How Fraud Fits Into The Bigger Picture
New fraud prevention tools such as device fingerprinting have the potential to shift the function of fraud teams away from being simply cost centres towards becoming an integral part of operators’ sales and marketing effort, says iovation’s Eddie Glenn. Download the PDF and go to page 106 to read the entire article.
How to protect yourself after the Equifax data breach
Fraud Protection expert Dwayne Melancon is the VP of Product at iovation. He says it’s a good idea to freeze your credit immediately. “Regardless of whether you’re affected or not, I recommend freezing your credit report. So you can either go to each of the three credit bureaus individually, or you can go to a aggregator. There are a lot of services like Lifelock or Identity Guard that will do that work for you. They’ll work with all three credit bureaus and freeze your credit.”
Identity Verification Becomes Trickier in Wake of Equifax Breach
While financial firms and other companies targeted by cyber-criminals and fraudsters have begun moving away from using such “knowledge-based factors” to verify their customers, most companies are not so sophisticated, Dwayne Melancon, vice president of product for fraud-prevention firm iovation, told eWEEK. “Companies that are relying on knowledge-based assessments—they may need to add additional factors,” he said. “They need extra safeguards— some which will be burdensome, such as proof using documentation—others could use some sort of device-based check.”
Dos and Don’ts to solidify your security approach
As our world grows more connected and hackers become more sophisticated, businesses need to plan ahead and act fast to protect sensitive information and bolster their cybersecurity approach. Read on for a few dos and don’ts on how businesses can fortify their security posture and avoid being a target of cybercrime.
Gaming the system for a better experience
I play a lot of video games and one of the things I’ve noticed is that when you first start playing, the game often keeps you from venturing into places where you’re likely to fail... That got me thinking: is there an equivalent model we can use for providing more access in our corporate or application environments? Using a combination of authentication and access privileges, it seems we ought to be able to create an environment in which we start them off with less complicated capabilities in our systems and software, then gradually “unlock achievements” for them as they demonstrate competency within our world.
How Portland software companies are turning a European threat into an opportunity
iovation, whose software is used for online fraud detection, in January hired Weston to spearhead GDPR efforts and tap his expertise as a privacy expert based in the United Kingdom. The company has a working group of managers tackling GDPR. So far, Weston said the company hasn’t introduced any major product changes but other elements of the business have been impacted. “Behaviorally, the way the data is handled — who it’s shared with and how long it’s kept — all that has come under scrutiny,” he said. “It’s good practice for anyone. I have been fortunate the executive team realized the challenges and opportunities ahead.”
How To Stay Cybersecure This Summer Vacation
Ahhhhh, summer. It’s officially here. The sun is shining, the birds are chirping and would-be fraudsters are eager to launch their latest cyberattacks against relaxed, unsuspecting vacationers. Their newest tools can compromise your identity faster than your email can send an “Out of Office” response. Whether you’re hitting the same old beach town or taking a cycling tour of Provence, follow these Top Five steps to stay cyber secure while soaking up the sun.
Are your corporate cyber defenses adequate?
Most of the organizations I speak with are talking about cyber-risk these days, and for good reason. Unfortunately, many of them are doing a lot more talking than actually doing. Some of this is human nature – threats are “somebody else’s” problem until they hit close to home, and it’s no different in cybersecurity. Often, the risk only starts to feel real once it’s too late.
Five Steps Businesses Can Take To Make Two-Factor Authentication Better And More Secure
The best way to combat the shortcomings of SMS based 2FA isn’t to just move where that authentication code is received—some 2FA alternatives provide codes generated standalone apps, which would require compromising a device itself to access—but to change how login attempts are authenticated. "The world that we're going into is going to require multiple factors,” Thelander said. “It's going to require layers of authentication that can be delivered at a point and time based on the level of risk of what a user is trying to do and the level of risk that is detected."
11 places you should never use a debit card
In fact, the number of debit and credit cards that were exposed to hacking efforts at U.S. ATMs and stores jumped 70% in 2016, according to a report from data analytics and credit scoring company, Fair Isaac Corporation (FICO).In addition, what’s known as “card-not-present” fraud — fraudulent transactions that occur when the card isn’t physically present — is expected to cost merchants and retailers $7.2 billion by 2020, according to a report by iovation, a provider of digital intelligence for fraud prevention.