Remote Access — Do You Know Who Is In Your Data?

remote user

Just over 80 percent of HR managers in a recent survey gave their agencies a grade of B or C for progress in meeting the Telework Enhancement Act’s goals of using telework to achieve greater flexibility in workforce management Letting workers access sensitive systems and data from off-site locations and, potentially, using uncontrolled devices raises a [Read More...]

Authentication and Encryption Working Together


As online traffic increases, organizations are making decisions about appropriate levels of authentication for their consumer-facing portals. These organizations are determining how authentication “speed bumps” in front of consumers affect adoption and use because they want to make it easy for a consumer to get to his data. The problem, of course, is that making it easy [Read More...]

Authentication and “Defense-in-Depth”

Electronic Signature Security

In all successful data security systems, the goal of the organization should be to combine multiple authentication strategies with the right combination of enterprise security solutions to better assure the organization that the user on the opposite end of the online transaction is the person the company expects to be executing that specific transaction. Authentication [Read More...]

Government Big Data & Identity Intelligence


We were just at the Government Big Data and BI Summit where we presented on applying fraud lessons from the financial sector to agency program integrity and using big data to improve identity intelligence. Trends in fraud management in the commercial sector have evolved as fraudsters have become more sophisticated about hiding under a stolen [Read More...]

Data for KBA Questions Matters


News about data breaches seems to be never-ending over the past few years. One of the latest is the major customer identities hack of Adobe Software and news that 38 million customer accounts were exposed.  Along with other high profile breaches, the exposure of so much data that can be used to impersonate someone invites [Read More...]

Third-Factor Authentication Cannot be Lost, Stolen, or Forgotten


Do you have a list of passwords written down and hiding in a desk drawer? Have you ever lost your cell phone or the hard security token that is usually dropped in the bottom of your briefcase?  Have you struggled to answer the “challenge questions” presented at login? First-factor and second-factor secure authentication methods have [Read More...]

Preventing Real-Time Fraud – Combining Device Information and Risk-Based Authentication


Recently, after purchasing a new iPad, I decided to configure it to access my mobile banking account.  After loading the mobile banking application and logging in using my standard credentials, I realized no further authentication was required. So why didn’t I get challenged when I used the new device?  I am set up to receive [Read More...]

Six Degrees of Separation – Linking and Correlating Data Points


Have you ever played “Six Degrees of Kevin Bacon?” The original premise being that everyone in Hollywood was connected somehow, within 6 relationships, to prolific actor Kevin Bacon.  The game extended to see how many non-actors could be connected within the same six degrees of separation. In today’s networked world “six degrees of separation” is [Read More...]

Business Continuity through Authentication Flexibility


The Federal Emergency Management Agency defines business continuity this way, “Continuity includes all activities conducted by jurisdictions to ensure that their essential functions can be performed. This includes plans and procedures that delineate essential functions, specify succession to office and emergency delegation of authority, provide for the safekeeping of vital records and databases, identify alternate [Read More...]

Protecting Yourself Against the Internet Black Market


What can you do to safeguard against the sophisticated threats of today’s cyber-criminals? Following are some best-practice recommendations to keep in mind as you evaluate your options. Strategize – Take a step back to analyze your situation and write down your security goals. Answering the following questions is typically a good start: What data do [Read More...]