Cat hidden in a roll of paper
  • Internet Fraud, Identity Fraud

Don’t Forget Context in Fraud Prevention Efforts

Every day I read about data breaches, identity theft rings, malware, and other security risks that impact individuals and businesses alike. For individuals in the identity verification and fraud prevention industries it is easy to become paranoid. The reality is that it is impossible to completely eliminate the risk of fraud; the good news is that you (probably) don’t have to.

Read Full Post

Touching Hands
  • Fraud Prevention, Identity Fraud, Internet Fraud

Fraud in Times of Crisis

I addition to the usual type of disaster-related frauds, a recent uptick in targeted phishing attacks (spear phishing an whaling) has been observed in the wild seeking to compromise business e-mail accounts. With a record number of employees working remotely due to the current crisis, the threat of compromised e-mail credentials is greater than ever.

Read Full Post

Questioning the Boss
  • Identity Fraud, Security

Questioning the Boss to Prevent Theft?

There has been a growing trend recently of cyber thieves committing high value thefts by spoofing the e-mail accounts of c-level executives to initiate unauthorized international wire transfers. These e-mails typically appear to come from the CEO or CIO, requesting that an employee perform a wire transfer....

Read Full Post

Background of Legistlative Hearing
  • Legislation, Security

Don’t Wait for the Enforcement to Begin

I’ve spoken with several companies recently that have chosen not to take the steps necessary to meet compliance because the regulations were not currently being enforced. It is not surprising that it takes time for government agencies to begin enforcing new regulations as those agencies get the operational and logistical...

Read Full Post

Two people using phones over coffee
  • Fraud Prevention, Identity Verification

A Simple Method of Verifying Identity through Phones

One-time authentication codes through SMS (text messages) have been used for a while as a method of ongoing authentication, but have traditionally been of little use for verifying the identity of a new consumer...

Read Full Post