Believe you’re in control of your identity?

Most people have no idea how to protect their identity beyond shredding personal documents and having a monitoring service watch for new charges and credit lines in their name. These techniques are a start, but not nearly the end of the proactive steps that should be taken to protect identity.

The Federal Bureau of Investigation is actively warning businesses in the United States of the Business E-mail Compromise (BEC) scam which is a common form of identity fraud.

“BEC is a serious threat on a global scale… It’s a prime example of organized crime groups engaging in large-scale, computer-enabled fraud, and the losses are staggering.”

While these attacks are spiking with a 270% increase in 2015, people continue to address the problem through education and training. It does not solve the problem though. The first step is determining if you could be at risk.

Technology has caught up in this case though, and there are far more effective methods to ensure identity protection than just education and training. My old boss used to say…

Hope is not a strategy

I later learned he borrowed that from Rick Page who wrote a book by the same name. The point is education and training are moderately-effective, self-perpetuating activities that are ripe for disruption, and change is upon us in the form of new technologies and techniques.

For those who are tech savvy, the Internet Engineering Task Force has issued a new standard for Domain-based Message Authentication, Reporting & Conformance. This means hope is not as necessary. It has limitations though and seems a compromise with email marketers. It it is a place to start.