Is online identity theft real?
Legacy signals
Legacy popularity: 808 legacy views
I find it ironic how some security firms like to dismiss online identity theft based upon the FBI/CSI study especially since 56% of all breaches were classified as “Don’t know how information was taken”. How is that possible?
If a legitimate user name and password is used to access a computer, it is not flagged as a breach. Data thieves want to be able to access data and remain invisible for as long as they can. That is why there are groups out there that will pay for user names and passwords. We have seen dishonest employees, outside service personnel, visitors and anyone else who may have access to a company been responsible for copying passwords. Recently some ex-directors of a company paid current employees for passwords to their old company’s network.
Just by the way employees manage their passwords makes it so easy for people to steal and sell passwords. Post-it Notes with passwords are copied using a cell phone camera. Phishing emails requesting information. People assign weak passwords that can be broken quickly. No matter how it is done, the point is that people are the weakest link to their own security.
So yes, online identity theft is real but often unrealized and undetected for a long time.
Solution: A password security management solutions. There are many different solutions out there: Software, tokens, biometrics, and smartcards. As the CEO of a company that offers a smartcard based, password managers I do have a bias. And while I believe some solutions are far better and securer than others, I still would rather have people use something then nothing at all. Companies or technology cannot stop data breaches, but the goal has to be to make it so difficult for the thieves, yet easy for the employee, that they look for easier prey
Article author
About the Author
Access Smart is dedicated to empowering businesses and consumers to securely regain control over their digital information. Access Smart offers unique, high-quality, integrated hardware and software packages that securely manage important data over wired and wireless networks, computers, Point-of-Sale devices, kiosks, and any other device that can accept and communicate via smartcard technology.
Further reading
Further Reading
Article
Students Beware! Identity thieves are studying you!
It is probably no surprise to most adults that identity theft is one of the fastest growing types of fraud. But what may be more alarming is that people in the 18 to 29 age range are the fastest growing group of victims. One need not look too far to figure out why. Today’s young people ...
Related piece
Article
Things to consider when trying to get out of debt!
On a daily basis, consumers are barraged by offerings from companies claiming they can turn their dismal credit histories around and help them achieve higher credit scores. For a fee, they promise to clean up a consumer’s credit report so they can obtain a car loan, a home mortgage or ...
Related piece
Article
Passwords Don't Have to Threaten Business Security
The emergence of the World Wide Web as a global, around the clock marketplace has opened a multitude of new opportunities to businesses which have never before been seen. Computers and global communication networks have brought vendors, customers and markets together in new and beneficial ways. Along with all of the benefits which business has gained from the information age come some downsides. New crimes have not been created by new technology, but rather new technology has given new tools to criminals to commit the same crimes as they always have.
Related piece
Article
5 Mistakes to Avoid when Dealing with a Debt Collector
Dealing with a collection agency can be a stressful experience. Not only are some debt collectors rude, but endless demanding telephone calls and letters can shake even the toughest individual. The stress and confusion that debt collectors can cause often results in consumers making mistakes that can result in future financial or legal difficulties. Here are 5 mistakes to avoid when dealing with a debt collector; 1. Conducting Business over the Telephoner
Related piece