Smiling Florist
  • Identity Verification, Fraud Prevention

Identify Verification is Essential in Small Business E-Commerce

Amazon, eBay and other e-commerce giants continue to make online shopping a go-to source for the majority of retail needs. Online shopping can be cost-effective and convenient. However, there are risks that fraudsters can obtain the information entered on the Internet in a harmful and malicious way.

Read Full Post

Sleepless Woman
  • Identity Verification, Internet Fraud

Ashley Madison Data Breach Proves Even a Name is Valuable

Health care, government and education are common targets of data breaches. However, fraudsters are dominating headlines with a data breach of the affair-driven website, Ashley Madison. The breach gives cyber security professionals and citizens, a strong insight into how secure systems are in comparison to how safe users think their info may be.

Read Full Post

Court Building
  • Legislation, Security, Fraud Prevention

The Private Sector Must Safeguard Data as Proposed Bills Stall in Congress

Despite knowing that the government and the private sector are continuous targets for data breaches, the momentum of the proposed bill, Cybersecurity Information Sharing Act, has stalled. This comes four months after we blogged about the various cyber security bills that have been introduced into Congress. However, the Cybersecurity Information Sharing Act has survived so far, which is a bill that creates incentives for companies to share details of their cyber attacks and data breaches.

Read Full Post

  • Security

Health Care Remains a Target for Fraudsters

Despite the awareness and notoriety of health care data breaches, such as Anthem Blue Cross Blue Shield and Premera, breaches are consistently occurring. Most recently, UCLA Health and St. Francis Health were compromised in different ways. While a segment of the media is calling 2015 the year of the health care attacks, how does this year really compare to the past?

Read Full Post

EVS analyzes peer-to-peer payments in new blog post
  • Phone Verification

Apple’s Latest Patent Application Focuses on Peer-to-Peer Payments

Big box retailers to luxury goods—data breaches happen frequently and to all types of companies. It can be a difficult transition from cash, which omits personally identifying information to credit and debit cards that store data. However, credit cards and debit cards can simplify and expedite payment transactions through mobile payment and digital wallet services, which has the potential to transition into peer-to-peer payments.

Read Full Post