Forget Passwords: Here comes FIDO

By | February 21st, 2013|Uncategorized|

We’ve talked a lot about passwords on this blog, including how ineffective they are as a method of authentication. Over the past decade, many businesses, government organizations and non-profits have been trying to solve the password conundrum and come up with an authentication method that is secure, easy and simple enough that your grandmother can [...]

Safer Internet Day: Practice Safe Online Habits

By | February 7th, 2013|Uncategorized|

This Tuesday was Safer Internet Day – a day dedicated to honoring safe Internet habits. In the past year, we’ve seen our fair share of data breaches in the news, so it’s important to be aware of your online habits, and what you’re doing to protect yourself and your business. So what better way to [...]

Scary Security – Is Your Password, “Password”?

By | October 25th, 2012|Uncategorized|

“Password” is holding its number one spot as the least secure password for another year in a row. Pretty spooky considering Halloween is just around the corner. SplashData just released its annual list of the most common passwords used on the Internet and posted by hackers.Here’s a quick list of the top 20 “Worst Passwords [...]

CSID Presents at the Fall UT Center for Identity Symposium

By | October 3rd, 2012|Uncategorized|

Do you know the risks that your company’s data faces when stored on a cloud? Do you know what to look for in a cloud provider? Do you know how to better secure your own information? Last week our VP of Information Systems and Operations Isaac Chapa addressed questions like these at an Identity Symposium [...]

Webinar Recap: What to do when a password is no longer secure?

By | October 1st, 2012|Uncategorized|

We recently hosted a webinar featuring Experian VP Marc Ostryniec and Toopher CEO Josh Alexander. Marc and Josh discussed consumer password habits, supplemented by statistics from our  recent consumer survey. The two also revealed how these habits put consumers and businesses at risk for compromise, and what businesses can do to mitigate these risks now [...]

Consumer Password Habits Unveiled

By | September 25th, 2012|Uncategorized|

Did you know that nearly 90 percent of consumers feel secure with their current password management and use habits yet 61 percent of those consumers reuse passwords across multiple sites? In a world where security breaches make the headlines seemingly every day, consumers are still careless about password creation, management and security. This is an [...]

Security Insights: Information Technology Security Part II

By | September 18th, 2012|Uncategorized|

As mentioned in Part I of this post, security breaches are an imminent threat and danger. While there are many types of data that should be secured, finding concise ways to improve technology security can be difficult.Here are some steps and tips to improving your company’s information technology security.Companies can help improve information technology security [...]

Webinar: Mitigating the Risk of Poor Password Practices

By | September 6th, 2012|Uncategorized|

When it comes to securing passwords, companies can encrypt, hash and salt to their hearts’ content but they will still be at risk. Why? Because people can be careless when it comes to password creation and management. If one consumer uses the same password on multiple sites, and one of those sites is compromised, the [...]

SXSW 2013 Panel Picker – Vote for CSID!

By | August 16th, 2012|Uncategorized|

It’s that time again… to vote for Experian for SXSW 2013!The 2013 SXSW Interactive Festival will bring together professionals from all over the world, including technology and security enthusiasts, and Experian is excited for the chance to take part. We need your help to keep our panels in the running!All you have to do is [...]

Securing Your Digital Life: Lessons from the Mat Honan Hack

By | August 9th, 2012|Uncategorized|

With just a few easy details in hand, a hacker can drastically change your life. Wired technology reporter Mat Honan’s digital life was recently abolished by a couple of hackers who ultimately sought access to his three-letter Twitter handle, @Mat. Within a matter of minutes, they deleted his Google account, erasing years of communication with [...]

Load More Posts