As federal regulators intensify their focus on compliance with requirements to provide patients with access to their health information, healthcare organizations need to sort through a variety of emerging challenges, says health information management and privacy expert Rita Bowen.
What's needed to make a shift from traditional IAM to CIAM? To start, an organization needs to look at fraud detection solutions and risk-based authentication technologies such as device intelligence and behavioral biometrics, says David Britton of Experian.
Identity management will be at the forefront of securing remote work in the coming year. Jason Bohrer, new leader of the Secure Technology Alliance and the U.S. Payments Forum, describes key initiatives as he steps into this role.
Federal investigators have seized two domains impersonating the pharmaceutical firms Moderna, which has begun shipping a COVID-19 vaccine, and Regeneron, which developed a treatment for COVID-19, according to the U.S. Justice Department. Fraudsters were using the websites for identity theft.
Fraud explodes in tough times, and do times come any tougher than they have with COVID-19? In this latest Cybersecurity Leadership panel, CEOs and CISOs describe their efforts to spot and stop emerging fraud schemes involving synthetic IDs, social engineering and greater insider risks.
Knowing your customer has become of more a challenge in a world where in-person interaction has become scarce. Andrew Bud of iProov discusses how identity proofing is evolving to meet the challenge.
Mitigation of identity fraud requires a combination of technologies that complement one another and are easy to manage. Adding a new solution requires looking beyond fraud management to the customer experience, including all stages of the customer lifecycle. It is critical to have safe and secure customer onboarding,...
Canon USA has finally acknowledged that a ransomware attack earlier this year involved the theft of corporate data, including such employee information as Social Security numbers and financial account numbers.
2020's health crisis has created an unexpected boom in telemedicine initiatives. But with this rapid innovation and adoption comes a corresponding uptick in fraud. Dean Nicolls of Jumio Corporation talks about how improving identity verification can help curb the trend.
In this eBookwith Information Security Media...
Researchers have uncovered a fresh phishing campaign that mimics the automated messages of the popular business communication platform Microsoft Teams in an attempt to harvest users' Office 365 login credentials.
The Bad Bot Report investigates the daily attacks that sneak past sensors and wreak havoc on websites. Such activities include web scraping, competitive data mining, personal and financial data harvesting, brute-force login, digital ad fraud, spam, transaction fraud, and more.
In the 2020 Bad Bot Report you'll...
The latest edition of the ISMG Security Report analyzes why clothing retailer H&M was hit with a hefty fine for violating the EU's General Data Protection Rule. Also featured: The coming of age of digital identities; deputy CSO at Mastercard on top priorities for 2021.
Enterprises have a Customer Experience (CX) problem - how to provide optimum customer experience while simultaneously
reducing fraud and protecting the privacy of consumers.
Read this guide to learn:
About the two sides of risk: customer experience and security of information
Best practices for buying a...
Contact Centers serving financial and banking organizations have quite a challenge regarding the verification of consumers. This is multiplied
by having to deal with the abrupt change from a mix of online and in-person points of contact to the necessary requirement that consumer interaction happens without any...
Contact center IVR anti-fraud solutions are employed to reduce costs surrounding fraud targeted at your contact center. In this guide, you will find a comprehensive toolkit complete with IVR anti-fraud resources you can use to protect your consumer's data inside and outside of the contact center.
View this guide to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.