Are you Failing or Prevailing Against Fraud?

The growth of identity fraud shows few signs of slowing and technology has enabled easier access to consumer data that savvy fraudsters use to build synthetic IDs. These fake IDs are then used to acquire phone, cable, electricity and related services. Particularly in the communications and utilities industries, access to stolen identities is higher than [Read More…]

Deciphering Multi-Layered Identity Proofing Strategies

Fraudsters are a smart group. With each fraud prevention method that’s introduced, they figure out ways to work around it. Organizations must be careful when using technologies that fraudsters may have compromised, but that doesn’t mean throwing everything out and starting from scratch. Equifax fraud expert, Gasan Awad, recently blogged about this for the RSA [Read More…]

Cybersecurity National Action Plan

On February 9, 2016, the President implemented the Cybersecurity National Action Plan (CNAP) designed “to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security.” Threats against business and the government are continuing with a record number of [Read More…]

Cybersecurity Information Sharing Act included in Federal Budget

On December 18, President Obama signed legislation to encourage businesses to share cyberthreat information with the federal government. The Cybersecurity Information Sharing Act (CISA) is part of the $1.1 trillion omnibus spending bill. CISA will establish a process for the government to share cyberthreat information with businesses that voluntarily agree to participate in the program. The data voluntarily [Read More…]

Combating Transaction Fraud

We have all heard the news that data breaches and the subsequent identity theft of all types is the fastest growing crime in the US today. More people and businesses are being impacted for larger dollar amounts − witness the impact of the Target and Home Depot breaches. Unfortunately, there is no such thing as [Read More…]

Sharing Cyber Threat Info to Improve Security

Last month the Senate Intelligence Committee approved a bill that would protect firms from any legal liability for sharing cyber threats with the government. This bill would set up a web portal in the Department of Homeland Security where private firms can confidentially share threat information without legal liability. The counterbalance to this sharing of information [Read More…]

Third-Factor Authentication Cannot be Lost, Stolen, or Forgotten

Do you have a list of passwords written down and hiding in a desk drawer? Have you ever lost your cell phone or the hard security token that is usually dropped in the bottom of your briefcase?  Have you struggled to answer the “challenge questions” presented at login? First-factor and second-factor secure authentication methods have [Read More…]

Protecting Yourself Against the Internet Black Market

What can you do to safeguard against the sophisticated threats of today’s cyber-criminals? Following are some best-practice recommendations to keep in mind as you evaluate your options. Strategize – Take a step back to analyze your situation and write down your security goals. Answering the following questions is typically a good start: What data do [Read More…]

The Internet Black Market – Where You Are Bought and Sold

Hacking is now a “big business,” often financially backed and operated by organized multi-national crime rings, with operations spanning multiple countries and even continents. Their value proposition is amplified by the interconnected nature of today’s environment along with the increased propensity of individuals sharing personal information online via social media and blogs. The estimated annual [Read More…]

Government Information and Analytics Summit

We were just at the Government Information and Analytics Summit where we presented on how to fight fraud with identity analytics. Here are a few points from the presentation: While raw data is valuable, how well you link and analyze the data is where the real value resides. Linking and analytics are core competencies we [Read More…]