January 27, 2026
Lets set the scene… A hacker calls your help desk, uses AI to perfectly mimic your CFO's voice, and convinces someone to reset their password. Five minutes later, your company's financial data is walking out the digital door. Sound like science fiction? It's actually Monday morning for cybersecurity teams around the world.
Here's the uncomfortable truth: while cybersecurity tools have gotten incredibly sophisticated, hackers have simply changed tactics. They're no longer just trying to brute-force their way through your firewall, they're calling your service desk and asking nicely for access.
With deepfake video and voice cloning technology becoming accessible to anyone with an internet connection, the old "trust but verify" approach is looking pretty shaky. And yes, before you say it, we know education is important. But let's be real: not everyone who uses a computer for work actually wants to use a computer for work. We can't education our way out of this problem alone.
Think of Identity Verification as the bouncer at an exclusive club, except instead of checking if you're on the list, they're checking your government-issued ID and making sure the face matches. You've probably encountered IDV before:
The concept is simple: prove you are who you say you are using official documentation, not just something you know (password) or something you have (phone for MFA).
Remember the Qantas Frequent Flyer breach that exposed millions of Australians' data? That breach happened because someone called up, impersonated a manager using voice cloning technology, and waltzed right through the security checkpoints. Yes, better processes might have prevented it. But humans are humans, we make mistakes, we have off days, and sometimes we just want to be helpful.
That's where technology comes in as the safety net. By embedding IDV into account reset and recovery workflows, you create a barrier that social engineering simply can't bypass. No matter how convincing the fake voice is, if they can't produce a government-issued ID and matching face, they're not getting in.
Most large organisations already use Identity and Access Management (IAM) solutions like Entra ID, Okta, or Ping ID. The good news? There's a growing list of ID verification providers (like Onfido, Persona, and Trulioo) that integrate seamlessly with these platforms.
The workflow is straightforward:
Your service desk is off the hook, the pressure is removed from individual judgment calls, and your security posture just got significantly stronger.
Here's something exciting for organisations in Australia: the Australian Government Digital ID System (AGDIS) is making myID available for identity verification purposes. If you're a commonwealth, state, or territory entity, you can use it right now. Private sector organisations will get access from December 2026.
Why is this a big deal? Over 15 million Australians have already set up myID, which requires verification of government-issued identities by the actual source that issues them. And unlike commercial IDV solutions, it's free.
Before you rush to implement AGDIS, consider these requirements:
It's a fantastic service if your user base is primarily Australian and you have the resources to manage the compliance requirements. Universities would significantly benefit from IDV services as they typically have a lot of very valuable intellectual property and personally identifiable information records. Unfortunately, most universities don’t invest heavily in IT and therefore budgets are low, meaning AGDIS would be an attractive option if they could validate against international students.
We can implement all the contract management processes and staff training in the world, but at the end of the day, we're all human. We make mistakes. We get tired. We want to be helpful. That's why we need technology as the backstop.
Identity Verification isn't just another security checkbox; it's the bouncer that makes sure only the right people get access to the sensitive data of your digital infrastructure. And in a world where AI can make anyone look and sound like anyone else, that bouncer just became essential.
Ready to add a bouncer to your account recovery process? Let's talk about how IDV can fit into your security strategy and which solution makes sense for your organisation.