Synthetic ID fraud is a fast-growing, multibillion dollar issue. Often misclassified as a credit loss, synthetic ID fraud is now affecting an expanding list of entities. Also, unless extremely large, this "victimless" crime often does not get the full attention of law enforcement. From the LexisNexis data labs, learn...
What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misconception allows another significant threat to your organization's critical assets to stay completely under...
What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misconception allows another significant threat to your organization's critical assets to stay completely under...
The Department of Homeland Security is warning IT service providers, healthcare organizations and three other business sectors about a sophisticated cyberattack campaign that involves using stolen administrative credentials and implanting malware on critical systems.
Privileged accounts have been at the center of each recent high-profile attack. Moreover, attackers are leveraging privileged credentials as their entry point to high-value systems within the network. This session will explain how hackers that successfully exploit these credentials are able to gain a privileged...
A Government Accountability Office audit suggests a lack of guidelines led the Office of Personnel Management to provide duplicate identity protection services to about 3.6 million individuals victimized by two 2015 data breaches.
High-pressure. Fast-paced. Threats coming from all directions. The battle against payment fraud isn't unlike the game of basketball. Wire fraud and ACH fraud are on the rise, and financial institutions cannot be slow on the defense - to win, they must detect fraud in real-time.
Banking channels through which...
In 2016, cyberattacks and cybersecurity (or a lack thereof) grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who have never logged on, was affected by cyberattacks and hacking in...
VASCO Data Security's Scott Clements on Aligning Security with User Experience
With great efficiencies and cost savings also come great threats and fraud risks. This is today's digital reality, and it is why cybersecurity and the user experience need to be aligned to create digital trust, says Scott Clements of VASCO...
Most organizations that enable users to perform online transactions have implemented security measures to address fraud. Currently, one of the most common safeguards used in a wide array of products/services is two-factor authentication (2FA).
In recent years, 2FA has become employed by global tech leaders like...
Behavioral biometrics has been getting a lot of attention recently due to its ability to uniquely address the challenges posed by social engineering, account takeovers and malware. It is already considered the third most popular biometric technology (after finger and face) and tied with iris.
Nonetheless, as an...
The indictment of a former paramedic in a narcotics case calls attention to the potential threats posed by insiders who abuse their access to information systems that support patient treatment.
Two Florida men have pleaded guilty to helping operate an unlicensed bitcoin exchange, Coin.mx, as a result of a wide-ranging government investigation into a massive scheme that involved hacking into multiple financial institutions, including JPMorgan Chase.
Dutch police reveal they arrested an e-commerce website developer on charges of installing backdoors that allowed him to siphon 20,000 email addresses and passwords, which he then allegedly used to commit fraud using some old-school tactics.
Fraudsters are increasingly turning to synthetic identities to commit Application Fraud. Synthetic identities wreak havoc on traditional validation and authentication methods, costing your business time and money. Are you ready to take a stand against Synthetic Identity Fraud?
Join this session for an exclusive on...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.