https://nudatasecurity.com/wp-content/uploads/2018/05/fraud_GJB5QOwd.jpg 2592 3888 Magali Vander Vorst https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png Magali Vander Vorst2018-05-16 16:25:342018-07-03 15:19:25“I don’t have an account takeover problem” – A common misconception
When some institutions think of account takeover they think of chargebacks, fraudulent money movements, or rewards abuse, for example. But fraud doesn’t start with a chargeback; it begins long before that, at the account origination or pre-login stage. Credential testing or harvesting attacks are some of the most common sophisticated mass-scale threats paving the way for account takeover. Unfortunately, most companies don’t have the right tools to catch them… until it’s too late. The ATO below the surface Companies are …
https://nudatasecurity.com/wp-content/uploads/2013/10/2FA-Token-Key.jpg 2699 4047 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-10-22 17:48:402018-06-25 09:14:36Increase E-Commerce Profits using Risk Based Authentication
Most websites use the combination of usernames and passwords. Both are items that a user knows. Asking “what street did I grow up on”, is just asking more things that a user knows, firms that do this are just implementing more KBA’s. Economics of Authentication To use some basic economics, the addition of the password as opposed to not requiring validation has a huge marginal benefit to the company. Implementing a second, and third and forth has an ever decreasing …
https://nudatasecurity.com/wp-content/uploads/2013/10/OTP-token.jpg 191 611 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-10-09 15:11:412018-09-13 15:41:01What is Risk Based Authentication?
Understanding the Types of Authentication Authentication methods are usually grouped into a few different factors. 1. Ownership Factors Bank cards, security tokens, mobile phone. Physical objects which a user is required to be in possession of. The risks to these types of authentication are theft and cloning. 2. Knowledge Factors Something the user knows. A password, PIN or answer to a question such as “what is the first street you grew up on” 3. Inherent Factors These attempt to make …
Still have questions?
Call: +1 (604) 800-3711
* These fields are required.