George Tubin

George Tubin
George Tubin is Vice President at Socure and he is a recognized expert in online and mobile banking and payments security and cyber-fraud prevention. He was previously a senior research director with the leading financial services research firm CEB TowerGroup (acquired by Gartner, Inc.) where he delivered thought leadership and insights to leading financial services institutions, technology providers, and consultancies on business strategies, technologies, and market trends in retail, Internet and mobile banking, and fraud management.
Find me on:

Recent Posts

Identity verification, Manual Review

Busting 4 Identity Verification Myths

Posted by George Tubin on Jul 23, 2018

The traditional methods of identity verification—for instance when a customer wants to open a new bank account or start doing business with a new institution— are, unfortunately, stale. They just don’t work anymore. Part of the problem is that the data the traditional identity verification providers - the credit bureaus - use to verify users is the same identity data that gets stolen in breach after breach. How does it make sense to use social security numbers, addresses, and birthdays to verify an identity when that same information can be easily bought on the black market? The truth is, it doesn’t.

Fraud, Online Id Verification, equifax breach, verifying customer identity, PII

Relying on Breached Credit Bureau Data to Confirm Identity?

Posted by George Tubin on Jun 28, 2018

We’re all familiar with the stats: Last year’s Equifax breach left upwards of 145 million people’s personal identity information (PII) in the hands of fraudsters. Since 2005, more than 816 million individuals’ records were stolen in more than 4,500 reported breaches. In 2018 alone, major companies like Whole Foods, Kmart, and Under Armour have already experienced breaches, exposing hundreds of millions of customers’ personal data. Data breaches are so common now that it’s safe to assume that no one’s information is private and that we’ve all been hacked. As a result, it’s on us to think carefully about how fraudsters are actually using the PII they steal. And in order to best protect businesses and consumers, it’s on us to reconsider the traditional approaches to identity verification —which clearly aren’t working.

Download the ID+ Data Sheet


Subscribe to receive the latest Socure posts.