{"id":7574,"date":"2017-10-19T09:11:19","date_gmt":"2017-10-19T13:11:19","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=7574"},"modified":"2022-06-22T05:06:53","modified_gmt":"2022-06-22T09:06:53","slug":"biometrics-banking-fraudsters","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/","title":{"rendered":"Biometrics in Banking: Central Database To Blacklist Fraudsters"},"content":{"rendered":"<p>Data breaches in banking has seemingly become a regular occurrence all over the world. Till most recently a majority of banks and financial institutions relied on old password based security systems which make things effortless for fraudsters to breach banking data. Banks have already lost millions and are now looking for a stable solution against the data breach problem.<\/p>\n<figure id=\"attachment_7567\" aria-describedby=\"caption-attachment-7567\" style=\"width: 1920px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7567 size-full\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/10\/cyber-security-1923446_1920.png\" alt=\"Biometrics in Banking\" width=\"1920\" height=\"1228\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/10\/cyber-security-1923446_1920.png 1920w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/10\/cyber-security-1923446_1920-300x192.png 300w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/10\/cyber-security-1923446_1920-768x491.png 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/10\/cyber-security-1923446_1920-1024x655.png 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/10\/cyber-security-1923446_1920-606x388.png 606w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><figcaption id=\"caption-attachment-7567\" class=\"wp-caption-text\">Biometrics in Banking <a href=\"https:\/\/pixabay.com\/en\/cyber-security-internet-security-1923446\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Pixabay<\/a><\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">The United States has faced all-time record high of 1,093 data breaches in banks this past year alone. This is an increase of 40% in 2016 from last year, reported by the<\/span> <span style=\"font-weight: 400;\">Identity Theft Resource Center (ITRC)<\/span> <span style=\"font-weight: 400;\">. You may have heard of Tesco, a British retail bank that was affected by a<\/span><a href=\"https:\/\/www.telegraph.co.uk\/business\/2016\/11\/07\/tesco-bank-to-freeze-customer-transactions-after-hacking-attack\/\"> <span style=\"font-weight: 400;\">massive data breach<\/span><\/a><span style=\"font-weight: 400;\"> of their 40,000 accounts and even had money fraudulently withdrawn from 20,000 accounts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another notable incident was<\/span><a href=\"https:\/\/www.bankrate.com\/finance\/banking\/us-data-breaches-5.aspx\"> <span style=\"font-weight: 400;\">JPMorgan Chase\u2019s case<\/span><\/a><span style=\"font-weight: 400;\"> in 2014 where personal information from 76 million households and 7 million small businesses were affected which ultimately ended up costing them over <\/span><b>$1 billion<\/b><span style=\"font-weight: 400;\">. Cybercrime in commercial banking is<\/span> <span style=\"font-weight: 400;\">rapidly increasing in Nigeria<\/span> <span style=\"font-weight: 400;\">, card fraud has increased by <\/span><b>13%<\/b><span style=\"font-weight: 400;\"> reported by<\/span><span style=\"font-weight: 400;\">South African banking industry<\/span><span style=\"font-weight: 400;\">, which had costed 25.3 million U.S. dollars in 2015 and up to 28.6 million dollars in 2016. Bangladesh\u2019s banks are also facing<\/span><a href=\"https:\/\/businessnews-bd.net\/bangladesh-bank-probing-hi-tech-atm-frauds\/\"> <span style=\"font-weight: 400;\">hi-tech ATM fraud<\/span><\/a><span style=\"font-weight: 400;\"> hacking. This is just the tip of the iceberg, there are reportedly hundreds of incidents of data breaches in banking alone.<\/span><\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/CertisID-for-Financial-Services.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CertisID\u2122<\/span><\/h2>\r\n\t\t\t<h3>Financial Services Biometric Identification Solution<\/h3>\r\n\t\t\t<div class=\"ad-area-head\"><\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>Customizable biometric identity, document management and \u2018know your customer\u2019 cloud solution for the banking and financial services industry.