{"id":4579,"date":"2013-10-10T18:42:00","date_gmt":"2013-10-10T18:42:00","guid":{"rendered":"https:\/\/evssolutions.com\/the-power-of-knowledge-based-authentication-in-layered-security\/"},"modified":"2013-10-10T18:42:00","modified_gmt":"2013-10-10T18:42:00","slug":"the-power-of-knowledge-based-authentication-in-layered-security","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/the-power-of-knowledge-based-authentication-in-layered-security\/","title":{"rendered":"The Power of Knowledge Based Authentication In Layered Security"},"content":{"rendered":"

After the hacking
\nincidents at Bradstreet, Lexis Nexis and Kroll Background America (three major
\ndata aggregators that maintain records on millions of Americans), there has
\nbeen a rise in concern about KBA and its effectiveness. <\/span>Knowledge based authentication<\/span><\/a> (KBA) is a tool that verifies an individuals
\nidentity. Databases, such as those listed above, become more targeted by
\ncriminals as they grow.<\/span><\/p>\n

These specific hackers
\nspecialize in trafficking personally identifiable information on the black
\nmarket through an operation known as SSNDOB. They provide reliable personal
\ndata on U.S. residents and credit checks to customers for an inexpensive cost.
\nWith these compromises in data, several industry leaders are saying that
\norganizations shouldnt rely on KBA to verify identity.<\/span><\/p>\n

There are also
\nconcerns that criminals can get their hands on anyones KBA or identity information
\nthough various black market exchanges. However, there is nothing being said
\nthat KBA has been weakened because of these compromises. The tools and <\/span>
layers of security<\/span><\/a> are what determine protection and fraud
\nprevention. We recommend a combination security strategy that consists of
\nsolutions such as <\/span>
dynamic KBA<\/span><\/a>, <\/span>drivers license verification<\/span><\/a>, <\/span>high-risk alert<\/span><\/a>, <\/span>residence verification and history<\/span><\/a> and much more.<\/span><\/p>\n

Layering fraud and
\nsecurity solutions will enhance your organizations database. If you feel KBA
\nalone may be vulnerable to criminals go beyond compliance guidelines and
\nimprove your <\/span>
fraud prevention strategy<\/span><\/a>. Trust us, its worth the investment to
\nprotect your data.<\/span><\/p>\n<\/p>\n

[Contributed by EVS Marketing]<\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

After the hacking incidents at Bradstreet, Lexis Nexis and Kroll Background America (three major data aggregators that maintain records on millions of Americans), there has been a rise in concern about KBA and its effectiveness. Knowledge based authentication (KBA) is<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4579"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4579"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4579\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}