This article can also be found in the Premium Editorial Download "Information Security magazine: CISO survival guide: 18 of the best security tips."
Download it now to read this article plus other related content.
Who Are You?
Referencing background checks on [breakfast] (Pardon The Intrusion, January), you think you are being funny but it's already happening.
For nearly three
Apparently, at some point in time my bank sent me a piece of marketing literature in the mail advertising some new service. And for some reason, this piece of mail was sent back undeliverable. The bank made the assumption that I moved without changing my address with them, so they 9'd out my zip code on my account. So my authorization failure at the pumps was due to my bank playing Big Brother and arbitrarily changing my account information, resulting in the debit authorization failure.
Apparently this is a new practice by the banks. It took five phone calls over a course of a month before I reached a customer service rep who was able to figure out what was going on. It was extremely frustrating having to go inside to always pay, or locating stations that did not authorize with zip codes.
Hope you publish this to let your readers know the kinds of things going on.
Ceylon Security Group, LLC
Send your comments to email@example.com.
We reserve the right to edit letters for clarity and space.
Information Security magazine and SearchSecurity.com will honor innovative security practitioners in seven vertical markets this fall with our annual Security Seven Awards. The awards, to be handed out this fall at the Information Security Decisions conference in Chicago and featured in the magazine's November issue, will recognize the efforts, achievements and contributions of practitioners in financial services, telecommunications, manufacturing, energy, government, education and health care.
While vendor executives are not eligible, we're inviting you to nominate your most innovative practitioners. Nominees must have made a noteworthy contribution to their organizations or the security community in areas including research, product development and standards.
Download the nomination form at www.searchsecurity.com/securityseven and email it to firstname.lastname@example.org.
Nomination Deadline: July 31
This was first published in July 2007