Understanding the power of digital identity

SMART Access & Identity 2024 Access Control & Identity Management, Security Services & Risk Management, Financial (Industry)


Shanaaz Trethewey.

The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions. Shanaaz Trethewey, Chief Operating Officer for Comcorp South Africa, emphasises the pivotal role of individuals’ digital identities in unlocking this transformative potential.

In South Africa, where an estimated 38 million people are above 18, a significant proportion of the population can transact as adults. However, only a fraction of them (one in six) can provide verifiable income through a payslip, leading to increased risk and the need for extensive checks and balances in transactions.

Astonishingly, the country processes approximately four million credit applications each month, resulting in 48 million applications annually that invariably require proof of identity, often involving multiple verification checks during the transaction process. This number does not even account for verifications at healthcare facilities, educational institutions, and insurance claims, to name a few other examples.

An individual’s identity journey has evolved considerably over time. In the 1950s, manual registers and handshakes, to paper form, were all it took before being replaced with ID books and smart cards that stored various personal information, for example, on a bank card.

“The advent of fingerprint biometric technology today has shifted the focus to appreciating the uniqueness of individuals. Digital identity is no longer just a tool; it represents a vision of seamless interaction and integration in all sectors of our economy, but especially finance,” says Trethewey.

Digital inclusion and the role of digital identity in enabling frictionless transactions is another crucial factor in unlocking an individual’s potential for economic engagement. Platforms that facilitate the ease of fund exchange internationally exemplify the growing union between technology and financial activities.

“Companies across the globe are already leveraging open banking capabilities to provide digital identity verification services, bypassing traditional waiting periods. In emerging economies, the speed and efficiency of digital payment platforms like WhatsApp Pay in India and Brazil, for example, have facilitated the flow of money, reducing reliance on cash transactions and contributing to the formalisation of economies,” she adds.

As always, the concept of consent within the realm of digital identity holds immense significance. Trethewey emphasises the need for critical analysis of what consent entails and the opportunity it presents to revolutionise how individuals interact with the world and access products and services.

How the future may look

As artificial intelligence proliferates and identity fraud becomes a pressing concern, the need for robust tools to ensure undeniable identity verification will only grow. Trethewey urges businesses to embrace the evolving landscape and adopt sophisticated solutions to combat identity fraud while harnessing the potential of AI.

Trethewey suggests these three powerful principles to guide businesses in this transformative era:

1. Returning to first principles: This is vital, as adding layers to legacy systems may not address the underlying challenges effectively. The business community needs clarity on what they need to achieve. Taking a step back is critical to understanding what served us well in the past, but may not be relevant anymore.

2. Seeing the bigger picture: Adopting a holistic approach and viewing organisations beyond silos is crucial for unlocking a broader range of commercial opportunities. Things like eliminating duplication within a singular organisation can only be done if we take a step back and take stock.

3. Competitive collaboration: This fosters leveraging technical skills and business strengths, amplifying market reach, and unlocking true market potential. A culture of working together rather than solely competing against each other encourages the joint pursuit of mutually beneficial opportunities.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...
Linking of security officers by security businesses
PSiRA (Private Security Ind. Regulatory Authority) News & Events Security Services & Risk Management
[Sponsored] By law, all security businesses are required to declare their employees to PSiRA so that they can be accounted for administratively. Failure to link employees by security businesses is a contravention of the Code of Conduct and a criminal offence.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...