Archive for the ‘ david w schropfer ’ Category
In the last few days, the US Government both mandated and rejected the same method of cybersecurity.
It’s called Second Factor Authentication, specifically a One Time Passcode (OTP) sent by Short Message Service (SMS). So, together, its a “SMS OTP,” which is basically what happens when you receive a 4 to 6-digit security code to your cell phone as a text message after you enter your username and password. You must enter this security code (ususally) on the same screen where you entered your username and password as an extra factor of security to complete online registration and/or to sign in to an account. The shorthand for all of this is sometimes referred to as MultiFactor Authentication, or MFA.
First, on July 30, the Social Security Administration (SSA) mandated the use of MFA:
We take our responsibility very seriously and, with that commitment, have always provided my Social Security account holders with the option of an extra layer of security: to receive a security code via a cell phone text message to complete online registration and every sign in. This type of process—requiring more than a username and password to access information—is referred to as multifactor authentication, or MFA.
On July 30, 2016, we implemented mandatory MFA to comply with Executive Order 13681, which requires federal agencies to provide more secure authentication for their online services. (SOURCE: https://www.ssa.gov/myaccount/MoreInformationAboutMFA.html on 8/3/2016)
Of course, since a few Americans have a Continue reading
Tired of all of the rules that you have to follow everyday just to be online? The internet was easier once, but now it seems like we spend half of our computer time worrying about hackers, thieves, viruses, and other online traps.
It’s time for a new approach. It’s time for intuitive, reasonable habits to replace onerous mandatory rules. It is time for simplicity to replace complexity, and for confidence to replace fear. These habits are behavioral, not technical. And they are easy, so you can continue to do them on a regular basis.
Most importantly, its time for an easy-to-understand explanation of the online traps that we are all trying to avoid. It’s like a bear trap in a strip mall – the person who set the trap doesn’t mind that they probably won’t catch many bears because of the volume of people who will be ensnared just because they are passing by. But if you know where to look, the traps are easy to avoid.
Read this book to avoid common online traps with simple daily habits.
For a free chapter, click here (we will ask for your email address so we can send it to you). Or, to purchase the book in paperback, or Kindle, click here. For Apple iBooks, click here.
Vulnerability in Picture Files
A serious vulnerability was discovered today with a common picture file type called “Tagged Image File Format, or TIFF. It is an older type of file, but you probaly have many of then somewhere in your computer right now. Every now and then, a new way to hack a computer is discovered before any bad guys figure it out. Thankfully, that happened in this case.
The vulnerability was reported yesterday by Tyler Bohan of Cisco Talos. He said: Continue reading
Twenty-five years ago, telecommunications was facing their biggest threat since deregulation, and most executives did not take the threat seriously. Ten years later, it had decimated international telecom revenue models and profitability. Today, it is the reason that most phone calls cost close to nothing. It’s called “Bypass,” and it has just appeared in the payment card industry. If you are a payment industry executive (or investor), don’t make the same mistake as your telecom colleagues by ignoring this trend.
BYPASS BEGINS IN PAYMENTS
PayPal’s announcement on May 25 received significant Continue reading
The month of March, 2012, will break the record for mobile commerce and mobile payments events in a single month with 18 total events currently scheduled. The previous record was
February, 2012 with 15 events. This is one of the many indications that the Mobile Commerce / Mobile Payments industries are gaining momentum. Continue reading
Here is a free resource from The Luciano Group.
Have you ever wondered which mobile commerce events were happening this month? Ever get frustrated trying to weed out the mobile commerce events from the events lists of other industries like payments, telecommunications, and banking?
The resource you need is here: www.lucianogp.com/mc-events
This calendar is moderated by Continue reading