<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/financial-services-biometric-identification-solution-certisid\/?utm_source=Know+Your+Customer+%28KYC%29+with+Biometrics&amp;utm_source=Biometrics+in+Banking%3A+Central+Database+To+Blacklist+Fraudsters&amp;utm_medium=CertisID%E2%84%A2&amp;utm_campaign=Blog+DisplayAds&amp;utm_campaign=blog+displayAds\">Learn More <\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<p><span style=\"font-weight: 400;\">Investors and executives are taking several steps in order to ensure these persistent attacks do not occur as frequent as they have. The Bankers Committee of Nigeria has noted that they will<\/span><a href=\"https:\/\/www.vanguardngr.com\/2017\/04\/bankers-cttee-establishes-e-fraud-database-blacklist-fraudsters\/\"> <span style=\"font-weight: 400;\">implement a central e-fraud database<\/span><\/a><span style=\"font-weight: 400;\"> to blacklist suspected fraudsters. To do this, every bank checks against a central biometrics database before opening an account. Nigerian banks also agreed to implement such technology in order to streamline this process.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mr. Herbert Wigwe, the Managing Director\/Chief Executive of Access Bank Plc, said:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\u201cPart of the deliberation was that there is need to create a central depositary which is a database of suspected fraud through the system.\u201d<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">\u201cOnce that data base is set up and there is suspected case going through the system we can have ways of ensuring there is strong deterrent for people who are known as fraudsters within the system\u201d<\/span><\/i><span style=\"font-weight: 400;\">, he added.<\/span><\/p>\n<figure id=\"attachment_7450\" aria-describedby=\"caption-attachment-7450\" style=\"width: 728px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.m2sys.com\/cloudscanr-application-for-biometric-device-integration-with-web-service\/?utm_source=Blacklist%20Fraudsters&amp;utm_medium=CloudScnr&amp;utm_campaign=Blog-DisplayAds\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7450 size-full\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2010\/08\/CloudScnr-2.png\" alt=\"CloudScnr\" width=\"728\" height=\"90\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2010\/08\/CloudScnr-2.png 728w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2010\/08\/CloudScnr-2-300x37.png 300w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2010\/08\/CloudScnr-2-606x75.png 606w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/a><figcaption id=\"caption-attachment-7450\" class=\"wp-caption-text\">CloudScnr<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">M2SYS Technology has also provided biometric technology to combat fraud in banking.<\/span><a href=\"https:\/\/www.m2sys.com\/blog\/case-study-biometric-authentication-system-for-customer-identification-in-arig-bank-identification\/\"> <span style=\"font-weight: 400;\">Arig Bank of Mongolia<\/span><\/a><span style=\"font-weight: 400;\"> is using finger vein technology to authenticate more than 400,000 customers.<\/span><a href=\"https:\/\/www.m2sys.com\/blog\/case-study-on-biometric-bank-account-holder-identification-system\/\"> <span style=\"font-weight: 400;\">Unibank of Haiti<\/span><\/a><span style=\"font-weight: 400;\"> has also implemented fingerprint biometrics from M2SYS to tighten their security. Costa Rican conglomerate, <\/span><a href=\"https:\/\/www.m2sys.com\/blog\/case-study-grupo-monge-deployment-of-biometrics-for-customer-identification-in-micro-credit-loan-system\/\"> <span style=\"font-weight: 400;\">Grupo Monge deployed<\/span><\/a><span style=\"font-weight: 400;\"> M2SYS\u2019s<\/span><a href=\"https:\/\/www.m2sys.com\/financial-services-biometric-identification-solution-certisid\/\"> <span style=\"font-weight: 400;\">Biometric banking solution<\/span><\/a><span style=\"font-weight: 400;\"> for customer identification in their micro credit loan system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is already proven that biometric solution is the most promising solution to prevent bank fraud. Financial organizations can protect branch banking, online banking, ATM networks, and mobile banking through biometric solution. To gain the customer trust banks should grab the most secure biometric solutions at the same time it has to be convenient too.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data breaches in banking has seemingly become a regular occurrence all over the world. Till most recently a majority of<\/p>\n","protected":false},"author":392,"featured_media":16202,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"Biometrics in Banking: Central Database To Blacklist Fraudsters","_yoast_wpseo_metadesc":"Data breaching in banking is becoming alarming day by day. Is biometrics in banking the ultimate solution we are looking for?","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[54],"tags":[],"class_list":["post-7574","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-resources"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometrics in Banking: Central Database To Blacklist Fraudsters<\/title>\n<meta name=\"description\" content=\"Data breaching in banking is becoming alarming day by day. Is biometrics in banking the ultimate solution we are looking for?