Communication from financial institutions or other critical vendors, such as email or mail, can cause a great deal of anxiety for customers, as their legitimacy is often unclear. Phishing emails also pose a risk to the sender.
Quin verifies the sender of email and mail in seconds.
Quin provides certainty that the identity of mail senders are accurate and authorized through the Verified by Quin mobile app. Quin maintains strict control regarding admittance to the Quin Network.
Quin maintains strict control regarding admittance to the Quin Network and provides certainty that the names of mail senders are appropriate and authorized. The Verified by Quin mobile app can be used to verify email on the desktop or on a mobile device, across any email client. Physical documents received from the post office can be verified to be authentic via the mobile app.
Verified by Quin provides a simple, yet robust, solution to phishing anxiety
by providing a mobile solution to determine the legitimacy of both emails and mailed documents.
Using the Quin app on their mobile device, a consumer can scan or upload a Quin code
from a letter or email and immediately determine if the communication is legitimate.
To integrate with Quin, the company's email generation process utilize Quin's API to receive Quin Codes.
With a few lines of code, companies can provide phishing-protected email.
Each Quin Code is unique per email, per recipient.
Quin Codes reused from another email will indicate obvious fraud. Quin monitors scanning by customers to look for patterns of misuse, nullifying Quin Codes as appropriate.
Continued growth of Verified by Quin benefits the entire network of members.
As consumer trust grows, internal fraud control costs will reduce for Information Providers.
Phishing attempts increased 65% from 2016 to 2017¹
76% of business reported being a victim of a phishing attack in the last year²
30% of phishing messages get opened by targeted users and 12% of those users click on the malicious attachment of link³
Nearly 1.5 million new phishing sites are created each month⁴
1 – Enterprise Phishing Resiliency and Defense Report, 2017 – https://confense.com/wp-content/uploads/2017/11/Enterprise-Phishing-Reseliency-and-Defense-Report-2017.pdf
2 – According to Wombat Security State of the Phish, 2018 – https://www.wombatsecurity.com/state-of-the-phish
3 – According to the Verizon Data Breach Investigations Report, 2018 – https://enterprise.verizon.com/resources/reports/dbir/
4 – According to the Webroot Threat Report, 2018 – https://www.webroot.com/us/en/business/resources