article thumbnail

What to Know About Tokenization

Basis Theory

Today, we can tokenize anything from credit card primary account numbers (PAN) to one-time debit card transactions or social security numbers. The token vault offers a secure and PCI-compliant location to store original data (e.g., credit card or social security numbers). This can be inconvenient and unwieldy.

article thumbnail

Data Breaches 101: What They Are And How To Prevent Them

VISTA InfoSec

These commonly breached records include: Personal Information Names, addresses, phone numbers, Social Security numbers, driver’s license details, passport numbers, patient healthcare records, insurance policy information, financial statements, etc.

article thumbnail

Digital Identity, (Way) Beyond The Social Security Number

PYMNTS

The more individuals leave a trail of information across websites, the more tempting the targets are for hackers to make off with everything from Social Security numbers to health care information. Your security question with your dog’s name? The more business is done online, the more fraud makes inroads. They ain’t cutting it.

article thumbnail

Separating Transactions From Authentication — And Authentication From The Internet

PYMNTS

Online authentication is only as good as its weakest link. Against a backdrop where transactions are on the rise, but have a weak foundation, it makes sense that authentication should be done separately — indeed, wholly disconnected — from the internet, said Kilb. Flash texts requesting authentication ask for PINs.

article thumbnail

Authentication Creates Opportunity To Solve FIs' $1 Trillion Fraud Problem

PYMNTS

But, as three banking security experts told Karen Webster, that same trillion-dollar loss represents a significant authentication opportunity for financial institutions (FIs) if they leverage risk-based authentication and behavioral analytics to help shape and safeguard the great digital shift. Deputizing The Consumer.

article thumbnail

Two-Thirds Of Patients Use Passwords For Healthcare Authentication: Why?

PYMNTS

Authentication can take effort, but consumers don’t want to deal with complex logins — even when dealing with their most sensitive accounts, like those containing healthcare or medical information. percent of customers are required to authenticate with a password, while only 45.2 Key Findings: The Capsule found 58.4 About The Report.

article thumbnail

NEW REPORT: Mueller Indictments Prompt Renewed Look At Social Security Numbers

PYMNTS

These solutions could shift the way national security agencies in several countries operate, or force employers to change how they authenticate and identify their employees. But workplaces aren’t the only entities considering a change to authentication or verification procedures. Social Security number as an identifier.