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometrics in Banking: Central Database To Blacklist Fraudsters\" \/>\n<meta property=\"og:description\" content=\"Data breaching in banking is becoming alarming day by day. Is biometrics in banking the ultimate solution we are looking for?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-19T13:11:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-22T09:06:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/10\/1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lucas Rider\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucas Rider\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/\"},\"author\":{\"name\":\"Lucas Rider\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c67c302bd5820ec6a61463fb3df9a783\"},\"headline\":\"Biometrics in Banking: Central Database To Blacklist Fraudsters\",\"datePublished\":\"2017-10-19T13:11:19+00:00\",\"dateModified\":\"2022-06-22T09:06:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/\"},\"wordCount\":594,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Biometric Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/\",\"name\":\"Biometrics in Banking: Central Database To Blacklist Fraudsters\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2017-10-19T13:11:19+00:00\",\"dateModified\":\"2022-06-22T09:06:53+00:00\",\"description\":\"Data breaching in banking is becoming alarming day by day. Is biometrics in banking the ultimate solution we are looking for?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometrics in Banking: Central Database To Blacklist Fraudsters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c67c302bd5820ec6a61463fb3df9a783\",\"name\":\"Lucas Rider\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a06a86bf94b08e49a6023dd44215142e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a06a86bf94b08e49a6023dd44215142e?s=96&d=mm&r=g\",\"caption\":\"Lucas Rider\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/lucas\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometrics in Banking: Central Database To Blacklist Fraudsters","description":"Data breaching in banking is becoming alarming day by day. Is biometrics in banking the ultimate solution we are looking for?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/","og_locale":"en_US","og_type":"article","og_title":"Biometrics in Banking: Central Database To Blacklist Fraudsters","og_description":"Data breaching in banking is becoming alarming day by day. Is biometrics in banking the ultimate solution we are looking for?","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2017-10-19T13:11:19+00:00","article_modified_time":"2022-06-22T09:06:53+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/10\/1.jpg","type":"image\/jpeg"}],"author":"Lucas Rider","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Lucas Rider","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/"},"author":{"name":"Lucas Rider","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c67c302bd5820ec6a61463fb3df9a783"},"headline":"Biometrics in Banking: Central Database To Blacklist Fraudsters","datePublished":"2017-10-19T13:11:19+00:00","dateModified":"2022-06-22T09:06:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/"},"wordCount":594,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Biometric Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/","name":"Biometrics in Banking: Central Database To Blacklist Fraudsters","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2017-10-19T13:11:19+00:00","dateModified":"2022-06-22T09:06:53+00:00","description":"Data breaching in banking is becoming alarming day by day. Is biometrics in banking the ultimate solution we are looking for?","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/biometrics-banking-fraudsters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometrics in Banking: Central Database To Blacklist Fraudsters"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c67c302bd5820ec6a61463fb3df9a783","name":"Lucas Rider","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a06a86bf94b08e49a6023dd44215142e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a06a86bf94b08e49a6023dd44215142e?s=96&d=mm&r=g","caption":"Lucas Rider"},"url":"https:\/\/www.m2sys.com\/blog\/author\/lucas\/"}]}},"modified_by":"Adam Willsey","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7574"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/392"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=7574"}],"version-history":[{"count":15,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7574\/revisions"}],"predecessor-version":[{"id":17599,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7574\/revisions\/17599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16202"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=7574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=7574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=7574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}