Two Factor Authentication What is it, how does it work, and why is two factor authenticaion better than just one factor authentication?
In this interview with Paul Herbka from South Seas Corporation (services and solutions based out of Colorado), we go in depth in a discussion of two-factor authentication, and why it’s important for any individual or business to seriously consider two factor authentication for any sensitive data.
You can listen to the interview, and/or read the transcript below
In this interview, Paul Herbka, VP of South Seas Corporation, based out of Colorado, USA, answers the question: “How does encryption work.”
He also helps to understand everything from file and data encryption to WEP Encryption, and talks about a variety of the software and security solutions available in the market today.
Take a listen to the interview, and/or read the transcript below.
A massive data breach in the United Kingdom demonstrates how easy it is for sensitive data to be compromised.
Two CDs containing the personal information of almost every child under the age of 16 and their parents in the U.K. have gone missing. (That’s 25 million people who belong to 7.25 million families.)
The data, compiled for the payment of certain social benefits, includes each child’s name, address, date of birth, sex, and National Insurance number, the parents’ and any partners’ information, and in some cases, the family’s bank account details.
How do you become known as the #1 bank in America for helping protect people from Identity Theft?
Well, it’s quite simple actually.
The Javelin Strategy and Research firm, which evaluated 24 major banks, awarded the top three banks similar marks for their ability to help protect customer data. Here’s some of the strong points, from the last year or so, that you should consider if you wish to be among the top three.
First, it would be a good idea to lose 2.6 million customer records belonging to Circuit City credit card holders. Accidentally take the records to a landfill and bury them.
Next, you could find yourself among the best by allowing several data breaches to take place. Accidently leave digital doors open, or even physical doors, so that your customers’ information can leave with a criminal. Make sure that when you’re shipping information, you use a company that will lose data tapes for 145,000 government and military cardholders.
After that, make sure that your executives have limitless access to sell customer information for personal and corporate gain, and while you’re at it, incentivize employees to open new accounts in the name of your customers.
The daily Trojan, which is the Student Newspaper for the University of Southern California, today is reporting that the Los Angeles Police Department is investigating 16 USC Identity Theft crimes.
Whatâ€™s interesting is that between August 4th and September 5th, someone used student, faculty, and staff account, to make unauthorized ATM Withdrawls, purchase things fraudulently on the Internet, and open unauthorized credit card accounts. Peter Tom, the vice president of member services for the USC Credit Union, says that he didnâ€™t know about the LAPD investigation, and doesnâ€™t really know why this could be taking place.