Access "Knowledge-based authentication poses privacy issues"
Long, frigid winters and tough regulations forbidding utility companies from shutting off customers during the cold winter months drove a Midwestern oil company to use knowledge- based authentication (KBA) to root out fraudsters. The company, which didn't want to reveal its identity, experienced a sudden influx of new customers just before the winter. Once it got a KBA system up and running, call center operators posed a series of multiple choice questions to people seeking new accounts. Those who could answer the questions verifying their identities were set up with service while fraudsters trying to activate delinquent accounts under fake names were quickly rooted out. "People with large unpaid bills were trying to get their service turned back on for the winter," says Joram Borenstein, senior product marketing manager in RSA's identity and access assurance group; RSA the security division of EMC, provides the authentication service. "While it's tough to deny heat to someone, you can't stay in business if people are trying to defraud the system." Dynamic ... Access >>>
Premium Content for Free.
HITECH Act increases HIPAA security requirements
HIPAA security compliance has been a mixed bag but HITECH ups the ante
Creating meaningful information security metrics
by Andrew Jaquith, Forrester Research, Inc.
Learn how to develop an effective information security metrics program and pitfalls to avoid.
- HITECH Act increases HIPAA security requirements
Joining security information management systems with identity management systems boosts security
by Randall Gamby, Contributor
Integrating security information management systems with identity management systems ties policy violations and vulnerabilities to user activity
Knowledge-based authentication poses privacy issues
Knowledge-based authentication helps catch fraud, but the authentication technology poses customer privacy issues.
- Joining security information management systems with identity management systems boosts security by Randall Gamby, Contributor
Is HITECH Act a game changer?
The HITECH Act increases penalties for a lack of HIPAA security compliance but will it really improve health care security?
Develop an effective information security career plan
by Lee Kushner and Mike Murray
A successful career in information security requires an effective information security career plan
Relying on basic network intrusion detection systems isn't enough
Organizations must enhance network intrusion detection systems with supporting processes to uncover genuine threats
- Is HITECH Act a game changer?
More Premium Content Accessible For Free
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...