National HealthIT Week: Protecting PHI

Protecting protected health information (PHI) requires vigilance in today’s environment of increased sharing of personal information online. National HealthIT Week (Oct 5-9) highlights the importance of health IT—specifically electronic health records (EHRs) which improve the quality of healthcare delivery, increase patient safety, decrease medical errors, and strengthen the interaction between patients and healthcare providers. Protecting [Read More…]

Identity Discovery: The Global Identity Summit

The key to success in discovery of an identity is understanding how disparate data elements combine to form a conclusive identity. A remote (online or mobile) application for access or services could be from the true person or a stolen or fictitious identity. Good identity verification uses a broad range of data elements to verify the [Read More…]

Allaying concerns about fraud from third-party vendors

Companies have spent a great deal of time and money protecting their core systems and infrastructure from cyber attacks — hardening their perimeters and moving to risk-based authentication for moderate to high risk resources. The collaborative environment of modern companies also means that there are quite a few “extranets”, which allow for information sharing with partners, third-party vendors, and [Read More…]

Authentication and Permissions: Proxy Access

Should people share their web site credentials with their spouses? How about their Significant Others? According to a study on internet usage by the Pew Research Center, “Fully 67% of internet users in a marriage or committed relationship have shared an online password with their partner or spouse.” Whether or not access resulting from such credential [Read More…]

Fraud Prevention: Crimes against Revenue on the Rise

Fraud perpetrated by or on behalf of local public assistance recipients continues to be a recurring sore spot in the ability of local jurisdictions to control growing costs, and improve revenue collections and use. “Crimes against revenue” is a particular phrase used over past years by localities seeking to address this kind of public sector [Read More…]

Virginia Digital Identity Law Highlights Identity Fraud Prevention

Trusted identity credentials, managed and provided by 3rd-party identity providers as part of trust frameworks, are extremely effective mechanisms for consumers, businesses, and government agencies to use to protect their digital assets and information from online fraud. Using these credentials, instead of the common username/password identity mechanism, helps mitigate many of the risks that hackers [Read More…]

Webinar: Digital Identity Verification for Fraud Mitigation

Online and mobile commerce is increasing exponentially – unfortunately so is fraud based on stolen or fake identities. Combating identity-based fraud is challenging, but the key to success is a multi-phase approach − one that encompasses identity verification and big data for fraud mitigation. Join us for a complimentary webinar with Information Security Media Group: [Read More…]

Big Data Analytics & Fraud Detection at Atlanta ISMG Fraud Summit

Andy Smith, Senior Vice President, Equifax Enterprise Fraud, will present on Big Data Analytics & Fraud Detection at the Atlanta ISMG Fraud Summit on March 24 at the St. Regis Atlanta. Smith’s presentation will begin at 2:30 p.m. ET. As the identity and fraud threat landscape evolves, identifying vulnerabilities, as well as implementing appropriate verification and [Read More…]