HSPD-12 – Ten Years On

white-house

Homeland Security Presidential Directive 12 (HSPD-12), signed by President Bush on August 27, 2004, was originally enacted to address the wide variety and differing security levels of identification credentials used to access secure facilities. The directive established standards for verifying an individual’s identity and issuing a tamper-proof credential that could be rapidly authenticated electronically. The [Read More...]

Identity Proofing Essentials for Effective Government Operations

socialServices_940x255

Who are you and how can you prove it? Seems like an easy question, yet in the digital environments where we work and live, this is no longer such a straightforward matter. Each individual is identified not only by a name, authoritative source (such as a Social Security Number, Passport, or Driver’s License), address, phone number, [Read More...]

Remote Access — Do You Know Who Is In Your Data?

remote user

Just over 80 percent of HR managers in a recent survey gave their agencies a grade of B or C for progress in meeting the Telework Enhancement Act’s goals of using telework to achieve greater flexibility in workforce management Letting workers access sensitive systems and data from off-site locations and, potentially, using uncontrolled devices raises a [Read More...]

Tax Intelligence – Maximizing WOTC ROI

August Tax Intelligence Bulletin

As the Work Opportunity Tax Credit (WOTC) is currently in hiatus status, it is more important than ever for companies that hire to ensure that their WOTC capture program is as effective as it can be to ensure maximum credit value generation once the program is renewed.  Recall that even when WOTC is in hiatus, [Read More...]

Protecting Against Willful Compromise

shutterstock_5675935

A lock is easily opened when the owner gives the key to somebody else. This is true for gaining access to online accounts with passwords as well as second factor authentication tokens and smart cards. A person can willfully share their credentials for a number of reasons. A husband may share password and token with [Read More...]

Authentication and Encryption Working Together

shutterstock_127894739

As online traffic increases, organizations are making decisions about appropriate levels of authentication for their consumer-facing portals. These organizations are determining how authentication “speed bumps” in front of consumers affect adoption and use because they want to make it easy for a consumer to get to his data. The problem, of course, is that making it easy [Read More...]

The Most Important Countdown to an Employer’s Bottom Line: Are you prepared for ACA?

ACA Compliance

The  clock is ticking on the amount of time employers have to figure out their ACA game plan. Many employers gave a sigh of relief as they thought the pressure to deal with the complicated regulations surrounding their workforce strategy was lifted from their shoulders when the Employer Mandate was delayed by one year, now [Read More...]

Authentication and “Defense-in-Depth”

Electronic Signature Security

In all successful data security systems, the goal of the organization should be to combine multiple authentication strategies with the right combination of enterprise security solutions to better assure the organization that the user on the opposite end of the online transaction is the person the company expects to be executing that specific transaction. Authentication [Read More...]

Government Big Data & Identity Intelligence

shutterstock_125574617

We were just at the Government Big Data and BI Summit where we presented on applying fraud lessons from the financial sector to agency program integrity and using big data to improve identity intelligence. Trends in fraud management in the commercial sector have evolved as fraudsters have become more sophisticated about hiding under a stolen [Read More...]

Data for KBA Questions Matters

laptop2

News about data breaches seems to be never-ending over the past few years. One of the latest is the major customer identities hack of Adobe Software and news that 38 million customer accounts were exposed.  Along with other high profile breaches, the exposure of so much data that can be used to impersonate someone invites [Read More...]