Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/17/2012
01:40 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

How The Social Security Administration Making Online Access To Earnings Secure For Consumers

Experian fraud prevention services help SSA provide consumers with secure and convenient online access to their Social Security earnings and benefit information

Costa Mesa, Calif., May 17, 2012 — Experian® today announced that it has provided the U.S. Social Security Administration (SSA) with fraud prevention services that securely authenticate and safeguard the identities of consumers who now have online access to their Social Security earnings and benefit information through the SSA’s new online Social Security Statement.

“As the trend for consumers to access more information online increases, the ability to confidently verify identities is critical for an agency like the SSA,” said Kerry Williams, group president, Experian Credit Services and Decision Analytics. “Experian’s Precise ID platform will provide the SSA with an additional layer of security that will help combat threats such as identity fraud and unauthorized access to information while at the same time allowing well-intentioned consumers seamless access to their online Social Security Statement.”

The SSA’s new online Social Security Statement is simple and easy-to-use and provides people with estimates they can use to plan for their retirement. The online Statement also provides estimates for disability and survivors benefits, making the statement an important financial planning tool. In addition to helping with financial planning, the online Statement offers consumers a convenient way to determine whether their earnings are accurately posted to their Social Security records.

“We are thrilled that the SSA has selected Experian to provide secure authentication services in support of its new online Social Security Statement,” said Williams. “Experian continues to gain traction in the government space, and this success is another milestone on our path to becoming the standard in the public sector for fraud prevention and authentication.”

To get a personalized online Statement, people age 18 and older must be able to provide information about themselves that matches information already on file with Social Security. Then, the SSA uses Precise IDSM, Experian’s fraud detection and prevention platform, to securely authenticate and further verify the person’s identity. Once verified, the person can create a “My Social Security” account with a unique username and password to access the online Statement. To get your Social Security statement online, go to http://www.socialsecurity.gov/mystatement/.

About Experian

Experian is the leading global information services company, providing data and analytical tools to clients around the world. The Group helps businesses to manage credit risk, prevent fraud, target marketing offers and automate decision making. Experian also helps individuals to check their credit report and credit score, and protect against identity theft.

Experian plc is listed on the London Stock Exchange (EXPN) and is a constituent of the FTSE 100 index. Total revenue for the year ended 31 March 2012 was US$4.5 billion. Experian employs approximately 17,000 people in 44 countries and has its corporate headquarters in Dublin, Ireland, with operational headquarters in Nottingham, UK; California, US; and São Paulo, Brazil.

For more information, visit http://www.experianplc.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4682
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
CVE-2020-4888
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
CVE-2020-13569
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
CVE-2021-20620
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
CVE-2021-20621
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.