identity (53)

Hi Global Risk Community member,

You have likely heard the words “digital transformation” ad nauseam. Regardless, the increasingly complex world of cloud-based business applications and remote working isn’t going away any time soon. As this complexity of your digital ecosystem increases, so does the need for a strong security and risk management strategy. So where do you start?
 
The implementation of an Identity Governance and Administration (IGA) solution enables organizations to address many

Read more…

Identity fraud is becoming an increasing problem day after day for businesses. Criminals create new mechanisms for fraud as identity theft tends to raise problems for customers. According to the 2019 Javelin Plan and Analysis Identity Fraud Report, in 2018, there were 14.4 million users who had become victims of identity fraud, down from 16.7 million in 2017, the record figure. Identity theft in 2018 was nevertheless more burdensome: 3.3 million individuals were liable, about three times as many

Read more…

 

Introduction about OpenAM

OpenAM provides a service called access management, which oversees access to resources, for example, a website page, an application, or web service, accessible over the network. When it is set up, OpenAM gives an infrastructure to manage clients, roles, and access to resources. The centralization of Access control is done by OpenAM. This is done by handling both authentication and authorization. Authentication can be considered as a process of distinguishing a person, f

Read more…

Once again, tax time has rolled around, and though you technically have until April 15th, it’s always best to file a bit earlier…especially if you want to avoid setting yourself up for ID theft.

How Could Filing Taxes Compromise Your Identity?

Here’s how you could become a victim of ID theft just by filing your taxes: the first method is that a thief uses your Social Security number to file taxes, and then they steal your refund. The second method that they use is they take your Social Security nu

Read more…

What is Synthetic Identity Theft?

Identity theft is when a person steals another person’s private and personal information, generally to make money from it. You probably already knew this, but have you heard of synthetic identity theft? This is a bit different.

14D_new.jpgWith synthetic identity theft, a person creates a new and very fake identity by combining the real information from a person with made-up information. You might not think this is a big deal, but it can be very bad for anyone who has their identity stolen.

Here are three way

Read more…

Have you ever seen a house and thought…I wish I could afford that? Some people actually try it, but let this story be a lesson learned: if you can’t afford the cost of a house, you probably shouldn’t try to buy it.

Pamela Chandler was arrested and now faces forgery charges after she tried to purchase a home with a million-dollar price tag. How did she do it? She used false documents. Chandler, who also goes as Pamela Goldwyn, was arrested by a special Financial Crimes Task Force in Bossier City,

Read more…

The Smart Parent Guide to Digital Literacy

If you are the parent of a child or teen who uses the internet, here are some stats you need to know:

Stats About Teens and the Internet

  • Teens think that the internet is mostly private
  • They also think that they can make the best decisions for their life online
  • They believe they are safe online and that people are who they say they are
  • They don’t feel at risk if “friending” perfect strangers
  • They feel like since they are probably better at understanding technology, they can make better decisions than t
Read more…

Quest Diagnostics is a US-based company that provides medical testing services, and announced that it used third-party billing collection companies that were hit by a severe data breach. In fact, about 11.9 million Quest customers were affected.

The compromised information could include personal data of the patients, including Social Security numbers, as well as medical and financial information. However, laboratory test results aren’t included in the breach.

What Happened?

The AMCA (American Medic

Read more…

If you have been thinking about a credit freeze, you probably should know that the process is designed so that a creditor cannot see your credit report unless you specifically allow it. This process blocks any potential creditors from viewing or pulling your file, which makes it much more difficult for an identity thief to apply for new credit using your name or information. For links to freeze your credit at the 3 major bureaus go to How to Freeze My Credit. However, there have been reports of

Read more…

In any service identity verification works as the backbone of the system. The same is the case with the healthcare system. Proper identity verification is a necessity, because it's how a doctor knows that he is treating the right person with this specific medical history; a pharmacist knows he is handing over the right drug to the right person with this medical record; and it’s how a billing office knows he is mailing the right receipt to the right patient.

Healthcare identification needs to be a

Read more…

An alarming new study is out, and if you are a parent, you should take note…children as young as 8-years old are being sexually exploited via social media. This is a definite downturn from past research, and it seems like one thing is to blame: live streaming.

