Skip to Main Content

Blog

Invasion of the Data Snatchers 
12 | Aug

Journey uses asymmetric encryption. The solution is to use symmetric keys to encrypt personal information instead of inputting it or showing...

Read Post
TMI When All I Want Is to Refi
24 | Jul

Journey has developed an innovative approach to enabling consumers and businesses to exchange and verify information without actually exposi...

Read Post
Verified Identity in Conferencing
23 | Jul

The advent of Covid has created a tectonic shift in the importance of conferencing. At its simplest level, it allows people to work together...

Read Post
How a Journey Mobile App Can Help You
17 | Jul

Journey Mobile provides enterprise mobile solutions for its customers. Here’s how we can help your organization thrive in the mobile appli...

Read Post
The Triumvirate of Identity: Something You Know, Something You Have and Something You Are
12 | Jul

It is important for everyone to understand the elements of online identity. This guide explains the triumvirate of identity: something you k...

Read Post
Security, Identity, Efficiency and Quality Control Will Scale Successful W@H CX Platforms
07 | Jul

It has been a challenging four months in the contact center and CX industry, with news coming out every day on the successes and failures to...

Read Post
Will Identity Verification Automation Change Contact Center and CX Dynamics For Good?
29 | Jun

There is a perfect storm brewing during this time of COVID-19 as the contact center and CX industries have been forced to pivot to Work From...

Read Post
“What Was Your First Dog’s Name?” And Other Ways to Annoy Your Customers
25 | Jun

We all joke that it’s a wise idea to stay away from politics and religion in most conversations unless you’re pretty sure of how that’...

Read Post
How Establishing Customer Identity Facilitates Customer Onboarding
03 | Jun

Customer onboarding does not need to be a long, complicated process. This guide shows how establishing customer identity facilitates custome...

Read Post