaS M&amp;A follows the same logic, with investors favoring suite‑level platforms that can cross‑sell into adjacent workflows over niche products with uncertain paths to scale.\n\n\n\nThe bar for surviving renewal season has never been higher, and buyers are now applying a four‑part test. First, proof: measurable outcomes tied to live deployments, not roadmap promises. Second, compliance by design: built‑in audit trails, explainable decisions and controls that satisfy regulators without a separate integration. Third, total cost of ownership: licensing, integration, maintenance and headcount. Fourth, time‑to‑value: deployment in weeks, supported by prebuilt connectors and repeatable playbooks.&nbsp;\n\n\n\nTools that cannot win on all four dimensions may survive a pilot, but their odds of clearing the next renewal cycle are shortening fast.\n\n\n\nPlatform First, Point Solutions Only When Indispensable\n\n\n\nBy the end of 2026, the default fintech buying motion will be platform‑first. Buyers will look for partners that sit on top of meaningful data, connect multiple critical workflows under a single governance layer and still make economic sense in a tighter capital environment.\n\n\n\nPoint solutions will not disappear entirely, but the test they must pass has become unforgiving. If a specialist tool doesn’t offer something clearly indispensable, it will be bundled into a broader suite, sunsetted or quietly swapped out at renewal. For fintech operators, that makes the 2026 vendor review less about shaving line items and more about closing risk gaps. A disconnected stack drains budget and blurs where risk truly moves through the business, and blind spots have a habit of emerging at the worst possible moment, whether in the middle of an incident or under direct regulatory scrutiny. The reckoning, long deferred, is here.\n\n\n\n\n  Ready to Simplify Your Risk Stack?\n  Consolidating tools or rethinking fraud and compliance? Talk to SEON’s experts to see how you can cut complexity, keep coverage and move faster with a smarter, unified stack.\n  \n    Speak with an Expert"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/fintech-vendor-consolidation-in-2026-why-platforms-are-replacing-point-solutions/","url":"https://seon.io/resources/fintech-vendor-consolidation-in-2026-why-platforms-are-replacing-point-solutions/","name":"Fintech Vendor Consolidation in 2026: Why Platforms Are Replacing Point Solutions - SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/fintech-vendor-consolidation-in-2026-why-platforms-are-replacing-point-solutions/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2026/04/The-Fintech-Vendor-Reckoning-Will-Take-Place-in-2026-Thumbnail.webp","datePublished":"2026-04-20T13:00:26+00:00","dateModified":"2026-04-20T13:45:33+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/fintech-vendor-consolidation-in-2026-why-platforms-are-replacing-point-solutions/#primaryimage","url":"https://seon.io/wp-content/uploads/2026/04/The-Fintech-Vendor-Reckoning-Will-Take-Place-in-2026-Thumbnail.webp","contentUrl":"https://seon.io/wp-content/uploads/2026/04/The-Fintech-Vendor-Reckoning-Will-Take-Place-in-2026-Thumbnail.webp","width":832,"height":468}
