Home | Solutions Blog | Authentication
Posts tagged "Authentication"
[youtube http://www.youtube.com/watch?v=UYTp1T2Mqvo&rel=0]
Watch Tech Geek Curtis Nasalbaum’s Response from the Leonard Nimoy Cruise
Every year, several of my keynote speeches are to ultra-high-wealth audiences. Because they have a lot of net worth to protect, their incentive to prevent identity theft and online fraud is on steroids. But for the average family with a normal amount of wealth, the incentive is just as important, because their wealth (albeit smaller), is just as vital to their lifestyle as it is to the wealthy.
And this isn’t just about wealth. All of us want to be able to keep hackers out of our private and often valuable online accounts, including: Gmail, Facebook, Dropbox, Twitter, Hotmail, Yahoo, banks, investment companies and all types of sensitive communications.
Posted in Burning Questions (Video), Online Privacy, Video Tips by Identity Theft Speaker John Sileo.
Tags: Authentication, John Sileo, Multi Factor Authentication, Security Tokens, Sileo, Text Verification, Two Factor Authentication, Two Step Verification
Identity Theft is a huge and growing problem. According to the recent 2009 Identity Theft Fraud report by Javelin Strategy & Research, victims increased 22% in 2008 to 9.9 million. When businesses are involved, the companies face billions of dollars in theft, millions of dollars in fines and, perhaps most important, the loss of customer trust.
The large impact that identity theft has on individuals lives and corporations’ bottom lines has made inexpensive biometrics look attractive for authenticating employees, customers, citizens, students and any other people we want to recognize. The most recent debate is on whether the pros outweigh the cons. (To see some of the materials that influenced this article, please visit George Tillmann’s excellent article in Computerworld).
Biometrics uses physical characteristics, such as fingerprints, DNA, or retinal patterns to positively verify individuals. These biological identifiers are electronically converted to a string of ones and zeros and stored on file in the authenticator database.
Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: "Identity Theft, Authentication, Biometric, Biometric Identity Theft, Biometric Security Risks, Biometrics, Business Identity Theft, Finger Prints, John Sileo, Retinal Scan, Verification