No Simple Way to Control Online Identity Theft

Kim Mays

Recent news stories about crime rings performing identity theft on a massive scale have many consumers fearing online transactions. CSO reports that sometimes the criminals start the jobs from inside a company - no hacking required - even though the hiring companies think they have done adequate background checks. Once that data has been stolen, it will likely be used by another criminal to make purchases online, which has online vendors scrambling to protect themselves and their shoppers.

 

More and more online vendors have taken to adding tedious questioning and other tactics for verifying online transactions. Many consumers feel that such verification tactics used today are often cumbersome and intrusive of their privacy. But most are willing to sacrifice a bit of that privacy if it means they would feel more secure. Still, most wish online vendors could find an easier way to verify transactions.



Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data