Keeping You Informed - Since 1969 We are in our 47th publishing year. Issue 100 due in 2017.
Back issues & Digital editions
Click any magazine cover above
We NEVER sell your private information!
|Note: Any unlinked items below are 'in development'|
Our Key Advertisers - Why not join them (email@example.com)
|Trade Event||Trade Event|
IM Industry News
General IDMi Information
of millions of people don't have passcodes set on their Smartphones: Industry
Comment from Robert Capps, VP of business development at NuData Security
“The survey brings out some fascinating data, particularly that “despite the increasing fear, nearly 50 percent of the participants admit that they don’t take actions such as setting a password on their cell phones”, echoing the reality that, when it comes to mobile, convenience is king. Users do not want to have any friction between them and their device. Therefore, instead of continuing to be surprised by results like this, we should look for ways to meet the need for security in ways that don’t inject more friction.
The security industry, as a whole, typically is most comfortable requiring that customers conform to methodology. But, forcing users into a security paradigm is always going to be a risky proposition, especially in technological environments, where they will only want to interact with their devices in the ways they most prefer. Hackers and fraudsters benefit from this dynamic (at present) because it’s tilted in their favour. Single-point authentication methods, especially on mobile, unlock a wealth of vulnerable PII (personally identifiable information) that is a rich source of income for hackers when mined from phones and sold on the dark web. Until authentication methods no longer require this data, we can’t expect this economy to go away and the dynamic will continue.
Let’s imagine another scenario whereby authentication may require this data, but doesn’t rely solely upon it. Instead, identity verification is reliant upon a myriad of data points that form intricate web of complex, rich and real-time data that is impossible to spoof, mimic or replicate by nature of its interconnectivity and complexity. Friction dissolves in this scenario because the verification of the user is so accurate and ‘white-glove’ experiences can be offered to what we know to be the genuine human user.
So, while we might continue to bemoan user stubbornness in up-taking basic security protocols against their own best interests, we can start to see that users’ natural behaviour can be the basis of the security method. Analysing sessions in terms who how users are behaving, how they typically behave, how other humans behave in this context, offers non-invasive pathways to stunningly accurate identification.
We can stop enforcing security methodology and our tactical requirements on end users and start working with what they are offering -- natural behaviour and the ability to discern who they are from it. Currently, many major online retailers and banks are beginning to utilise this powerful passive biometric model. We anticipate that while usernames and passwords will always have some relevance, it will become less and less relevant for user authentication and verification in the future to come.”
Cybersecurity audit of the US
Secret Service found unacceptable vulnerabilities
technology from Agfa HealthCare is catalyst for new Direct Radiography contract
with Vizient Supply, LLC
• Contract accessible to the more than 362,000 acute care provider and
non-acute care provider Vizient members.
Editorial Policy: IDMi take privacy and accuracy very seriously.
The views expressed in ANY content held online in our sites, linked to (from
within our sites,) or published in print, is not necessarily that of any member
of IDMi or intelligen Limited personnel. E&OE
FREE! - View our Digital editions
Why am I allowed to do this?*
* Digital editions eIDMi:001 to eIDMi020 were completely different issues to the print issue.
They were provided free to any IDMi Newsletter subscriber. From eIDMi:021 onwards, the digital
edition is taken from the print issue, but is modified to suit online reading.
It is held back for 2 months after the print issue is
released, so it is all historical news.
An intelligen Limited Company
IM/DM/DC Consultancy & Contracting Services
Information/Document Project Management
Document Control and Data Management
Document & Data Capture & Cleansing
Document & Data Migration
Short/Medium-run Magazine Publishing (Full service range)
Specialist Digital Publishing
IDMi is a wholly owned subsidiary of intelligen Limited, a company registered in Scotland SC406750. Email: firstname.lastname@example.org
Registered & Administration Office:
13 Cairds Wynd, Banchory, AB31 5XU, United Kingdom. Phone:
0044 (0)1330 820030
Visit the intelligen Business Book Store