twitter

Secure ID Coalition Blog

Passwords: An Incomplete Solution to an Out of Control Crisis

By now you may have heard about the Russian cyber gang that amassed over 1.2 billion username/password combinations and over 500 million email addresses. Chances are they may have some of your information locked away in their data vault, waiting to sell it to other criminals willing to pay a high enough premium, who will then try to access your credit cards or bank accounts. In light of other high profile data breaches over the past year, you may be wondering if there's an end in sight to it all. Well here's the bad news: It's only likely to get worse.

 

Health Data Breaches: A Ticking Time Bomb

The botched Affordable Care Act rollout earlier this year reminded millions of Americans of the particularly acute pain that can accompany health insurance and healthcare delivery. Millions more faced chaos when Target announced that data from 40 million credit and debit cards was stolen by hackers in one of the largest financial breaches in history. But what do you get when you combine the intimacy of healthcare with the propensity for data breaches prevalent in the financial sector? A recipe for disaster.

 

DOD Takes Mobile Security to a New Level

Virtually all Department of Defense employees and contractors carry Common Access Cards (CACs) that allow them to access the department's secure IT systems by verifying who they are. Recently, the Department of the Navy and Defense Information Systems Agency have begun piloting software that allows employees to access secure information via their smartphones.

 

Medicare Fraud: We need real answers, not lip service

We all know that the government spends money in ways that it probably shouldn't. And we hear politicians talking about reducing waste, fraud and abuse all the time. Medicare is one of the largest and most expensive federal government programs, financing $604 billion worth of healthcare services in 2013. Unfortunately, it's almost one of the most fraud-ridden.

 

Who's Surfing in Your 'Data Wake'?

You may not realize it, but as you make your way through the online world – whether it's for school, work, or just goofing off – you're leaving a trail of information behind you that data brokers are thrilled to follow, just as a ship leaves a wake behind as it travels over the open ocean. Not only would the information they're collecting shock you, but the inferences they can draw would make you never want to leave the house again.

 

Secure ID Practices are Crucial to Limiting Data Breach Risks

A study examining data breaches in the first quarter of 2014 underscores the increasing importance of secure identity management practices. From January to March 2014, public and private organizations reported 254 major data breach incidents involving the loss of theft of over 200 million data records.

 

Page 5 of 13

Learn How