YouTube serves up videos of kids, in clothing, that pedophiles consume and share as if it is child porn. It’s gotten so bad that YouTube has had to disable the comments sections of videos with kids in them.

Apps like TikTok are very popular

Read more…

Is Your Customer Strategy Really Robust?

0?e=1554940800&v=beta&t=L7onMtT-Hntk9kCvSlPwQpM4CMHDshAXzy8nuMmT7AQ

In these challenging times, it’s no longer enough to target a few, select purchasers and develop products for that clientele. The key ingredient that most leaders overlook while serving their clients is a thoughtful and planned Customer Strategy.

A robust Customer Strategy entails speaking the language of the customers, knowing how to anticipate their needs, working closely with them, and coming up with solutions to problems that have not been stated yet. This necessitates concentrating on develo

Read more…

Trulioo, the leading global identity verification company, today announced that it now verifies customers in the Czech Republic and Slovakia through its electronic identity verification platform, GlobalGateway, helping to mitigate money laundering and fraud in two of the world’s fastest growing markets.

“Expanding our solution to both the Czech Republic and Slovakia is critical,” said Stephen Ufford, CEO and founder of Trulioo. “Not only are they two of the fastest growing economies in Europe, bu

Read more…

Lois Riess is a woman from Minnesota who police say shot her husband, went on the run, and then killed a woman in order to take on her identity. Here are some shocking facts about her:

Riess Looked Like her Victim

The woman Lois Riess killed, Pamela Hutchinson, looked like her. This is why Pamela lost her life. When the body was found, police said her ID, credit cards, cash, and car was gone. Police put out an arrest warrant for Riess, and then started hunting for her. Police say the women did not

Read more…

Javelin Strategy & Research recently released its Identity Fraud Study, and it revealed that the number of identity theft victims rose by 8% in 2017 when compared to 2016. That’s almost 17 million people, which is a record high. Despite more information and industry efforts to make people aware of these practices, $16.8 billion was stolen due to ID theft in 2016.

The study also showed a shift in how ID theft fraud was being done. Credit card accounts were the most common targets for new account f

Read more…

If you are working for an IT security company, I have a message for you: the term “identity theft protection” is way overused and even abused as a marketing term. We know that this term is used to sell services and products, but does it really protect a user from being the victim of identity theft? No.

This is no different than labeling a food as “natural,” even though it is not actually “organic.” At best, this is incorrect information. At worst, it’s a total lie.

Every company with security solu

Read more…

If you are a business owner, you might be concerned about employee theft. If you aren’t concerned, perhaps you should be.

There are a number of ways that an employee can steal:

  • Embezzlement money, inventory or materials
  • Skimming – Diverting funds
  • Stealing business opportunities, data or trade secrets
  • Fraudulent disbursements like check tampering or billing schemes
  • Larceny – absolute theft

It might surprise you to find out that employees who steal are not usually new employees. Instead, they are those w

Read more…

The definition of criminal identity theft is a crime where the criminal impersonates the victim in order to protect their innocence. This can lead to victims getting fines or even getting arrested and charged for crimes they did not commit.

How Does This Happen?

There are a number of ways that a criminal can pull this off, and it generally occurs when the thief steals someone’s identity. This is true and pure identity theft, often involving a drivers license with the thieves picture and the victim

Read more…

I see a ton of articles that say identity theft protection is not something you really need. These articles have titles like “ID Theft Protection Does Not Work,” or “The Poor Man’s Guide to ID Theft Protection.” Though some of these articles have a bit of merit, they totally miss the point.

Here’s the deal – You can’t protect yourself from every type of ID theft out there, and the types you can protect yourself against require a ton of focus. One way or the other, it will cost you money, time, an

Read more…

A new study was just released by the National Association for Information Destruction. What did it find? Astonishingly, about 40% of all digital devices that are found on the second-hand market had personal information left on them. These include tablets, mobile phones, and hard drives.

The market for second hand items is large, and it’s a good way to find a decent mobile device or computer for a good price. However, many times, people don’t take the time to make sure all their personal informati

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead