No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

Account Takeover is on the Rise: Is your Company Ready?

by Robert Capps
May 15, 2018
in Data Privacy, Featured
Data Breaches symbolized by a puzzle of a padlock

Sophisticated Data Breaches Threaten the U.S.

NuData Security, passive biometrics and Mastercard company, announced that they have found that 40% of all account access attempts online are high risk. They also found that account takeovers increased ten times in 2017 as compared to 2016. Robert Capps examines such data breaches.

Across the globe, data breaches continue to increase each year, making it even easier for fraudsters to take over accounts. This is because each time a breach occurs, more personally identifiable information (PII) becomes available for criminals. We are already near ten billion exposed records since 2013 – 9.7 billion – according to the Breach Level Index.

This exposed information is not just outdated information like your teenage years’ email password; we are talking about full names, addresses, social security numbers, and more. Buying this information for a few bucks even the least sophisticated of actors can gain access to personal accounts or steal identities.

Private credentials being stolen and sold on the dark web is not new, what is new is the information currently at stake. Where it was once common for single pieces of information to hit the dark web (a name and a password, for example), criminals are now able to gain access to the complete identities (including names, passwords, physical mailing addresses, and social security numbers). When a fraudster has this much information, it becomes a near cakewalk to take over not just a user’s account, but their whole identity.

Account takeover has also been on the rise, partially as a side effect of the U.S. adoption of the EMV cards. These new cards with chips are turning the card present environment into a more secure place. On the flip side, fraudsters who use to make a profit using the cards’ magnetic stripe are trying to mitigate their losses by moving their activity to the card-not-present space.

Growing Pains

NuData Security’s latest statistics show a sharp increase in the number of purchases made with flagged credit cards, which doubled in the last year. Similarly, the number of account takeover attempts increased tenfold in the same period of time.

Bad actors are becoming more sophisticated and they are also mastering automation by developing mass-scale attacks in the blink of an eye. Today a bad actor can use a simple algorithm to crack a password with billions of possible combinations in ten seconds and use a company’s login interface millions of times in a day to find those working combinations. They can do all of this while remaining unnoticed by companies who don’t have visibility into these attacks.

Combating Mass-Scale Automated Attacks

Combating account takeover poses a huge challenge because the attacks that pave the way for account takeover happen at the login stage, where many companies don’t have the tools to look at what’s happening. The attacks at login use millions of stolen credentials to find the working combinations and, once they find them, they can take over the accounts they’ve been trying to open and make a profit.

Cutting Through the Noise

Being able to see what’s happening at login allows companies to know what accounts are being targeted and also protect them before there is any fraud loss.

Multi-layered technologies that include behavioral analytics and passive biometrics are providing deeper insight into what’s happening at the login and are blocking most of the automated threats before, at the pre-login stage. By blocking automated mass-scale attacks at login, companies are mitigating account takeover losses before they happen.

In a time where we can’t trust users’ PII, it is increasingly important to find tools that can discern between human and non-human behavior and verify legitimate users before they set foot into the session – all without relying on the user’s static data (password, one-time code…).

Using these layers of technology companies can gain visibility into what’s happening in their environment and thwart fraudulent attempts without adding any unnecessary friction on their good users.


Tags: Data Breach
Previous Post

Federal, State and Local Compliance in Background Screening: What Employers Need to Know

Next Post

Auditing the Due Diligence Process

Robert Capps

Robert Capps

Robert CappsRobert Capps is the Vice President of Business Development at NuData Security Inc., a Mastercard company. He is a recognized technologist, thought leader, and an advisor with more than 20 years of experience in the design, management, and protection of complex information systems – leveraging people, process, and technology to counter cyber risks.

Related Posts

group looking at data breach details digital art collage

Navigating Data Breach Compliance & Communication

by Salim Gheewalla
October 28, 2024

Compliant response starts well before an incident occurs

sec building

News Roundup: SEC Finalizes New Cybersecurity Rules for Broker-Dealers, Others

by Staff and Wire Reports
May 16, 2024

OFAC launches public-facing sanctions database

characters breaking into padlock

Navigating Personal Liability: Post–Data Breach Recommendations for Officers

by Daniel B. Garrie and Richard A. Kramer
April 16, 2024

Executives may be on the hook if info is compromised

data breach

Sobering Reality: Drizly Order Indicates Officers May Face Personal Liability for Data Breaches

by Baker Donelson
February 1, 2023

The FTC says Drizly’s CEO James Cory Rellas was alerted to a potential security loophole two years before a data...

Next Post
Markit Launches CRS Due Diligence Solution

Auditing the Due Diligence Process

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights