When Even the CEO of the Largest Social Network Gets Hacked …
We keep this blog focused on sharing best practices and learning in the Equifax focus areas. Periodically there are announcements from Equifax that are relevant to that. Here is an example:
Equifax made significant investments in 2010 in the general area of Identity Management. We realize that assurance of the identity of the person who you are transacting with, when the person is not in front of your employee, is a big priority for Government and Business. Trust is key to move more business processes on-line; trust is also key to reduce the risk in current on-line business processes from ever increasing sophistication of hackers.
- Do you want to do business with who the person claims to be?
- Do you know that the person is who (s)he is claiming to be?
- Can you do this without having to put a physical token on every person?
- Can you utilize voice or other biometrics to identify a person without expecting each person to carry around a retina or fingerprint scanner?
What are the barriers you see to move more of your business processes on-line?
Recommended For You
A Two-step Authentication Approach Consumers are always on the go, using digital devices to make purchases, check account balances and […]
Knowledge based authentication (KBA) has been declared dead many times over the past few years. But what is KBA and […]
On February 9, 2016, the President implemented the Cybersecurity National Action Plan (CNAP) designed “to enhance cybersecurity awareness and protections, protect […]
Protecting protected health information (PHI) requires vigilance in today’s environment of increased sharing of personal information online. National HealthIT Week […]