Identity Discovery: The Global Identity Summit

The key to success in discovery of an identity is understanding how disparate data elements combine to form a conclusive identity. A remote (online or mobile) application for access or services could be from the true person or a stolen or fictitious identity. Good identity verification uses a broad range of data elements to verify the [Read More…]

Using Analytics to Power Identity Proofing

Revolving Door Turnover

Confirming the identities of an individual user in a large populations can be challenging. A government agency giving a constituent access to sign up for benefits or check records may potentially be challenged with identifying a single person among more than 230 million adults. Combating identity-based fraud on that scale can be even more challenging. While [Read More…]

Fraud Prevention: Crimes against Revenue on the Rise

WOTC Bill Renewal - law

Fraud perpetrated by or on behalf of local public assistance recipients continues to be a recurring sore spot in the ability of local jurisdictions to control growing costs, and improve revenue collections and use. “Crimes against revenue” is a particular phrase used over past years by localities seeking to address this kind of public sector [Read More…]

Webinar – ACA is Here to Stay: Best Practices for ACA Management

Webinar – ACA is Here to Stay: Best Practices for ACA Management Tuesday | July 7, 2015 | 1:00 PM EDT The Supreme Court has issued a ruling in the King v. Burwell case upholding Premium Tax Credits, or subsidies, for health insurance provided under the federal Marketplace. But what does this mean in terms [Read More…]

We’re the government. Trust us.

government_slide

Posted with premission from FCW. By Troy K. Schneider Aug 13, 2014 The Federal Housing Administration works with lenders to insure more than $1 trillion in mortgage loans. The Department of Homeland Security shares vital information with thousands of partners at the international, federal, state, local, territorial and tribal levels, as well as in the [Read More…]

HSPD-12 – Ten Years On

white-house

Homeland Security Presidential Directive 12 (HSPD-12), signed by President Bush on August 27, 2004, was originally enacted to address the wide variety and differing security levels of identification credentials used to access secure facilities. The directive established standards for verifying an individual’s identity and issuing a tamper-proof credential that could be rapidly authenticated electronically. The [Read More…]

Identity Proofing Essentials for Effective Government Operations

socialServices_940x255

Who are you and how can you prove it? Seems like an easy question, yet in the digital environments where we work and live, this is no longer such a straightforward matter. Each individual is identified not only by a name, authoritative source (such as a Social Security Number, Passport, or Driver’s License), address, phone number, [Read More…]

Remote Access — Do You Know Who Is In Your Data?

remote user

Just over 80 percent of HR managers in a recent survey gave their agencies a grade of B or C for progress in meeting the Telework Enhancement Act’s goals of using telework to achieve greater flexibility in workforce management Letting workers access sensitive systems and data from off-site locations and, potentially, using uncontrolled devices raises a [Read More…]

Protecting Against Willful Compromise

shutterstock_5675935

A lock is easily opened when the owner gives the key to somebody else. This is true for gaining access to online accounts with passwords as well as second factor authentication tokens and smart cards. A person can willfully share their credentials for a number of reasons. A husband may share password and token with [Read More…]

Authentication and Encryption Working Together

password resets

As online traffic increases, organizations are making decisions about appropriate levels of authentication for their consumer-facing portals. These organizations are determining how authentication “speed bumps” in front of consumers affect adoption and use because they want to make it easy for a consumer to get to his data. The problem, of course, is that making it easy [Read More…]