{"id":4596,"date":"2013-08-27T21:18:00","date_gmt":"2013-08-27T21:18:00","guid":{"rendered":"https:\/\/evssolutions.com\/improving-phishing-prevention-with-id-authentication\/"},"modified":"2013-08-27T21:18:00","modified_gmt":"2013-08-27T21:18:00","slug":"improving-phishing-prevention-with-id-authentication","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/improving-phishing-prevention-with-id-authentication\/","title":{"rendered":"Improving Phishing Prevention with ID Authentication"},"content":{"rendered":"

When two parties need to ensure the other party
\nis trusted, digital signatures are great. The shared key is established after
\nboth parties have been authenticated, but the initial authentication is essential
\nto the transaction.Using a shared secret or out-of-band
\nauthentication method only verifies an account holder. But what if the account
\nwas set up fraudulently? Authenticating digital signatures with
\nout-of-wallet KBA (<\/span>knowledge based authentication<\/span><\/a>) ensures
\nproper verification of all parties involved.<\/span><\/p>\n

Standardizing how e-mail receivers perform identity
\nauthentication is the main goal of
DMARC<\/a>
\n(the Domain-based Message Authentication, Reporting and Conformance initiative).
\nIf you sign an outbound email and someone receives an email from a similar
\ndomain but you havent signed it, they should know to reject it. The problem
\nis, DMARC only blocks e-mails if theres a corresponding DMARC record and the signature
\ndoesnt match. If there is no record, the email is sent.<\/span><\/p>\n

There are a few technical challenges and
\nsolutions in combating <\/span>
phishing<\/span><\/a>.One of the most prevalent
\nsolutions is a digital signature, but they do come with inherent roadblocks. <\/span>A lot of institutions are relying on old
\nways like end-user education, training, web-filtering black lists and hiring
\nservices and organizations to help take down phish. There is also a problem
\nwith consumers not knowing or caring where their e-mails come from. Attackers will
\nkeep coming back until an institution has taken proper measures. A lot of
\nconventional phishing prevention practices assume DMARC is the answer and they
\nwont need to do anything to contribute to the monitoring and authentication.<\/span><\/p>\n

To overcome these
\nchallenges we recommend your institution build the right countermeasure by
\nidentifying the sources and the nature of each phishing attack. Using big data
\nwill allow you to potentially tie together the financial loss to specific
\nphishing sites and enhance your <\/span>
business fraud prevention<\/span><\/a>.<\/span><\/p>\n<\/p>\n

[Contributed by EVS Marketing]<\/p>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

When two parties need to ensure the other party is trusted, digital signatures are great. The shared key is established after both parties have been authenticated, but the initial authentication is essential to the transaction.Using a shared secret or out<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4596"}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4596"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4596\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}