Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

Biz Giants Form Fraud Standards Group

American National Standards Institute, Better Business Bureau to fight identity theft and fraud

Some of America's largest and most influential business groups yesterday announced formation of a new group that will develop and promote the implementation of standards for preventing identity theft.

The American National Standards Institute and the Better Business Bureau system said they are enlisting major corporations in a variety of industries to create a single resource of standards and guidelines that companies can use to prevent identity theft and fraud. The initiative, called the Identity Theft Prevention and Identity Management Standards Panel (IDSP), has nine founding members: AT&T, Citi, ChoicePoint, Dell, Intersections, Microsoft, Staples, TransUnion, and Visa USA.

The group has given itself 12-18 months to come up with a comprehensive, cross-sector set of requirements and best practices for managing access, storage, and disposal of customer and employee data. The group will also look at personnel issues, such as how to hire and train employees to handle sensitive data, how to choose data contractors, and how to recapture and restore the integrity of stolen identities.

The group currently is conducting a survey of corporations and other security groups to find out what authentication standards and best practices are out there already, says Jim McCabe, ANSI director of consumer relations and public policy. The group will try to identify standards that could be used more broadly and areas where new standards are needed, he says.

"We're not trying to duplicate what somebody's already done," McCabe says. The group will reach out to other groups that are working on guidelines for protecting user privacy, such as the White House's task force on identity theft and the credit card industry's PCI standards for protecting credit information.

"It's time that a coordinated assessment was made of the standards and other solutions that the marketplace has developed, or needs to develop, to address this problem and to make the results widely available," says Joe Bhatia, president and CEO of ANSI.

The study raises the question of whether enterprises should build stronger policies against surfing the Web over company links. Companies that allow personal browsing have a higher incidence of infection by worms and viruses than those that don't, according to the research. Some companies have established hard-line policies that disallow users from using the Internet for any non-business reason.

But IDC's Andersen doesn't recommend this approach. "Today our work and private lives are so interlinked that it is unrealistic to think in terms of a ban on the use of company Internet connections for private purposes."

After it has done its assessment of currently-available standards and guidelines, the LDSP will convene an identity theft panel to make recommendations on which best practices to use and will issue a "call to action" to corporations and vendors to develop standards where they're still needed, McCabe says.

— Tim Wilson, Site Editor, Dark Reading

  • AT&T Inc. (NYSE: T)
  • Microsoft Corp. (Nasdaq: MSFT) Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    News
    FluBot Malware's Rapid Spread May Soon Hit US Phones
    Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
    Slideshows
    7 Modern-Day Cybersecurity Realities
    Steve Zurier, Contributing Writer,  4/30/2021
    Commentary
    How to Secure Employees' Home Wi-Fi Networks
    Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-22677
    PUBLISHED: 2021-05-07
    An integer overflow exists in the APIs of the host MCU while trying to connect to a WIFI network may lead to issues such as a denial-of-service condition or code execution on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4....
    CVE-2021-29495
    PUBLISHED: 2021-05-07
    Nim is a statically typed compiled systems programming language. In Nim standard library before 1.4.2, httpClient SSL/TLS certificate verification was disabled by default. Users can upgrade to version 1.4.2 to receive a patch or, as a workaround, set "verifyMode = CVerifyPeer" as documente...
    CVE-2020-4901
    PUBLISHED: 2021-05-07
    IBM Robotic Process Automation with Automation Anywhere 11.0 could allow an attacker on the network to obtain sensitive information or cause a denial of service through username enumeration. IBM X-Force ID: 190992.
    CVE-2021-21419
    PUBLISHED: 2021-05-07
    Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memory on Eventlet side by sending very large websocket frames. Malicious peer may exhaust memory on Eventlet side by sending highly compressed data frame. A patch in version 0.31.0 restricts websocket frame to reas...
    CVE-2021-27437
    PUBLISHED: 2021-05-07
    The affected product allows attackers to obtain sensitive information from the WISE-PaaS dashboard. The system contains a hard-coded administrator username and password that can be used to query Grafana APIs. Authentication is not required for exploitation on the WISE-PaaS/RMM (versions prior to 9.0...