Terrifying financial horror stories aren't fiction!
I found the below article so compelling, and so important as it relates to the current environment of personal data hacking, and how to secure oneself from identity theft, that I have decided to reprint the article in its entirety here.
Topics: identity theft protection
Earlier this month, an absolute bombshell announcement was made by Equifax – one of the three major credit scoring bureaus in the United States.
“We identified a cybersecurity incident potentially impacting approximately 143 million U.S. consumers. Criminals exploited a U.S. website application vulnerability to gain access to certain files. ”
Retailers are on course to lose more than $70 billion globally to remote “card-not present” (CNP) fraud over the next five years. Despite this fact, retail managers of both large and small operations are under the financially fatal impression that fraud prevention is too costly.
• TABLE OF CONTENTS •
What does the future of financial services look like?
Millennials Seriously Question what Large Institutions Say
Millennials Expect Digital Services – Prefer Mobile
How to Make Millenials Love Your Bank
Identity Theft continues to rank as the fastest growing form of fraudulent crime
A recent report by CIFAS - a not-for-profit company working to protect businesses, charities, public bodies and individuals from financial crime – revealed that prolific users of social media had experienced a 57% increase in incidences of misuse of their personally identifying information over last year. All because fraudsters were able to scrape their victims’ important personal data straight from social media profiles. Information such as birthdates, mother’s name, addresses, former residences and more can all be a key part of building an identity profile sufficient to enable access to accounts or the creation of new ones.
Mobile Identity Authentication
Many potential business-cases point to the desire to have an identity authentication solution available as a mobile application on a smart phone or tablet. In some cases, it simply isn’t feasible to have a stationary device, tethered to a PC, available at the location where authentications must occur. In other cases, it may be desirous to have a client that is not in your physical store or branch location conduct an identity authentication wherever they are – which might be in their home, at a hotel, or even walking on the street.