https://nudatasecurity.com/wp-content/uploads/2018/05/fraud_GJB5QOwd.jpg 2592 3888 Magali Vander Vorst https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png Magali Vander Vorst2018-05-16 16:25:342018-07-03 15:19:25“I don’t have an account takeover problem” – A common misconception
When some institutions think of account takeover they think of chargebacks, fraudulent money movements, or rewards abuse, for example. But fraud doesn’t start with a chargeback; it begins long before that, at the account origination or pre-login stage. Credential testing or harvesting attacks are some of the most common sophisticated mass-scale threats paving the way for account takeover. Unfortunately, most companies don’t have the right tools to catch them… until it’s too late. The ATO below the surface Companies are …
https://nudatasecurity.com/wp-content/uploads/2013/10/2FA-Token-Key.jpg 2699 4047 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-10-22 17:48:402018-06-25 09:14:36Increase E-Commerce Profits using Risk Based Authentication
Most websites use the combination of usernames and passwords. Both are items that a user knows. Asking “what street did I grow up on”, is just asking more things that a user knows, firms that do this are just implementing more KBA’s. Economics of Authentication To use some basic economics, the addition of the password as opposed to not requiring validation has a huge marginal benefit to the company. Implementing a second, and third and forth has an ever decreasing …
https://nudatasecurity.com/wp-content/uploads/2013/10/OTP-token.jpg 191 611 NuData https://nudatasecurity.com/wp-content/uploads/2017/12/Nudata_logo-300x112.png NuData2013-10-09 15:11:412019-06-11 10:01:15What is Risk Based Authentication?
Risk-based authentication process applies varying levels of strictness to the authentication process based on the probability that a given application can be compromised. The authentication process becomes restrictive and casts a wider net based on the increase in risk. Understanding the Types of Authentication Authentication methods are usually grouped into a few different factors. 1. Ownership Factors Bank cards, security tokens, mobile phone. Physical objects which a user is required to be in possession of. The risks to these types …
Still have questions?
Call: +1 (604) 800-3711
* These fields are required.