A Shift in the Wind – Securing Patient Portals

I thoroughly enjoyed my time at HIMSS16 in Las Vegas. It was great to be back, see old friends and make new ones. The landscape, as it relates to security has certainly changed since my first HIMSS Conference in 2008. I recall walking the exhibit hall discussing multi-factor authentication and identity management only to receive blank stares or interesting comments from prospective partners and customers.   I heard, “we use usernames and… Read more


On the road to trusted identities in healthcare, or just more compliance work?

On Feb 9th, the Senate health committee unanimously (22-0) approved wide-ranging legislation designed to improve health IT by modifying requirements relating to the development and use of electronic health records (EHR). Senate Bill S. 2511, “To improve Federal requirements relating to the development and use of electronic health records technology” is clearly a result of Congress’ displeasure with the lack of interoperability, data sharing and security in our healthcare system… Read more


Electronic Signatures Vs. Digital Signatures – Defining the Difference

To satisfy the expanding need for esignatures in every industry, VASCO recently acquired a leader in the electronic signature space—eSignLive. With many of our clients asking for digital signature services, we wanted to make sure that YOU know the difference between digital signatures and electronic signatures—and how the two should work together to provide a secure and legally binding solution to your document-signing needs. eSignLive’s Defining the Difference blog is… Read more


Top 5 Security Stories in 2015

2015 was a remarkable year in the IT security area. There was never a dull moment with novel attack methods, new enemies, massive breaches of healthcare organizations and the OPM, Hacking Team’s embarrassing takedown, and cars and toys becoming targets. Hard to imagine it all fit into just 365 days and it doesn’t look like it will slow down one bit with the New Year. Below is a brief look… Read more


Touch ID

Biometrics – specifically the use of fingerprints, iris scans and facial recognition as a means of authentication – increasingly has become an accepted part of daily life. Several governments, including the United States, Canada and United Kingdom, have adopted biometrics, as the technology continues to improve. In 2013, Apple introduced Touch ID, a fingerprint scanning technology embedded in the company’s new (at the time) iPhone 5s. Touch ID signaled the… Read more


What does the new Directive on Payment Services (PSD2) Mean for PSPs?

On October 8th, the European Parliament adopted the revised Directive on Payment Services, also known as PSD2. This new directive, which is the long awaited successor of the first Payment Services Directive from 2007, aims to harmonize the European retail payments market, which is very much fragmented along national borders, and foster the adoption of innovative, easy-to-use and secure payment schemes. PSD2 is the latest development in a series of… Read more


Social Engineering

A famous Warren Buffet quote starts with this statement, “It takes 20 years to build a reputation and five minutes to ruin it…” For financial institutions, few things are as potentially damaging as customers suffering losses because of social engineering schemes. These types of attacks undermine consumer confidence in a bank’s brand, put customers at great risk of financial loss, and collectively cost the financial industry countless millions of dollars… Read more


October 14, 2015 - Jan Valcke
system hacked

The lyrics, “Get your motor running, head out on the highway” may bring a lot more adventure in the future. Two security researchers wirelessly hacked a Jeep while it was being driven. They were able to take car hacking to the next level. They moved beyond dashboard functions and were able to compromise critical control mechanisms such as steering, transmission and brakes. The significance of this threat is off the… Read more


President-Barack-Obama-President-Xi-Jinping

The big news in the security segment this week is the newly-formed agreement that President Barack Obama has struck with Chinese President Xi Jinping. With a backdrop of U.S. threats to launch counter-attacks, the two leaders agreed to refrain from state-sponsored cyberattacks against each other that attempt to steal trade secrets or competitive business information. Sounds pretty good on the surface, but as it is with any complex agreement, you… Read more


Gen Y as the Next Threat Vector

As each new generation becomes more technologically advanced, banks and other service providers need to respond quickly to new expectations, and nowhere is this more apparent than with the generation we often call Gen Y, or the Millennial Generation. Gen Y has raised the bar when it comes to adoption of new technology, and the speed at which we must innovate. For example, they’re much more likely to use mobile… Read more