Remote Access — Do You Know Who Is In Your Data?

remote user

Just over 80 percent of HR managers in a recent survey gave their agencies a grade of B or C for progress in meeting the Telework Enhancement Act’s goals of using telework to achieve greater flexibility in workforce management Letting workers access sensitive systems and data from off-site locations and, potentially, using uncontrolled devices raises a [Read More...]

Combating Identity Misuse and Fraud in a Global, Social Economy

shutterstock_120012388

Illicit use of identities has been occurring for many years; however, due to the faceless nature of e-commerce and now consumer banking, the impacts are being felt in a painful way across all industries. It is not uncommon for fraud losses to be measured in the tens of millions of dollars, and these losses have [Read More...]

Assessing Risk for the Best Fraud Prevention

Revolving Door

Leading analysts have called for a layered security model to protect against online fraud, account take-over, and financial loss.  Trends are also showing that businesses need to improve the interactive end user experience by minimizing intrusive authentication methods while still maintaining security for online transactions and reducing the opportunities for fraud. There is a way [Read More...]

States react to data breaches and potential identity fraud

shutterstock_119788786

The state of Montana recently announced that a server at the Montana Department of Public Health and Human Services was hacked in May, exposing 1.3 million records potentially including names, addresses, birth dates and Social Security numbers. In 2012, a data breach at the South Carolina Department of Revenue exposed tax records and financial information [Read More...]

Improving Patient Outcomes through Secure Data Exchanges

shutterstock_32336797

Michael Nelson recently presented at the WEDI Annual Conference on the topic of Secure Medical Record Exchanges. Sharing patient information across healthcare networks helps providers offer better care, improve patient outcomes, and reduce costs. However, as more and more health information becomes available electronically through secure data exchanges – Electronic Health Records (EHRs) and Health [Read More...]

Fraud Prevention ‘Best Practices’ Video

Fraud Best Practices video

We have recently released a video interview with Gasan Awad, Identity and Fraud Product Leader, offering insight and best practices for financial institutions to minimize fraud and identity misuse from account acquisition through post-acquisition transactions that are high-risk for account take-over and theft. Mr. Awad highlights the importance of a layered defense to minimize fraud [Read More...]

Protecting Against Willful Compromise

shutterstock_5675935

A lock is easily opened when the owner gives the key to somebody else. This is true for gaining access to online accounts with passwords as well as second factor authentication tokens and smart cards. A person can willfully share their credentials for a number of reasons. A husband may share password and token with [Read More...]

Agency Fight against Fraud and Identity Theft

Maximize Your WOTC ROI

In the Final Report issued on March 28, 2014 , the office of the Treasury Inspector General for Tax Administration said that it identified and confirmed 28,076 fraudulent tax returns involving identity theft. “Identity theft is one of the fastest growing crimes nationwide, and refund fraud caused by identity theft is one of the biggest [Read More...]

Authentication and Encryption Working Together

shutterstock_127894739

As online traffic increases, organizations are making decisions about appropriate levels of authentication for their consumer-facing portals. These organizations are determining how authentication “speed bumps” in front of consumers affect adoption and use because they want to make it easy for a consumer to get to his data. The problem, of course, is that making it easy [Read More...]