Access "Viewpoint: Background check faux pas"
This article is part of the July/August 2007 issue of CISO survival guide: 18 of the best security tips
Who Are You? Referencing background checks on [breakfast] (Pardon The Intrusion, January), you think you are being funny but it's already happening. For nearly three months, I've been having trouble getting authorization to buy gas at the pump using my debit card. Authorization would fail upon having to enter my zip code. This was happening to my personal debit card and business card. The response was: "Authorization Failure-Please See Cashier." Well none of the cashiers at any of the gas stations (any gas station that authorized based on zip code) couldn't explain why this was happening. So I called my bank several times before I finally found out what was going on. Apparently, at some point in time my bank sent me a piece of marketing literature in the mail advertising some new service. And for some reason, this piece of mail was sent back undeliverable. The bank made the assumption that I moved without changing my address with them, so they 9'd out my zip code on my account. So my authorization failure at the pumps was due to my bank playing Big ... Access >>>
Premium Content for Free.
Emerging Technologies: How to secure new products
New business initiatives mean new threats.
Protecting Your Brand
Customer confidence is at risk when a breach occurs.
Is perimeter security viable with Swiss cheese networks?
At Your Service: Veracode's SaaS-based application analysis
Metasploit Framework 3.0 Product Review
In this product review, learn everything about the Metasploit Framework 3.0, a penetration testing tool for Linux and Windows platforms.
- Emerging Technologies: How to secure new products
Success requires skills in business, technology and people.
Antivirus: ESET's NOD32 Antivirus 2.7
ESET's NOD32 Antivirus 2.7
Unified Threat Management: Secure Computing's Sidewinder 2150 v7
Secure Computing's Sidewinder 2150 v7
Encryption software vendors can expect challenge from hardware front
Until now, the laptop encryption market has belonged to software vendors. Learn how all that has changed.
Endpoint Security: F-Secure's Client Security 7.0
F-Secure's Client Security 7.0
- Office Politics
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...