authentication (15)

Security in the digital world is in demand for online financial businesses. This is because of the increasing number of digital frauds that are penetrating into the digital space at a high pace. The digital frauds are of many types. These correspond to financial crimes, a variety of credit card frauds, payment scams, and cyberattacks. The digital frauds include identity theft, account takeover fraud, and high-scale data breaches. Under these circumstances, there should be active security measure

Read more…

This is a transcript of our interview with Dean Nicolls, VP Marketing at Jumio

You can watch the original video interview here

Boris: Hello ladies and gentlemen and welcome to our interview with Dean Nicolls. Dean is a VP of marketing at Jumio corporation and in this role he is helping Jumio become the number one global brand in digital identity verification. 

Jumio is the leading ID credentials authentication company that helps businesses reduce fraud, meet regulations and increase revenue whil

Read more…

By Sophie Bottazzi, Senior Research Executive, CeFPro

The payment industry in Europe continues to evolve with the huge influx of new payments providers in the market, increased regulatory demand and evolving customer expectations of products and services. With the implementation of PSD2/Open Banking becoming more embedded, the payments landscape continues to evolve as APIs open up customer data for more institutions to leverage. With such increased demand and competition comes heightened regulato

Read more…

There are a number of ways that you can protect yourself online, and one of the things you can do is to start using two-factor authentication.

You probably have seen two-factor authentication even if you aren’t sure what it is. For instance, if you do online banking, your bank might text a code to your phone or email when you try to change the password. This is two-factor authentication. It’s basically just an extra step that confirms that you are the account owner. This makes it more difficult f

Read more…

8028288288?profile=original

The global facial recognition market value is estimated to be $XX billion in 2018. The government application segment is accommodating a major share of the biometric market and is expected to grow over $XX billion by 2023 from an estimated value of $XX billion in 2018, because of an increase in the deployment of biometrics products in border security, and also due to the growth of video surveillance. The second major application segment of facial biometrics is in banking and financial institutio

Read more…

Do Not take that Stupid Facebook Quiz

Where should you live in the world? What Game of Thrones family are you in? What is the food that best describes your personality? All of these answers are given and found by doing quizzes on Facebook. You have surely seen them if you use Facebook, and have may have taken these quizzes, but you definitely might want to consider stopping. If you have ever used one of these quizzes, you have probably given these third-party apps permission to access some of your personal data. Not only does this a

Read more…

Criminals have a reliance on tricking victims to get access to account information, like passwords. This is known as social engineering, and is also called a “confidence crime.” These come in many forms:

Do Not Take the Bait of These Phishermen

  • A phishing email that targets a specific person is known as spear-phishing. A spear-phishing email looks like an email that might come from a legitimate company to a specific person. For example, a thief might send a fake email to a company’s employee who h
Read more…

If you have a strong password for your Amazon account, you may still want to consider beefing up the security with two-factor verification (or authentication), which will prevent a thief from accessing your account (which is possible if he gets ahold of your password and username somehow).

2D

  • Log onto your Amazon account.
  • Have your mobile phone with you.
  • Click “Your Account.”
  • Scroll down where it says “Settings—Password, Prime & E-mail.”
  • Click “Login & Security Settings.”
  • Go to “Change Account Settings”
Read more…

Be aware of all these Confidence Crimes

Criminals often rely on tricking their victims to gain access to their passwords and other account information. This act of tricking is called social engineering, also known as a confidence crime, and it comes in many forms.

  • A type of phishing e-mail where the criminal targets someone specific is called spearphishing. The spearphishing e-mail will look very much like the typical company e-mail that the real person uses.
  • Example: The thief sends a trick e-mail (phishing) to a company employee he fo
Read more…

Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail.

How a hacker circumvents two-factor authentication:

  • First collects enough information on the victim to pull off the scam, such as obtaining information from their LinkedIn profile.
  • Or sends a preliminary phishing e-mail tricking the recipient into revealing login credentials for an account, such as a bank account.
  • The next phase is to send out
Read more…

Have a small business? Great. Have two-factor authentication for your accounts? If you’re not sure of the answer to that question, you could be in trouble. October is National Cyber Security Awareness Month, the perfect time to learn more about cyber security. As a small business owner, you certainly have thought about data breaches. They don’t just happen to giants like Target and Sony. The common thread in many data breaches is that the hackers got the password.

Once a hacker has a password, th

Read more…

Go Two-Factor or go Home

Logins that require only a password are not secure. What if someone gets your password? They can log in, and the site won’t know it’s not you.

Think nobody could guess your 15-character password of mumbo-jumbo? It’s still possible: A keylogger or visual hacker could obtain it while you’re sitting there sipping your 700-calorie latte as you use your laptop. Or, you can be tricked—via a phishing e-mail—into giving out your super strong password. The simple username/password combination is extremely

Read more…

At the start of the year, we all made our resolutions for 2015. Now it’s March—how are you doing on your resolutions? If you’ve already broken a few, no worries; New Year’s doesn’t have the monopoly on making goals to better yourself. This is especially true with digital safety. At a time when there are so many security breaches, it’s important to commit to strengthening your digital defenses year-round.

When making goals, it’s important to emulate people who have already mastered what you’re try

Read more…

Fingerprint hacked by a Photo

You can’t change your fingerprint like you can change your password. But why would you want to change your fingerprint? The thought might cross your mind if your fingerprint gets stolen.

tumblr_inline_nih8te3A9n1qa344h.jpg

How the heck can this happen? Ask Starbug. He’s a hacker who demonstrated just how this could happen at an annual meeting of hackers called the Chaos Communication Congress, says an article at thegardian.com. His “victim” was defense minister Ursula von der Leyen.

Starbug (real name Jan Krissler) used VeriFinger,

Read more…

How do you get the balance right between customer service and security? The battle between banks and fraudsters is ongoing, with banks losing millions each year through fraud.

In addition, the rise of digital and mobile banking over the past few years has led to banks investing heavily in their fraud and security measures. These authentication devices alongside integrated malware detection and fraud monitoring systems can be a barrier to a satisfying, simple customer experience. How do banks prot

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead