Payments 101: An Intro to Payment Security and Transaction Trends

By | July 10th, 2014|Uncategorized|

The security of transactions and payments is a hotly debated topic around the world. Which methods are most secure? Which should we all adopt? And why one over the other?But before we start diving more into the debate on this topic, how about a simple introduction? Let’s define some of the major terms and security [...]

Five Simple Security Resolutions for the New Year

By | January 8th, 2014|Uncategorized|

Do you have room for one more new year’s resolution? Beyond getting fitter, healthier or smarter, vow to be more secure. Here are five simple actions you can take for a more secure year.Refresh your passwordsTake a minute to refresh your personal and professional passwords. Make them long and use a mix of numbers, letters [...]

Industry News Recap: Twitter Launches Two-Factor Authentication

By | May 23rd, 2013|Uncategorized|

This week, Twitter introduced a two-factor authentication login security measure that users can opt into, helping to protect users from email phishing schemes or password breaches. Users need a confirmed email address and a verified phone number on their account to set up the login verification feature on their Twitter settings page.“The two-factor system mirrors [...]

Industry News Recap: Apple Offers Two-Factor Authentication

By | March 22nd, 2013|Uncategorized|

Apple announced on Thursday that they’ve created a tool that strengthens password security for Apple accounts: two-step verification. This should come as no surprise since many companies now offer two-factor authentication after suffering from data breaches. (And remember the Mat Honan hack?)The New York Times reported that, “the security feature (must be turned on manually [...]

Industry News Recap: One Password Ring to Rule Them All

By | March 15th, 2013|Uncategorized|

This past week, Google announced a novel idea for the future of passwords – a ring. Hardware authentication tokens aren’t a new concept, by any means, but Google thinks it’s time to bring this idea to a broader audience. Here’s a recap of the top news stories around this said that “Google is [currently] [...]

Forget Passwords: Here comes FIDO

By | February 21st, 2013|Uncategorized|

We’ve talked a lot about passwords on this blog, including how ineffective they are as a method of authentication. Over the past decade, many businesses, government organizations and non-profits have been trying to solve the password conundrum and come up with an authentication method that is secure, easy and simple enough that your grandmother can [...]

Marc Ostryniec Presents at ID360

By | April 24th, 2012|Uncategorized|

The Center for Identity at the University of Texas at Austin held the first annual ID360 Conference this week. Experian was there  in support of our VP of sales Marc Ostryniec, who presented on how proactive credential monitoring can reduce the risk of fraud that is an inherent problem when employees mishandle company credentials or [...]

Revisiting SXSW 2012 – One Last Look

By | March 27th, 2012|Uncategorized|

It’s hard to believe that South by Southwest Interactive (SXSW) is already two weeks in the past. We spent eight months planning and prepping for the event—during which Experian hosted three panels—then it came and went in a flash. In fact, we already have SXSW 2013 on our radar. Before we get ahead of ourselves [...]

CSID Takes on SXSW Interactive

By | March 5th, 2012|Uncategorized|

Headed to South by Southwest Interactive (SXSWi) conference in Austin, Texas this month? So is Experian. We’ve been working hard, organizing three SXSW panels that address today’s hottest security concerns: data breach preparedness, cloud security and voice authentication.  The increase in volume, severity, publicity and fallout of recent data breaches and lack of cyber-security has [...]

Top 7 Tips to Prevent Identity Theft (Part I)

By | May 28th, 2011|Uncategorized|

By John Sileo, [cc id='csid'] consumer security expert Step one of my 7 Steps to Secure Profitable Business Data is to “Start with the humans.” It is crucial to the success of your business’ security efforts that you give your employees the tools to protect themselves personally from identity theft. This develops a privacy language [...]

Load More Posts