Page 163 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 163
A staggered approach to REAL ID rollout, or at least faltering adoption, also has a more dangerous effect
on businesses' ability to prevent ID fraud: we’ve enabled fraudsters to get ahead of the game in the
production of REAL ID fakes.
This throws the security ‘benefits’ of a REAL ID into serious debate, how secure is an identity form, if
fraudulent copies are so prevalent?
Steps to combatting REAL ID fraud
The deadline for REAL ID enforcement is quickly approaching, whether individuals and businesses are
prepared or not. There is a greater degree of risk in assuming a REAL ID is more secure than other
forms. However, with the right outlook, operational set-up, and identity verification technology,
businesses can still stay ahead of bad actors.
Cover all touchpoints with ID scanners
The best way to protect your business from rising identity fraud is to make sure all potential touchpoints
are covered. Fraudsters are tech-savvy and deliberate, and have the know-how to identify the weakest
link in your security. For physical spaces, such as stadiums, hotels, retail stores, and warehouses,
ensuring ID scanners are present at all relevant locations and entrances is a must; failing to cover just
one entrance is the same as failing to cover all of them.
Identity verification providers have worked hard to provide affordable verification solutions to all manner
of businesses, from the world’s largest hotel and automotive chains to independently run retail stores.
While the best identity verification solutions can catch the majority of fake IDs - IDScan.net’s proprietary
ID authentication solution averages 95%, and for emerging forms, such as AI-generated IDs, catch rates
increase to 99.6% - there is always a chance the very best fake document may slip through. Businesses
using ID verification solutions remain exponentially safer from the repercussions of ID fraud.
When looking for the right provider, consider the following features:
Document authentication efficacy
Authentication ID scanners use a series of light checks, typically UV, IR, and white light, and when paired
with other identity verification software, such as VeriScan Authentication, businesses can reference these
security features against each state’s template. VeriScan Authentication can also crossmatch the data
embedded in the barcodes with the ID’s text-based information.
163